1. Introduction
The term IoT refers to system that can allow the devices to get connected and monitor those devices in remote manner through internet. The IoT concept has been evolved as one of the important technologies and it has been currently utilised in many domains such as telemedicine, industries and smart homes. The wireless sensor network technologies get integrated with the IoT to enable the smart devices interconnection with some of the advanced functionalities. The smart home is one part of IoT paradigm and it simply aims to attain the home automation. One of the greatest advantages of the smarthome such as easy management and controlling with usage of the devices such as Tablets, desktops, smart phones and smart watches. By switching to the IoT system, security must be taken into consideration to eliminate the various concerns occurs to the monitoring and controlling process.
2. Rationale
Problem Domain
Now a day, security in the home lies as foremost importance and thus moving to automation can be the perfect solution for it. The automation can be achieved by migrating to the IoT technology and thus the benefits of introduction of IoT technology into smart home will be analysed in this current research. The benefits that are achieved with assistance of the IoT technology for the smart home are tremendous and thus the consideration of some paradigms is essential. In order to defeat the problem, research on the various works made to gather the relevant data on the topic and thus defeating the major concern exist with this technology.
Purpose and Justification
The main motto behind this research study is to analyse the key benefits attained by the IoT based smart homes. And key solution to defeat the faced issues also explored and implementation of identified solution can be found effective. While transition to the IoT technology can add benefit but some of the concerns associated with it too. Thus the research work carried out by some of the researchers and authors were gathered and significance of their work also evaluated (peter, 2017).
Background Information
There are various automation system for the smart home found and they are built with some of the traditional technologies such as Bluetooth, zigbee, GSM and voice recognition. Even though it is applied for certain duration, due to certain drawback such as less network coverage and high power consumption has made the user to left those technologies. After taking the issues into the consideration, some of the researchers done the research on this topic have revealed the importance of the IoT technology. The usage of this technology can provide the solution for the authors to overcome and mitigate the risks and issues. (Domb, 2019)
3. Research Questions
- What is the impact of IoT in the automation system?
- How the research made can provide the key direction to do the further research?
- What are the challenges and issues concerned with the IoT based smart homes?
- How the researcher can be able to overcome the existing limitations?
4. Conceptual Framework
The conceptual framework was made with employment of various supporting technologies but there exist some of the flaws and concerns. Thus moving to the IoT based smart home can highly benefit large number of users. The security and safety in the home is one of the major factor that needs to be considered and it can be effectively improvised by adoption of the IoT framework. The framework introduced can made the data to be transferred with faster and efficient manner and suitable action will be made by the house owner by the measurement of the values with help of the sensors.
5. Materials and Methodology
Analysis of Source Information
The fount of data that are suitable for the research analysed and it is found that referring some blogs and articles reveal some of the useful idea about the research topic. The researcher can be able to know the both sides of the IoT technology and also can be able to make the sufficient alteration in the research path. The research on this work can generate some useful data on IoT technologies and challenges associated with it. The determination of those factors can generate the effective results as per the research study made.
Research Methods
The qualitative research methodology selected in which the challenges emerge with the IoT applications and techniques analysed. By the analysis on those work will provide the platform to make the further improvement in the IoT technology. The academic research papers reviewed for gathering such information and solution provided by those authors also analysed for finding the right solution. The detailed knowledge on those data can be gathered by means of the research done. The data that are gathered can be implied for overcoming the traditional security system issues. The high range of studies were planned to gather the more data on those chosen topic.
Data Collection
The data collection process retains some of the useful data on the IoT based smart home and analysis on the various solutions as defined by authors gathered. The survey were carried out with some of the industrial experts to know what are the benefits of the IoT technology and what are issues associated with it found out. The experts will reveal the importance as well as challenges they are facing daily. Thus the responses from those concerns have been considered finally and right solution will be applied for the right issues. The associated concerns and issues with the security systems can be completely defeated with the solution provided in the solutions that are suggested by the experts.
Ethical Issues
Ethics play an important role in the research process. It is therefore important to act in an ethical way to protect the dignity of the work and the confidentiality of information. Some of the ethical issues that arose in the search were investigated and documented as follows:
· Informing Participants
The persons participating in the research has to know about the activities such as the location and the main criteria of the research in order to stop ethics related problems.
· Data collection
The confidentiality of data must be maintained at maximum level and it is possible only when the researcher maintains the confidentiality of his work.
· Data analysis Confidentiality
The data which are gathered has to be enclosed in secured way by means of effective data protection mechanisms otherwise more integrity issues arise. The work done by author also should not be shared with any one whenever the research process becomes completed.
Compliance Requirements
The compliance requirement needs to follow by every researcher to make the data to be preserved with more security. The conflict of interest, misconduct and conduct of research must be taken into account while conducting the research. The researcher should not share the details of the work with others at any cost for the economic benefits. The rules and regulations must be followed by everyone to get rid of the ethical issues (Saha, 2018).
6. Project Plan
Deliverables
The outcome of this project provided below and acting as per the outcome can provide the sufficient data on the research knowledge and they are:
- Adds safety to the users through controlling of the appliances and lightning
- Secure the home by automatic door locks
- Increase the awareness via security cameras
- Increase the user convenience by adjustment of temperature level
- Save the precious time and energy
- Provides high control to users and saves lot of money(Hongyan, 2015)
Risk Analysis
The project may be subjected to various risks and considering them is one of the foremost goals in this research. And some of the risks are:
- The data collected from journals and articles should be relevant and accurate. It reduces the issues arise due to false concepts.
- The document produced by research may be subjected to quality issues due to ineffective research.(Gray, 2018)
- The latency in gathering and performing research activity within duration will affect the outcomes of the research.
- The copyright issues arise if researcher may involve in gathering of data from unauthorised sites.
Duration
Week | Task Description |
Week 1 | Paper selection from the digital libraries as per the research topic |
Week 2 | Research questions created in respective to the conclusion |
Week 3 | WBS creation for completing the project activities as per the plan |
Week 4 | Reviewing of the papers and collecting data details such as methods and techniques used (Dasgupta, 2019) |
Week 5 | Determination of the research gaps to find out the suitable solution for the gaps |
Week 6 | Data collection process by means of secondary data collection methods |
Week 7 | Problem discussion made with team to collect out the solution for it |
Week 8 | The brief analysis made between proposed and current solution proposed by the various authors |
Week 9 | Risk identification process to find the risks associated with the project and apt mitigation measures analysed in this week |
Week 10 | Outcome of project documented to make comparison with the actual outcome attained as per the plan |
Week 11 | Documentation of deliverables and future work analysis has been made in this week |
Week 12 | Submitting to project stakeholders to get approval for project |