M. Al-Qutayri, H. Barada, S. Al-Mehairi, J. Nuaimi
{"title":"A Framework for an End-to-End Secure Wireless Smart Home System","authors":"M. Al-Qutayri, H. Barada, S. Al-Mehairi, J. Nuaimi","doi":"10.1109/SYSTEMS.2008.4519036","DOIUrl":null,"url":null,"abstract":"This paper describes a complete framework for an end- to-end smart home monitoring and control system. The communication with all components of the system is done using a variety of wireless technologies. The system incorporates security features at both ends that prevent unauthorized access as well as assign privileges to the users. The complete prototype smart home system was implemented and it supports three main services: monitoring the status of devices, controlling their settings through configurations that are device dependent, and periodic notification of the status of devices. The prototype system has a modular structure that enables the incorporation of additional components and services.","PeriodicalId":403208,"journal":{"name":"2008 2nd Annual IEEE Systems Conference","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 2nd Annual IEEE Systems Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SYSTEMS.2008.4519036","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 18
Abstract
This paper describes a complete framework for an end- to-end smart home monitoring and control system. The communication with all components of the system is done using a variety of wireless technologies. The system incorporates security features at both ends that prevent unauthorized access as well as assign privileges to the users. The complete prototype smart home system was implemented and it supports three main services: monitoring the status of devices, controlling their settings through configurations that are device dependent, and periodic notification of the status of devices. The prototype system has a modular structure that enables the incorporation of additional components and services.