Sie sind auf Seite 1von 5

2019 IEEE 5th World Forum on Internet of Things (WF-IoT)

SURE-H: A Secure IoT Enabled Smart Home


System
Roshmi Sarmah Manasjyoti Bhuyan Monowar H. Bhuyan†
Department of Information Technology DEIB-Computer Science and Engg. Department of Computing Science
Sikkim Manipal Institute of Technology Politecnico di Milano Umeå University
Majitar, Sikkim 737132, India Milan 20133, Italy Umeå-901 87, Sweden
reshmisharma01@gmail.com bhuyanmj@gmail.com monowarb@ieee.org

Abstract—With the growing technology, the demand for smart developed for home owners to accept various notifications
things is drastically increased in daily-life. The IoT (Internet of when the system detects any moving object.
Things) is one of the major components that provides facility Machine to Machine (M2M) interaction is a new business
to interact with IoT enabled devices. In this work, we propose
a secure and efficient smart home system that enable to protect concept originating from the telemetry technology used for
homes from theft or unusual activities and parallelly saves power. automatic transmission and measurement of data from remote
Our system is developed by exploiting the features of IoT that sources by wire, radio or other means [5]. The use of M2M
facilitates us to monitor an IoT enabled home from anywhere communication is more beneficial than a traditional system
anytime over the Internet when data are stored in the cloud. This with human intervention. As the system becomes automated
system uses a motion detector to detect a moving object from
the environment where the system is deployed. The proposed and flexible to upgrade, it becomes cheap to develop and cost-
system is evaluated using real-time deployment at KU campus effective to operate thereby increases the efficiency of the
considering 30 rooms for 60 days and found really useful in terms system drastically.
of safeness from any theft and saving power in comparison to In this work, we present a secure IoT-enabled smart home
existing systems. system that increases safeness from theft and parallelly saves
Index Terms—IoT; smart home; android smart phone; home
automation; motion sensor; enormous power cost. We deploy each configured module at
KU campus for 30 rooms to evaluate the performance of the
I. I NTRODUCTION proposed system and found effective in terms safeness as well
as power cost. It uses an Android application which provides
With proliferation and uses of Internet technology, the
switching functionalities, where the electrical or electronic
demand for IoT enabled devices has increased explosively.
devices are monitored and controlled remotely. This system
At the same time, there are problems regarding burglary or
adds advantage by eliminating the use of traditional personal
theft anything from small houses to large industries. Constant
computers (PC) and its peripheral devices during execution.
monitoring of people’s behavior, activities are required for
The rest of the paper is organized as follows: this work
the purpose of protection and management of confidential
focuses on the security control and saves the power of smart
data [1], [2]. In surveillance, installing and setup of CCTV
home automation system. We first discuss related literature
camera systems becomes costly for normal residents and also
in Section II on smart home automation system followed by
system can not inform the owner’s automatically when the
our proposed system and its implementation in Section III.
robbery happens. Compared to existing systems [3], [4], the
Experimental results are reported in Section IV. Finally, we
ESP8266 system is better in terms of resolution and low
present conclusions in Section V followed by future work.
power consumption. Here, passive infrared (PIR) sensors are
used as a simple but powerful people presence triggers. This II. L ITERATURE R EVIEW
system is suitable for small personal area monitoring like
Back in the 1980s, Japan, US and Europe had taken the
personal office cabin, bank locker room, parking entrance,
initiatives to develop more comprehensive home automation
and home. Whenever motion is detected through a PIR sensor
systems. The term home automation system was first used
which is fitted with the ESP8266 module, information is stored
by the Japanese companies like Hitachi and Matsushita who
temporarily in that module. The various IoT-based application
showed the interest in home automation systems. The Smart
can be used remotely to monitor the activity and receive
House Project was established in 1984 as project of the
notifications when motion is detected. Once programmed, the
National Research Center of the National Association of Home
system works as a stand-alone. An Android application is
Builders (NAHB), USA, with the cooperation of a number
†Dr. Bhuyan is on lien from the Department of Computer Science and Engi- of major industrial partners [6]. NAHB formed the SMART
neering, Kaziranga University, Jorhat 785006, Assam, India since September HOUSE Limited Partnership. It is comprised of major man-
2017. ufacturer companies and provided supports for the hardware
978-1-5386-4980-0/19/$31.00 2019
c IEEE and software required for the home automation system [7].

978-1-5386-4980-0/19/$31.00 ©2019 IEEE 59


2019 IEEE 5th World Forum on Internet of Things (WF-IoT)

Alkar and Buhur [8] implement Internet-based wireless is not at home? How can he monitor his house or office
solution to connect home devices to a slave node. The slave remotely? Moreover, this system is less secured and prone to
nodes communicate with a central node through radio fre- electrical hazards. This prototype provides a solution to this
quency and master node had serial RS232 link with a PC problem and enables energy saving as well. To support and
server. The PC server includes a user interface component, introduce a cost effective solution, the attempted system is
a database and web server components. An Internet page pertaining to connect multiple home appliances via smart logic
had been setup and running on a Web server. The control circuit. This system adds benefits to the traditional residents to
of devices is established and their condition is monitored monitor, control home appliances, and parallelly save power
through the Internet. The test results showed that the wireless from anywhere and anytime through smartphone applications.
communication has limited range less than 100 meters in
concrete building. Yavuz et al. [9] design and implement a III. SURE-H: T HE P ROPOSED S YSTEM
telephone and PIC (programmable interface) remote controlled The proposed automated smart home system consists of
device for controlling the home electrical devices. The system three main modules such as (i) the cloud server, (ii) the
does not facilitate wireless communication rather it uses pin hardware interface module, and (iii) the software package or
check algorithm to work with cable networks. The system smartphone application.
ensured safety as it cannot be used by unauthorized users as To design SURE-H system, initially, the sensors are config-
the system uses pin-check system. ured and attached to the ESP8266-12E module. This module
Das et al. [10] present a GSM-based communication and is capable to accept instruction through an interfacing port.
control for home appliances. This system allows the user The ESP8266-12E module of the relay board is programmed
or home owner to monitor and control the home appliances with Arduino and then it is configured to receive and process
via mobile phone set by sending commands in the form of a specific command transmitted over the Internet from user.
SMS (short message service) messages and the system also The cloud server is configured based on a cloud service
provides current status of the home appliances. They used provider known as Blynk. Blynk provides end-to-end solution
wireless control, hence, the system can be effectively used in for IoT based application development. Finally, we design a
systems not connected through wire which was desired in that smartphone app and connected with the ESP8266-12E module
moment. The working principle was user send text message through a cloud service provider over the Internet.
through the GSM network. GSM received the message send it Figure 1 shows the prototype model of the proposed system.
to the ATMEGA8 microcontroller via serial port using internal User uses the Internet to login into the cloud server and
UART [11] module of ATMEGA8. A microcontroller keeps control the home automation system. Low voltage switching
polling to check if the modem has received any text message. relays are used to integrate devices with the ESP8266-12E
ATMEGA8 communicates through a special command set module for demonstrating the switching functionality. If server
known as “AT COMMAND SET”. The microcontroller de- is connected to the Internet then remote users can access server
codes action required corresponding to the SMS command by using web-based application over the Internet.
a search and match technique where a look-up table is created SURE-H come up with following features.
with a set of commands and corresponding actions. Tseng et
• automated switches for all home appliances
al. [12] present a Smart House Monitor and Manager (SHMM)
• capable to detect moving object
based on ZigBee, all sensors and actuators are connected by
• generate password by combining user password and fin-
a ZigBee wireless network. They designed a simple smart
gerprint
socket, which had remote control via ZigBee. A PC host is
used as a data collector and for motion sensing, all sensor data The SURE-H system works based on the stored cloud server
are transferred to the Virtual Machine (VM) in the cloud. The data. We store the details of home appliances for each room
user can use a PC or Android phone to monitor and control into the server. Initially, it sends a request to the server and
through the Internet to perform power-saving of the house. wait for the approval. As soon as it observes any motion object
it sends an alarm with detail report against the incident. This
A. Discussion alarm will trigger only when the new object observes. Figure
As we entered into the 21st century, the interaction between 2 shows the flow of data of the SURE-H system.
humans and computer is breaking old barriers and entering
A. SURE-H: The Proposed Algorithm
a new realm. In the highly technology driven world, the
mobile phones have become a part of our lifestyles. Mobile As SURE-H operates through an Android app, it controls
phones are not just communication tool, it is much more the automated home system efficiently. Algorithm 1 demon-
than that. Our work tries to derive solution providing better strates the major steps of the SURE-H system.
security system for the home or office along with smart
control on home appliances with the help of cell phone. The IV. E XPERIMENTAL R ESULTS
existing system consists of the manual security system that In this section, we present experimental results with param-
raise alarm on breakthrough which can be heard to a limit eter estimation. Parameter estimation is really necessary to fit
of a particular range about 50 meter. But what if the owner the system in real-time environment.

60
2019 IEEE 5th World Forum on Internet of Things (WF-IoT)

Algorithm 1 SURE-H(S, UID, PASS)


Input: Power supply to the IoT enabled devices (S), user ID
of the house owner (UID), password for the particular
user(PASS) and fingerprint (F).
Output: Control IoT enabled devices and automatic object
detection.
1: Initialize the app and ESP8266-12E module.
2: App and ESP8266-12E module is configured with a re-
mote server (blynk server).
3: Send the data to the server and server send it to ESP8266-
12E module.
4: ESP8266-12E processes the data and send back the data
through the remote server.
1) Motion detector PIR sensor 5: Blynk server send the data to the app on request and
2) Motion detector PIR sensor displayed on app
3) Motion detector PIR sensor 6: Compare the received string with predefined strings and
4) Blynk cloud server accordingly activate the sensors and switch the Electrical
5) WiFi Internet gateway loads.
6) Thief 7: Display the status of electrical loads on app.
7) User 1 getting notification 8: Exit
8) User 2 getting notification
9) Lights automatically turns on detection of the thief
10) An alarm is also raise on detection of the thief Step 1: Setting up ESP8266-12E relay board
Fig. 1. SURE-H: a prototype model of autonomous smart home system After getting ESP8266-12E board, we write instructions that
passes through Arduino. After that required relay board was
ESP8266-12E
connected to the GPIO pins and power cable with 220v-240v
start send error AC connection. The various home appliances are connected
to the Solid State Relay (SSR) switches. The AC is converted
password + success
fingerprint send data
to DC with the help of AC to DC converter to pass current to
send error

success send error


the board.
generate secure
string

send command
Step 2: Operating ESP8266-12E with smartphone
send respond
success
ESP8266-12E is attached with Internet through Wi-Fi or
success any other connectivity so that it can be accessed through cloud
server. Through Arduino IDE ESP8266-12E, it is programmed
send error
and works in stand-alone mode. An Android or iOS application
server
is installed in the user’s smartphone which can connect to the
stop same cloud server through either IP address of the server or
domain name. Moreover, user should provide the password and
Fig. 2. SURE-H: a dataflow diagram fingerprint to login to the server. Finally, the user can monitor
their home or office remotely from anywhere and anytime with
low cost and save power consumption.
A. Experimental setup
To evaluate a system in real-time, it is really important B. Results and discussion
to deploy the system in real environment. We setup and The Arduino script monitors the difference in IR (infrared)
deploy modules in 30 different rooms for 60 days to observe signal of the motion sensor, if there is any interference in
the efficiency, which is designed based on an approximation IR signals then the motion flag is set, triggering the buzzer
model of power consumption for each room. During the and switching on the light. When the motion is detected,
period, we measure the efficiency of detection theft and power sensor data will trigger out and it will send a notification to
cost per room after each five alternative days. To estimate Android or iOS application installed in the user’s smartphone
the total cost, we compute (i) the total hours consumes the and connected email account. It will then report any intrusion
power, th = (consumed time in seconds/60 seconds) × inside the surveillance area and make the user aware of the
(24 hours/day), (ii) the total hours in a months, tm = situation in every 5 second. Figure 3 demonstrates the app
(th × number of days), (iii) the total watts consumed, activity for a single room.
tw = tm × % of total watts bulbs or devices deployed, The smart home system was fully functional and the user
(iv) the total cost, Tc = tw × rate per unit. SURE-H system interface is updated to reflect the current status when the
follows two major steps to accomplish this task. appliances are switched on. The SURE-H system is tested

61
2019 IEEE 5th World Forum on Internet of Things (WF-IoT)

Uses 8 X 100 watt bulbs in each room


Cost - before
140000 Cost - after

120000

Power consumption cost (per unit rate 7.50)


100000

80000

60000

40000

20000

0
0 10 20 30 40 50 60
Days

Fig. 4. Power consumption cost for 60 days in 30 deployed rooms

• Online dictionary attack: This attack is commonly at-


tempt to guess the password during communication be-
tween the parties either system or human. We generate
256-bits password using one-way hash before sending for
verification. Hence, it resist this attack.
Fig. 3. SURE-H android app
V. C ONCLUSION AND F UTURE WORKS
In this paper, SURE-H system is presented to ensure se-
for intrusion whereby it successfully detects the respective
curity of smart home automation system with multiple com-
events generating an email to the user and turning on the
ponents such as users, motion sensors, cloud server, moving
buzzer. It has security features such as user authentication for
object detection module, and alarm module. It is controlled
accessing the SURE-H system, and intrusion detection with
remotely based on user authentication. The SURE-H system
alert notification. The system does not require a dedicated PC
has been designed in such a way that it can fullfil the needs
that makes it low-cost and affordable. At the end, we estimate
of the user that reduces manual effort, save power and makes
the power consumption cost at each alternative five days before
more secure. Any android device can be used to monitor the
and after deployment of the proposed system.
smart home environment to detect any robbery. It has several
To work in high-speed networks, SURE-H performs well features include low cost, minimum time, highly scalable,
in terms of time, cost, security and low infrastructures than resist against man-in-the-middle and online dictionary attacks,
[3], [9], [13], [14]. Frequency range of existing systems are and needs minimum infrastructures.
900 − 928 MHz and 2.4 GHz, and network range is 10 − 30 SURE-H can be extended to the large-scale environment
meters. SURE-H works in frequency range 2.4GHz and 5GHz, such as offices and companies. It can also add additional
and network range is between 30 to 100 meters. In fact, we features such incorporating camera, call alerts and live video
save power consumption cost as seen in the Figure 4. Hence, streaming for future reference and analysis.
it is clear that SURE-H outperforms existing systems.
ACKNOWLEDGMENT
C. Security and vulnerability analysis
This work was carried out when the authors attached with
SURE-H is developed to protect smart home system. Like the Department of Computer Science and Engineering, Kazi-
other systems, SURE-H is also vulnerable to two major at- ranga University, Jorhat 785006, Assam, India and supported
tacks: (i) man-in-the-middle attack (ii) online dictionary attack. by the Kempe post-doc fellowship with the project no. SMK-
Each of them explained below briefly. 1644.
• Man-in-the-middle attack: In this attack, an adversary
R EFERENCES
attempt to impersonate the communication between the
server and the app. We provide additional layer of secu- [1] M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, Network Traffic
Anomaly Detection and Prevention - Concepts, Techniques, and Tools,
rity by combining classical password and fingerprint [15] 1st ed., ser. Computer Communications and Networks Series. Springer
to generate the actual password. International Germany, 2017.

62
2019 IEEE 5th World Forum on Internet of Things (WF-IoT)

[2] D. Choi, S. Seo, Y. Oh, and Y. Kang, “Two-Factor Fuzzy Commitment


for Unmanned IoT Devices Security,” IEEE Internet of Things Journal,
vol. 6, no. 1, pp. 335–348, Feb 2019.
[3] N. Sriskanthan and T. Karand, “Bluetooth based home automation
system,” Journal of Microprocessors and Microsystems, vol. 26, pp.
281–289, 2002.
[4] R. Petrolo, V. Loscri, and N. Mitton, “Towards a smart city based on
cloud of things, a survey on the smart city vision and paradigms,” Trans.
Emerg. Telecommun. Technol., vol. 28, no. 1, pp. 1–12, 2015.
[5] S. Joshi, A. Joshi, S. Jabade, and A. Jathar, “M2M Communication
Based Wireless SCADA for Real-Time Industrial Automation,” Inter-
national Journal of Research in Advent Technology, vol. 2, no. 4, pp.
107–109, 2014.
[6] M. Kumar and R. Singh, “Home appliance controlling using zigbee on
atmega128 hardware platform,” International Journal of Research in
Engineering and Technology, vol. 3, no. 7, pp. 469–472, 2014.
[7] A. C. Jose and R. Malekian, “Smart home automation security: A
literature review,” Smart Computing Review, vol. 5, no. 4, pp. 269–285,
2015.
[8] A. Z. Alkar and U. Buhur, “An internet based wireless home automation
system for multifunctional devices,” IEEE Transactions on Consumer
Electronics, vol. 51, pp. 1169–1174, 2005.
[9] E. Yavuz, B. Hasan, I. Serkan, and K. Duygu, “Safe and secure pic based
remote control application for intelligent home,” International Journal
of Computer Science and Network Security, vol. 7, no. 5, 2007.
[10] S. Das, N. Debabhuti, R. Das, S. Dutta, and A. Ghosh, “Embedded
system for home automation using sms,” in IEEE International Confer-
ence on Automation, Control, Energy and Systems, 2014, pp. 1–6.
[11] S. Kumar, “Ubiquitous smart home system using android application,”
International Journal of Computer Networks & Communications, vol. 6,
no. 1, 2014.
[12] S. P. Tseng, B. R. Li, J. L. Pan, and C. Lin, “An application of internet
of things with motion sensing on smart house,” in IEEE International
Conference on Orange Technologies, 2014, pp. 65–68.
[13] V. M. Reddy, N. Vinay, T. Pokharna, and S. S. K. Jha, “Internet of things
enabled smart switch,” in 13th International Conference on Wireless and
Optical Communications Networks, 2016, pp. 1–4.
[14] M. Mongiello, F. Nocera, A. Parchitelli, L. Patrono, P. Rametta, L. Ric-
cardi, and I. Sergi, “A Smart IoT-Aware System For Crisis Scenario
Management,” Journal of Communication Software and Systems, pp.
91–98, 2018.
[15] M. H. Bhuyan and D. K. Bhattacharyya, “An Effective Fingerprint
Classification and Search Method,” International Journal of Computer
Science and Network Security, vol. 9, no. 11, pp. 39–48, 2009.

63

Das könnte Ihnen auch gefallen