Abstract
This project focuses on building and developing a secure smart home IoT system that can give near real-time information about the status of the home, with the aid of cloud and wireless sensor communication technologies. In this paper, the capabilities and limitations of smart home systems were researched. The project built a smart Internet of Things (IoT) system for the security of the home. This project uses inexpensive and commercially available hardware, and the software solutions were developed based on open source packages. The performance and the security of the home IoT system were tested. Further security analysis was conducted to analyse the vulnerabilities of the connected IoT devices. The solutions presented in this paper are applicable to the real world and not limited to a controlled environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shields, N.: Urban development: why investors are growing more interested in smart cities (2018). http://uk.businessinsider.com/siemens-head-urban-development-martin-powell-investors-interested-smart-cities-2018-3
Gov.UK: The UK’s leadership in smart cities (2018). https://www.gov.uk/government/speeches/the-uks-leadership-in-smart-cities
Beckel, C., Serfas H., Moritz G.: Requirements for smart home applications and realization with WS4D-pipesBox. De Bosch (2011)
Montag, A.: Former NSA privacy expert: here’s how likely it is that your Amazon Echo will be hacked (2018). https://www.cnbc.com/2018/09/04/ex-nsa-privacy-expert-how-likely-your-amazon-echo-is-to-be-hacked.html. Accessed Jun 2019
Taylor, A.: The 17 biggest data breaches of the 21st century (2018). https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-21st-century.html. Accessed Jun 2019
Dinculeana, D., Cheng, X.: Vulnerabilities and limitations of MQTT protocol. Appl. Sci. J. 9(5), 848 (2019). https://doi.org/10.3390/app9050848
Tabassum, A., Ahmed, F., Ahmed, Z.: Smart home security using Raspberry PI. Int. J. Sci. Res. Eng. Technol. 4(7), 164–169 (2018)
Nath, R.K., Bajpai, R., Thapliyal, H.: IoT based indoor location detection system for smart home environment. In: 2018 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, pp. 1–3 (2018). https://doi.org/10.1109/icce.2018.8326225
Dey, P., Syed, S., Mitul, J., Ahmed, N.: Embedded system for automatic door access using face recognition. Int. Res. J. Eng. Technol. 06(06), 67–70 (2018). e-ISSN: 2395-0056
Sahani, M., Nanda, C., Sahu, A.K., Pattnaik, B.: Web-based embedded door access control and home security system. In: International Conference on Circuit, Power and Computing Technologies (ICCPCT), pp. 1–6 (2015). https://doi.org/10.1109/iccpct.2015.7159473
Apthorpe, N., Reisman, D., Feamster, N.: A smart home is no castle: privacy vulnerabilities of encrypted IoT traffic. Princeton University, Princeton, New Jersey (2017)
Raccoon, L.B.S.: The chaos model and the chaos cycle. SIGSOFT Softw. Eng. Notes 20(1), 55–66 (1995). https://doi.org/10.1145/225907.225914. ACM Digital Library, New York
MetalKey: UnrealIRCD 3.2.8.1 Backdoor Command Execution (2017). https://metalkey.github.io/unrealircd-3281-backdoor-command-execution.html
Espressif: ESP8266 - Low-power, highly-integrated Wi-Fi solution (2019). https://www.espressif.com/en/products/hardware/esp8266ex/overview
Kremser, S.: esp8266_deauther (2018). https://github.com/spacehuhn/esp8266_deauther. Accessed Jun 2019
Xie, W., Cheng, X.: Imbalanced big data classification based on virtual reality in cloud computing. Multimedia Tools Appl., 1–18 (2019). http://dx.doi.org/10.1007/s11042-019-7317-x
Yu, G., Xu, J., Cheng, X.: Platform of quality evaluation system for multimedia video communication based NS2. J. Ambient Intell. Humanized Comput., 1–12 (2018). https://doi.org/10.1007/s12652-018-1164-x. Print ISSN: 1868-5137, Online ISSN: 1868-5145
Xie, X., Yuan, T., Zhou, X., Cheng, X.: Research on trust model in container-based cloud service. Comput. Mater. Continua 56(2), 273–283 (2018). https://doi.org/10.3970/cmc.2018.03587. ISSN: 1546-2218 (printed), ISSN: 1546-2226
Gao, C., Lv, S., Wei, Y., Wang, Z., Liu, Z., Cheng, X.: an effective searchable symmetric encryption with enhanced security for mobile devices. IEEE Access 6, 38860–38869 (2018). ISSN 2169-3536
Wang, C., Zhao, Z., Gong, L., Zhu, L., Liu, Z., Cheng, X.: A distributed anomaly detection system for in-vehicle network using HTM. IEEE Access 6(1), 9091–9098 (2018)
Wang, C., et al.: Accurate Sybil attack detection based on fine-grained physical channel information. Sensors 18(3), 878 (2018). ISSN 1424-8220
Dinculeană, D., Cheng, X.: Vulnerabilities and limitations of MQTT protocol used between IoT devices. Appl. Sci. J. 9(5), 848 (2019). https://doi.org/10.3390/app9050848. Special issue “Access Control Schemes for Internet of Things”
Shi, F., Chen, Z., Cheng, X.: Behaviour modelling and individual recognition of sonar transmitter for secure communication in UASNs. IEEE Access (2019). https://doi.org/10.1109/access.2019.2923059. Print ISSN: 2169-3536, Online ISSN: 2169-3536
Men, J., et al.: Finding sands in the eyes: vulnerabilities discovery in IoT with EUFuzzer on human machine interface. IEEE Access 7, 103751–103759 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Ali, B., Cheng, X. (2019). Security Solution Based on Raspberry PI and IoT. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11983. Springer, Cham. https://doi.org/10.1007/978-3-030-37352-8_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-37352-8_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37351-1
Online ISBN: 978-3-030-37352-8
eBook Packages: Computer ScienceComputer Science (R0)