Main Article Content

Authors

Vijay Kumar Meena

Dr. Gaurav Khandelwal

Abstract

The Internet of Things is the idea of associating any gadget (with an on/off change) to the Internet and other associated gadgets. A protected house system incorporates a doorway lock structure, which has become perhaps the most favored customer gadgets, supplanting numerous conventional locks because of customer comfort and minimal expense. IoT security includes both actual gadget and organization security, and affects the cycles, headways, and techniques needed to guarantee IoT gadgets and organizations are secure. We recommended that the application gain from customer conduct and change security appropriately. The data about the customer who opened the lock will be saved in the server, along with the date and time, which might be utilized to foresee when the client will enter the property and change security in like manner. We involved the House Module just as the Control Module. Home computerization, as one of the main parts of the thriving housing market, requires the making of a fundamental yet successful framework that, through preparing, predicts and executes the customer's activities.

Downloads

Download data is not yet available.

Article Details

Section

Articles

References

  1. Islam, Akib. (2018). Android Application Based Smart Home Automation System Using Internet of Things. 10.1109/I2CT.2018.8529752.
  2. P. Gupta and J. Chhabra (2016). “IoT based Smart Home design using power and security management,” 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), Noida, pp. 6-10, doi: 10.1109/ICICCS.2016.7542317.
  3. For more information on how to secure common wireless protocols, see T. Karygiannis and L. Owens, Wireless Network Security: 802.11, Bluetooth and handheld devices. NIST Special Publication 800-48, November 2002)
  4. S. Frankel, B. Eydt, L. Owens, and K. Scarfone, Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i, NIST Special Publication 800-97, February 2007).
  5. The following reference provides a list of FIPS-validated cryptographic modules: National Institute of Standards and Technology, "Cryptographic Standards and Validation Programs at NIST," December 19, 2006, http://csrc.nist.gov/cryptval/.
  6. For more information on network firewalls, see J. Wack, K. Cutler, and J. Pole, Guidelines on Firewalls and Firewall Policy. NIST Special Publication 800-41, January 2002.