Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (355)

Search Parameters:
Keywords = smart home security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
34 pages, 3835 KiB  
Article
A Privacy-Preserving RL-Based Secure Charging Coordinator Using Efficient FL for Smart Grid Home Batteries
by Amr A. Elshazly, Islam Elgarhy, Mohamed Mahmoud, Mohamed I. Ibrahem and Maazen Alsabaan
Energies 2025, 18(4), 961; https://doi.org/10.3390/en18040961 - 17 Feb 2025
Viewed by 193
Abstract
Smart power grids (SGs) enhance efficiency, reliability, and sustainability by integrating distributed energy resources (DERs) such as solar panels and wind turbines. A key challenge in SGs is managing home battery charging during periods of insufficient renewable energy generation to ensure fairness, efficiency, [...] Read more.
Smart power grids (SGs) enhance efficiency, reliability, and sustainability by integrating distributed energy resources (DERs) such as solar panels and wind turbines. A key challenge in SGs is managing home battery charging during periods of insufficient renewable energy generation to ensure fairness, efficiency, and customer satisfaction. This paper introduces a secure reinforcement learning (RL)-based framework for optimizing battery charging coordination while addressing privacy concerns and false data injection (FDI) attacks. Privacy is preserved through Federated Learning (FL), enabling collaborative model training without sharing sensitive State of Charge (SoC) data that could reveal personal routines. To combat FDI attacks, Deep Learning (DL)-based detectors are deployed to identify malicious SoC data manipulation. To improve FL efficiency, the Change and Transmit (CAT) technique reduces communication overhead by transmitting only model parameters that experience enough change comparing to the last round. Extensive experiments validate the framework’s efficacy. The RL-based charging coordinator ensures fairness by maintaining SoC levels within thresholds and reduces overall power utilization through optimal grid power allocation. The CAT-FL approach achieves up to 93.5% communication overhead reduction, while DL-based detectors maintain high accuracy, with supervised models reaching 99.84% and anomaly detection models achieving 92.1%. Moreover, the RL agent trained via FL demonstrates strong generalization, achieving high cumulative rewards and equitable power allocation when applied to new data owners which did not participate in FL training. This framework provides a scalable, privacy-preserving, and efficient solution for energy management in SGs, offering high accuracy against FDI attacks and paving the way for the future of smart grid deployments. Full article
Show Figures

Figure 1

Figure 1
<p>Secure RL-based Home Battery Charging Coordination.</p>
Full article ">Figure 2
<p>The system model considered in the paper.</p>
Full article ">Figure 3
<p>Illustration for the FL training process.</p>
Full article ">Figure 4
<p>The typical architecture of a DAE.</p>
Full article ">Figure 5
<p>Block diagram summarizing the research methodology.</p>
Full article ">Figure 6
<p>Net meter readings for five randomly selected households (one from each DO). Positive values indicate grid consumption exceeds solar generation; negative values indicate surplus solar power.</p>
Full article ">Figure 7
<p>Auto-Correlation Functions (ACFs) for a random consumer from each DO. Shaded regions indicate 95% confidence intervals. (<b>a</b>) Consumer 1. (<b>b</b>) Consumer 13. (<b>c</b>) Consumer 27. (<b>d</b>) Consumer 36. (<b>e</b>) Consumer 44.</p>
Full article ">Figure 8
<p>Total net power consumption over time for different DOs; each serving 10 consumers along with average consumption. (<b>a</b>) Total net consumption for first 10 consumers. (<b>b</b>) Total net consumption for second 10 consumers. (<b>c</b>) Total net consumption for third 10 consumers. (<b>d</b>) Total net consumption for fourth 10 consumers. (<b>e</b>) Total net consumption for fifth 10 consumers. (<b>f</b>) Total net consumption for sixth 10 consumers.</p>
Full article ">Figure 9
<p>Cumulative reward during training of the global model with five data owners using the traditional FL approach.</p>
Full article ">Figure 10
<p>Cumulative reward during training of the global model with five data owners using CAT-FL with 5% threshold.</p>
Full article ">Figure 11
<p>Cumulative reward during training of the global model with five data owners using CAT-FL with 15% threshold.</p>
Full article ">Figure 12
<p>Cumulative reward during training of the global model with five data owners using CAT-FL with 20% threshold.</p>
Full article ">Figure 13
<p>Total communication overhead reduction by each round for different CAT thresholds (5%, 15%, and 20%).</p>
Full article ">Figure 14
<p>Cumulative reward for local and global models, including FL with different CAT thresholds, tested on a different data owner.</p>
Full article ">Figure 15
<p>Fairness evaluation for local and global models, including FL with different CAT thresholds, tested on a different data owner.</p>
Full article ">Figure 16
<p>Comparison of power utilization between a local model, a global model, and FL with CAT across different thresholds.</p>
Full article ">
31 pages, 3691 KiB  
Article
Enhancing Smart Home Security: Blockchain-Enabled Federated Learning with Knowledge Distillation for Intrusion Detection
by Mohammed Shalan, Md Rakibul Hasan, Yan Bai and Juan Li
Smart Cities 2025, 8(1), 35; https://doi.org/10.3390/smartcities8010035 - 17 Feb 2025
Viewed by 178
Abstract
The increasing adoption of smart home devices has raised significant concerns regarding privacy, security, and vulnerability to cyber threats. This study addresses these challenges by presenting a federated learning framework enhanced with blockchain technology to detect intrusions in smart home environments. The proposed [...] Read more.
The increasing adoption of smart home devices has raised significant concerns regarding privacy, security, and vulnerability to cyber threats. This study addresses these challenges by presenting a federated learning framework enhanced with blockchain technology to detect intrusions in smart home environments. The proposed approach combines knowledge distillation and transfer learning to support heterogeneous IoT devices with varying computational capacities, ensuring efficient local training without compromising privacy. Blockchain technology is integrated to provide decentralized, tamper-resistant access control through Role-Based Access Control (RBAC), allowing only authenticated devices to participate in the federated learning process. This combination ensures data confidentiality, system integrity, and trust among devices. This framework’s performance was evaluated using the N-BaIoT dataset, showcasing its ability to detect anomalies caused by botnets such as Mirai and BASHLITE across diverse IoT devices. Results demonstrate significant improvements in intrusion detection accuracy, particularly for resource-constrained devices, while maintaining privacy and adaptability in dynamic smart home environments. These findings highlight the potential of this blockchain-enhanced federated learning system to offer a scalable, robust, and privacy-preserving solution for securing smart homes against evolving threats. Full article
(This article belongs to the Special Issue Big Data and AI Services for Sustainable Smart Cities)
Show Figures

Figure 1

Figure 1
<p>System Framework.</p>
Full article ">Figure 2
<p>Role-Based Access Control Mechanism for IoT Devices in a Smart Home Network.</p>
Full article ">Figure 3
<p>Centralized accuracies.</p>
Full article ">Figure 4
<p>Centralized losses.</p>
Full article ">Figure 5
<p>Federated accuracies.</p>
Full article ">Figure 6
<p>Federated losses.</p>
Full article ">Figure 7
<p>Code snippet of the proposed smart contract.</p>
Full article ">Figure 8
<p>Submitting Class Scores by Authorized Devices with CVW.</p>
Full article ">Figure 9
<p>Aggregating Submitted Class Scores by the Smart Contract.</p>
Full article ">Figure 10
<p>Rejecting Unauthorized Device Attempts to Participate in the FL Process.</p>
Full article ">
25 pages, 2844 KiB  
Article
Real-Time Gesture-Based Hand Landmark Detection for Optimized Mobile Photo Capture and Synchronization
by Pedro Marques, Paulo Váz, José Silva, Pedro Martins and Maryam Abbasi
Electronics 2025, 14(4), 704; https://doi.org/10.3390/electronics14040704 - 12 Feb 2025
Viewed by 396
Abstract
Gesture recognition technology has emerged as a transformative solution for natural and intuitive human–computer interaction (HCI), offering touch-free operation across diverse fields such as healthcare, gaming, and smart home systems. In mobile contexts, where hygiene, convenience, and the ability to operate under resource [...] Read more.
Gesture recognition technology has emerged as a transformative solution for natural and intuitive human–computer interaction (HCI), offering touch-free operation across diverse fields such as healthcare, gaming, and smart home systems. In mobile contexts, where hygiene, convenience, and the ability to operate under resource constraints are critical, hand gesture recognition provides a compelling alternative to traditional touch-based interfaces. However, implementing effective gesture recognition in real-world mobile settings involves challenges such as limited computational power, varying environmental conditions, and the requirement for robust offline–online data management. In this study, we introduce ThumbsUp, which is a gesture-driven system, and employ a partially systematic literature review approach (inspired by core PRISMA guidelines) to identify the key research gaps in mobile gesture recognition. By incorporating insights from deep learning–based methods (e.g., CNNs and Transformers) while focusing on low resource consumption, we leverage Google’s MediaPipe in our framework for real-time detection of 21 hand landmarks and adaptive lighting pre-processing, enabling accurate recognition of a “thumbs-up” gesture. The system features a secure queue-based offline–cloud synchronization model, which ensures that the captured images and metadata (encrypted with AES-GCM) remain consistent and accessible even with intermittent connectivity. Experimental results under dynamic lighting, distance variations, and partially cluttered environments confirm the system’s superior low-light performance and decreased resource consumption compared to baseline camera applications. Additionally, we highlight the feasibility of extending ThumbsUp to incorporate AI-driven enhancements for abrupt lighting changes and, in the future, electromyographic (EMG) signals for users with motor impairments. Our comprehensive evaluation demonstrates that ThumbsUp maintains robust performance on typical mobile hardware, showing resilience to unstable network conditions and minimal reliance on high-end GPUs. These findings offer new perspectives for deploying gesture-based interfaces in the broader IoT ecosystem, thus paving the way toward secure, efficient, and inclusive mobile HCI solutions. Full article
(This article belongs to the Special Issue AI-Driven Digital Image Processing: Latest Advances and Prospects)
Show Figures

Figure 1

Figure 1
<p>System architecture of <span class="html-italic">ThumbsUp</span>, which highlights the interactions between the mobile application, middleware, and cloud database.</p>
Full article ">Figure 2
<p>MongoDB database schema showing collections for users, photos, and metadata, and their relationships.</p>
Full article ">Figure 3
<p>Synchronization flow from local SQLite to MongoDB, demonstrating the queue-based approach for handling intermittent connectivity.</p>
Full article ">Figure 4
<p>Experimental framework detailing the key testing dimensions and associated metrics.</p>
Full article ">Figure 5
<p>Enhanced network configuration showcasing stable connectivity between the mobile device, Raspberry Pi, and optional cloud server. The system also includes an administrator dashboard for monitoring and local storage for redundancy.</p>
Full article ">Figure 6
<p>Comprehensive data collection framework illustrating multi-layered monitoring of performance metrics. The workflow integrates gesture detection logs, resource monitoring, and synchronization metrics to provide a holistic view of system performance.</p>
Full article ">Figure 7
<p>Testing matrix showing the combinations of lighting conditions (low, normal, high) and distances (15 cm, 1 m, 2 m). Each scenario was tested systematically to evaluate the system’s performance.</p>
Full article ">Figure 8
<p>Comparison of gesture recognition accuracy under different conditions.</p>
Full article ">Figure 9
<p>Latency of ThumbsUp vs. Google Camera under different conditions.</p>
Full article ">Figure 10
<p>Comparison of CPU and memory usage.</p>
Full article ">Figure 11
<p>Battery drain per hour (ThumbsUp vs. Google Camera).</p>
Full article ">Figure 12
<p>Synchronization performance comparison across three phases.</p>
Full article ">Figure 13
<p>Comparison of error recovery times for <span class="html-italic">ThumbsUp</span> vs. <span class="html-italic">Google Camera</span>.</p>
Full article ">Figure 14
<p>Recognition accuracy over extended usage periods.</p>
Full article ">
26 pages, 9559 KiB  
Article
Exploring Knowledge Domain of Intelligent Safety and Security Studies by Bibliometric Analysis
by Ting Mei, Hui Liu, Bingrui Tong, Chaozhen Tong, Junjie Zhu, Yuxuan Wang and Mengyao Kou
Sustainability 2025, 17(4), 1475; https://doi.org/10.3390/su17041475 - 11 Feb 2025
Viewed by 337
Abstract
Intelligent safety and security is significant for preventing risks, ensuring information security and promoting sustainable social development, making it an indispensable part of modern society. Current research primarily focuses on the knowledge base and research hotspots in the field of intelligent safety and [...] Read more.
Intelligent safety and security is significant for preventing risks, ensuring information security and promoting sustainable social development, making it an indispensable part of modern society. Current research primarily focuses on the knowledge base and research hotspots in the field of intelligent safety and security. However, a comprehensive mapping of its overall knowledge structure remains lacking. A total of 1400 publications from the Web of Science Core Collection (2013–2023) are analyzed using VOSviewer and CiteSpace, through which co-occurrence analysis, keyword burst detection, and co-citation analysis are conducted. Through this approach, this analysis systematically uncovers the core themes, evolutionary trajectories, and emerging trends in intelligent safety and security research. Unlike previous bibliometric studies, this study is the first to integrate multiple visualization techniques to construct a holistic framework of the intelligent safety and security knowledge system. Additionally, it offers an in-depth analysis of key topics such as IoT security, intelligent transportation systems, smart cities, and smart grids, providing quantitative insights to guide future research directions. The results show that the most significant number of publications are from China; the top position on the list of papers published by related institutions is occupied by King Saud University from Saudi Arabia. Renewable and Sustainable Energy Reviews, Sustainable Cities and Society, and IEEE Transactions on Intelligent Transportation Systems are identified as the leading publications in this field. The decentralization of blockchain technology, the security and challenges of the Internet of Things (IoT), and research on intelligent cities and smart homes have formed the knowledge base for innovative security research. The four key directions of intelligent safety and security research mainly comprise IoT security, intelligent transportation systems, traffic safety and its far-reaching impact, and the utilization of smart grids and renewable energy. Research on IoT technology, security, and limitations is at the forefront of interest in this area. Full article
(This article belongs to the Special Issue Intelligent Information Systems and Operations Management)
Show Figures

Figure 1

Figure 1
<p>The main research steps and methods of this paper are carried out.</p>
Full article ">Figure 2
<p>Temporal distribution of the literature in the field of intelligent safety and security.</p>
Full article ">Figure 3
<p>Cooperative countries in the field of intelligent safety and security.</p>
Full article ">Figure 4
<p>Collaborative network between institutions in research in the field of intelligent safety and security.</p>
Full article ">Figure 5
<p>Major authors and cooperative relationship in the field of intelligent safety and security.</p>
Full article ">Figure 6
<p>Network of major journals in the field of intelligent safety and security.</p>
Full article ">Figure 7
<p>Network of intelligent and secure highly co-cited journals.</p>
Full article ">Figure 8
<p>Co-cited network of the intelligent safety and security research literature.</p>
Full article ">Figure 9
<p>Intelligent safety and security research keyword co-occurrence network.</p>
Full article ">Figure 10
<p>Intelligent safety and security research keyword clustering diagram.</p>
Full article ">Figure 11
<p>Time zone map of key words in intelligent safety and security research.</p>
Full article ">
61 pages, 10098 KiB  
Article
Segmentation and Filtering Are Still the Gold Standard for Privacy in IoT—An In-Depth STRIDE and LINDDUN Analysis of Smart Homes
by Henrich C. Pöhls, Fabian Kügler, Emiliia Geloczi and Felix Klement
Future Internet 2025, 17(2), 77; https://doi.org/10.3390/fi17020077 - 10 Feb 2025
Viewed by 387
Abstract
Every year, more and more electronic devices are used in households, which certainly leads to an increase in the total number of communications between devices. During communication, a huge amount of information is transmitted, which can be critical or even malicious. To avoid [...] Read more.
Every year, more and more electronic devices are used in households, which certainly leads to an increase in the total number of communications between devices. During communication, a huge amount of information is transmitted, which can be critical or even malicious. To avoid the transmission of unnecessary information, a filtering mechanism can be applied. Filtering is a long-standing method used by network engineers to segregate and thus block unwanted traffic from reaching certain devices. In this work, we show how to apply this to the Internet of Things (IoT) Smart Home domain as it introduces numerous networked devices into our daily lives. To analyse the positive influence of filtering on security and privacy, we offer the results from our in-depth STRIDE and LINDDUN analysis of several Smart Home scenarios before and after the application. To show that filtering can be applied to other IoT domains, we offer a brief glimpse into the domain of smart cars. Full article
(This article belongs to the Special Issue Privacy and Security in Computing Continuum and Data-Driven Workflows)
Show Figures

Figure 1

Figure 1
<p>STRIDE Steps.</p>
Full article ">Figure 2
<p>LINDDUN Steps.</p>
Full article ">Figure 3
<p>Attack against devices (<b>a</b>) inside the car coming from the outside via the On-Board-Diagnosis (OBD), (<b>b</b>) inside the IoT system coming from outside via the Internet or via an adversarial device connected to the home network.</p>
Full article ">Figure 4
<p>For filtering a firewall is placed between the inside network and its connections to the outside; e.g., (<b>a</b>) behind the OBD interface of the car or (<b>b</b>) the Internet connection of a router.</p>
Full article ">Figure 5
<p>Performance evaluation of our own Bark-style prototypical filtering setup tested on a Raspberry PI 4B. The x axis corresponds to the number of network devices ∈ {50, 100, 300, 500, 700}. Apart from the baseline value, three graphs are shown, representing the number of checks that are needed to evaluate the tested set of filtering rules ∈ {50, 150, 250}.</p>
Full article ">Figure 6
<p>Data leakage from (<b>a</b>) the car via OBD [<a href="#B39-futureinternet-17-00077" class="html-bibr">39</a>,<a href="#B40-futureinternet-17-00077" class="html-bibr">40</a>] and from (<b>b</b>) the IoT system.</p>
Full article ">Figure 7
<p>Data Flow Diagram of Scenario <math display="inline"><semantics> <mi>α</mi> </semantics></math> (communication with the Internet).</p>
Full article ">Figure 8
<p>Data Flow Diagram of Scenario <math display="inline"><semantics> <mi>β</mi> </semantics></math> (Local Network Communication).</p>
Full article ">Figure 9
<p>Data Flow Diagram of Scenario <math display="inline"><semantics> <mi>γ</mi> </semantics></math> (guest access).</p>
Full article ">Figure 10
<p>Data Flow Diagram of Scenario <math display="inline"><semantics> <mi>δ</mi> </semantics></math> (indirect control).</p>
Full article ">Figure 11
<p>Explanation of the STRIDE and LINDDUN threat tables used to show the impact and attack vectors and colour coding to indicate the potential positive impact of filtering in this scenario.</p>
Full article ">Figure 12
<p>The number of influenced impacts per influence level across all four scenarios for Virtual Private Networks (VPNs), an Intrusion Detection System (IDSys) and filtering using <span class="html-italic">Bark</span>. Rating the possible improvement through the usage of filtering: no/only low (<span style="background:#dddddd">grey</span>), some (<span style="background:#ffb198">red</span>), medium (<span style="background:#ffee98">yellow</span>) and high (<span style="background:#c6ff98">green</span>).</p>
Full article ">
38 pages, 701 KiB  
Review
Evolution of Bluetooth Technology: BLE in the IoT Ecosystem
by Grigorios Koulouras, Stylianos Katsoulis and Fotios Zantalis
Sensors 2025, 25(4), 996; https://doi.org/10.3390/s25040996 - 7 Feb 2025
Viewed by 517
Abstract
The Internet of Things (IoT) has witnessed significant growth in recent years, with Bluetooth Low Energy (BLE) emerging as a key enabler of low-power, low-cost wireless connectivity. This review article provides an overview of the evolution of Bluetooth technology, focusing on the role [...] Read more.
The Internet of Things (IoT) has witnessed significant growth in recent years, with Bluetooth Low Energy (BLE) emerging as a key enabler of low-power, low-cost wireless connectivity. This review article provides an overview of the evolution of Bluetooth technology, focusing on the role of BLE in the IoT ecosystem. It examines the current state of BLE, including its applications, challenges, limitations, and recent advancements in areas such as security, power management, and mesh networking. The recent release of Bluetooth Low Energy version 6.0 by the Bluetooth Special Interest Group (SIG) highlights the technology’s ongoing evolution and growing importance within the IoT. However, this rapid development highlights a gap in the current literature, a lack of comprehensive, up-to-date reviews that fully capture the contemporary landscape of BLE in IoT applications. This paper analyzes the emerging trends and future directions for BLE, including the integration of artificial intelligence, machine learning, and audio capabilities. The analysis also considers the alignment of BLE features with the United Nations’ Sustainable Development Goals (SDGs), particularly energy efficiency, sustainable cities, and climate action. By examining the development and deployment of BLE technology, this article aims to provide insights into the opportunities and challenges associated with its adoption in various IoT applications, from smart homes and cities to industrial automation and healthcare. This review highlights the significance of the evolution of BLE in shaping the future of wireless communication and IoT, and provides a foundation for further research and innovation in this field. Full article
(This article belongs to the Special Issue Advances in Intelligent Sensors and IoT Solutions (2nd Edition))
Show Figures

Figure 1

Figure 1
<p>Superimposition of the Nordic runes for the letters H and B, representing “Harald Bluetooth”.</p>
Full article ">Figure 2
<p>Mapping between the frequencies and Bluetooth LE channels. (Source: <a href="https://es.mathworks.com/help/bluetooth/ug/bluetooth-low-energy-waveform-generation-and-visualization.html" target="_blank">https://es.mathworks.com/help/bluetooth/ug/bluetooth-low-energy-waveform-generation-and-visualization.html</a> (Mathworks) (accessed on 3 February 2025)).</p>
Full article ">Figure 3
<p>Evolution of BLE technology.</p>
Full article ">
25 pages, 1235 KiB  
Article
Artifical Intelligence-Based Smart Security System Using Internet of Things for Smart Home Applications
by Hakilo Sabit
Electronics 2025, 14(3), 608; https://doi.org/10.3390/electronics14030608 - 4 Feb 2025
Viewed by 864
Abstract
This study presents the design and development of an AI-based Smart Security System leveraging IoT technology for smart home applications. This research focuses on exploring and evaluating various artificial intelligence (AI) and Internet of Things (IoT) options, particularly in video processing and smart [...] Read more.
This study presents the design and development of an AI-based Smart Security System leveraging IoT technology for smart home applications. This research focuses on exploring and evaluating various artificial intelligence (AI) and Internet of Things (IoT) options, particularly in video processing and smart home security. The system is structured around key components: IoT technology elements, software management of IoT interactions, AI-driven video processing, and user information delivery methods. Each component’s selection is based on a comparative analysis of alternative approaches, emphasizing the advantages of the chosen solutions. This study provides an in-depth discussion of the theoretical framework and implementation strategies used to integrate these technologies into the security system. Results from the system’s deployment and testing are analyzed, highlighting the system’s performance and the challenges faced during integration. This study also addresses how these challenges were mitigated through specific adaptations. Finally, potential future enhancements are suggested to further improve the system, including recommendations on how these upgrades could advance the functionality and effectiveness of AI-based Smart Security Systems in smart home applications. Full article
Show Figures

Figure 1

Figure 1
<p>The proposed smart security system function routine.</p>
Full article ">Figure 2
<p>The proposed smart security systemblock diagram function routine.</p>
Full article ">Figure 3
<p>Iot technology working.</p>
Full article ">Figure 4
<p>The PIR sensor operation.</p>
Full article ">Figure 5
<p>The ultrasonic sensor operation.</p>
Full article ">Figure 6
<p>Camera in client–server architecture.</p>
Full article ">Figure 7
<p>Face detetion steps with privacy preserved. (<b>a</b>) camera capture; (<b>b</b>) grayscale; (<b>c</b>) Gaussian blur; (<b>d</b>) face detection.</p>
Full article ">Figure 8
<p>Recognized face with an identity label and unrecognized face. (<b>a</b>) user “TTu”; (<b>b</b>) user “SPh”; (<b>c</b>) “R. Federer”; (<b>d</b>) “Unknown”.</p>
Full article ">Figure 9
<p>PIR sensor detection test outcome.</p>
Full article ">Figure 10
<p>Recognized face with an identity label and unrecognized face. (<b>a</b>) user “TTu”; (<b>b</b>) user “SPh”; (<b>c</b>) “B. Elish”; (<b>d</b>) “Unknown”.</p>
Full article ">Figure 11
<p>Calculated metrics.</p>
Full article ">Figure 12
<p>Example received email with attached link.</p>
Full article ">Figure 13
<p>Pushbullet notifications for recognized and unrecognized persons.</p>
Full article ">Figure 14
<p>Activity tabs. (<b>a</b>) App Activity Screen; (<b>b</b>) App Locations Screen; (<b>c</b>) Light-Mode screen.</p>
Full article ">Figure 15
<p>Link and video play buttons. (<b>a</b>) Open link button; (<b>b</b>) video player button; (<b>c</b>) video player fullscreen.</p>
Full article ">
49 pages, 1269 KiB  
Review
Data-Driven Technologies for Energy Optimization in Smart Buildings: A Scoping Review
by Joy Dalmacio Billanes, Zheng Grace Ma and Bo Nørregaard Jørgensen
Energies 2025, 18(2), 290; https://doi.org/10.3390/en18020290 - 10 Jan 2025
Viewed by 919
Abstract
Data-driven technologies in smart buildings offer significant opportunities to enhance energy efficiency, sustainability, and occupant comfort. However, the existing literature often lacks a holistic examination of the technological advancements, adoption barriers, and business models necessary to realize these benefits. To address this gap, [...] Read more.
Data-driven technologies in smart buildings offer significant opportunities to enhance energy efficiency, sustainability, and occupant comfort. However, the existing literature often lacks a holistic examination of the technological advancements, adoption barriers, and business models necessary to realize these benefits. To address this gap, this scoping review synthesizes current research on these technologies, identifies factors influencing their adoption, and examines supporting business models. Inspired by the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines, a structured search of the literature across four major databases yielded 112 relevant studies. The key technologies identified included big data analytics, Artificial Intelligence, Machine Learning, the Internet of Things, Wireless Sensor Networks, Edge and Cloud Computing, Blockchain, Digital Twins, and Geographic Information Systems. Energy optimization is further achieved through integrating renewable energy resources and advanced energy management systems, such as Home Energy Management Systems and Building Energy Management Systems. Factors influencing adoption are categorized into social influences, individual perceptions, cost considerations, security and privacy concerns, and data quality issues. The analysis of business models emphasizes the need to align technological innovations with market needs, focusing on value propositions like cost savings and efficiency improvements. Despite the benefits, challenges such as high initial costs, technical complexities, security risks, and user acceptance hinder their widespread adoption. This review highlights the importance of addressing these challenges through the development of cost-effective, interoperable, secure, and user-centric solutions, offering a roadmap for future research and industry applications. Full article
Show Figures

Figure 1

Figure 1
<p>Eligibility criteria.</p>
Full article ">Figure 2
<p>The PRISMA flow diagram.</p>
Full article ">
21 pages, 10689 KiB  
Article
Human Occupancy Monitoring and Positioning with Speed-Responsive Adaptive Sliding Window Using an Infrared Thermal Array Sensor
by Yukai Lin and Qiangfu Zhao
Sensors 2025, 25(1), 129; https://doi.org/10.3390/s25010129 - 28 Dec 2024
Viewed by 705
Abstract
In the current era of advanced IoT technology, human occupancy monitoring and positioning technology is widely used in various scenarios. For example, it can optimize passenger flow in public transportation systems, enhance safety in large shopping malls, and adjust smart home devices based [...] Read more.
In the current era of advanced IoT technology, human occupancy monitoring and positioning technology is widely used in various scenarios. For example, it can optimize passenger flow in public transportation systems, enhance safety in large shopping malls, and adjust smart home devices based on the location and number of occupants for energy savings. Additionally, in homes requiring special care, it can provide timely assistance. However, this technology faces limitations such as privacy concerns, environmental factors, and costs. Traditional cameras may not effectively address these issues, but infrared thermal sensors can offer similar applications while overcoming these challenges. Infrared thermal sensors detect the infrared heat emitted by the human body, protecting privacy and functioning effectively day and night with low power consumption, making them ideal for continuous monitoring scenarios like security systems or elderly care. In this study, we propose a system using the AMG8833, an 8 × 8 Infrared Thermal Array Sensor. The sensor data are processed through interpolation, adaptive thresholding, and blob detection, and the merged human heat signatures are separated. To enhance stability in human position estimation, a dynamic sliding window adjusts its size based on movement speed, effectively handling environmental changes and uncertainties. Full article
(This article belongs to the Special Issue Indoor Positioning Technologies for Internet-of-Things)
Show Figures

Figure 1

Figure 1
<p>Original heatmap from AMG8833.</p>
Full article ">Figure 2
<p>Different interpolation methods applied to original heatmaps.</p>
Full article ">Figure 3
<p>(<b>A</b>) 4-connectivity. (<b>B</b>) 8-connectivity.</p>
Full article ">Figure 4
<p>Connected component labeling results.</p>
Full article ">Figure 5
<p>Thermal merger due to close proximity.</p>
Full article ">Figure 6
<p>(<b>A</b>) Binary Image. (<b>B</b>) Topographic Image.</p>
Full article ">Figure 7
<p>(<b>A</b>) Detection Error. (<b>B</b>) Correct Detection.</p>
Full article ">Figure 8
<p>Sliding window size adjustment based on movement speed.</p>
Full article ">Figure 9
<p>Test environment.</p>
Full article ">Figure 10
<p>Hardware configuration.</p>
Full article ">Figure 11
<p>Pin diagram.</p>
Full article ">Figure 12
<p>One individual.</p>
Full article ">Figure 13
<p>Two individuals.</p>
Full article ">Figure 14
<p>Three individuals.</p>
Full article ">Figure 15
<p>Dark environment.</p>
Full article ">Figure 16
<p>Watershed algorithm applied.</p>
Full article ">
30 pages, 753 KiB  
Review
Applications of Deep Reinforcement Learning for Home Energy Management Systems: A Review
by Dominik Latoń, Jakub Grela and Andrzej Ożadowicz
Energies 2024, 17(24), 6420; https://doi.org/10.3390/en17246420 - 20 Dec 2024
Viewed by 1087
Abstract
In the context of the increasing integration of renewable energy sources (RES) and smart devices in domestic applications, the implementation of Home Energy Management Systems (HEMS) is becoming a pivotal factor in optimizing energy usage and reducing costs. This review examines the role [...] Read more.
In the context of the increasing integration of renewable energy sources (RES) and smart devices in domestic applications, the implementation of Home Energy Management Systems (HEMS) is becoming a pivotal factor in optimizing energy usage and reducing costs. This review examines the role of reinforcement learning (RL) in the advancement of HEMS, presenting it as a powerful tool for the adaptive management of complex, real-time energy demands. This review is notable for its comprehensive examination of the applications of RL-based methods and tools in HEMS, which encompasses demand response, load scheduling, and renewable energy integration. Furthermore, the integration of RL within distributed automation and Internet of Things (IoT) frameworks is emphasized in the review as a means of facilitating autonomous, data-driven control. Despite the considerable potential of this approach, the authors identify a number of challenges that require further investigation, including the need for robust data security and scalable solutions. It is recommended that future research place greater emphasis on real applications and case studies, with the objective of bridging the gap between theoretical models and practical implementations. The objective is to achieve resilient and secure energy management in residential and prosumer buildings, particularly within local microgrids. Full article
(This article belongs to the Section K: State-of-the-Art Energy Related Technologies)
Show Figures

Figure 1

Figure 1
<p>The number of selected publications in four key areas of RL and DRL applications for four major publishers (2019–2024 period).</p>
Full article ">
29 pages, 8028 KiB  
Article
Developing a Hybrid Approach with Whale Optimization and Deep Convolutional Neural Networks for Enhancing Security in Smart Home Environments’ Sustainability Through IoT Devices
by Kavitha Ramaswami Jothi and Balamurugan Vaithiyanathan
Sustainability 2024, 16(24), 11040; https://doi.org/10.3390/su162411040 - 16 Dec 2024
Viewed by 748
Abstract
Even while living circumstances and construction techniques have generally improved, occupants of these spaces frequently feel unsatisfied with the sense of security they provide, which leads to looking for and eventually enacting ever-more-effective safety precautions. The continuous uncertainty that contemporary individuals experience, particularly [...] Read more.
Even while living circumstances and construction techniques have generally improved, occupants of these spaces frequently feel unsatisfied with the sense of security they provide, which leads to looking for and eventually enacting ever-more-effective safety precautions. The continuous uncertainty that contemporary individuals experience, particularly with regard to their protection in places like cities, prompted the field of computing to design smart devices that attempt to reduce threats and ultimately strengthen people’s sense of protection. Intelligent apps were developed to provide protection and make a residence a smart and safe home. The proliferation of technology for smart homes necessitates the implementation of rigorous safety precautions to protect users’ personal information and avoid illegal access. The importance of establishing cyber security has been recognized by academic and business institutions all around the globe. Providing reliable computation for the Internet of Things (IoT) is also crucial. A new method for enhancing safety in smart home environments’ sustainability using IoT devices is presented in this paper, combining the Whale Optimization Algorithm (WOA) with Deep Convolutional Neural Networks (DCNNs). WOA-DCNN hybridization seeks to enhance safety measures by efficiently identifying and averting possible attacks in real time. We show how effective the proposed approach is in defending smart home systems from a range of safety risks via in-depth testing and analysis. By providing a potential path for protecting smart home surroundings in a world that is growing more linked, this research advances the state of the art in IoT security. Full article
Show Figures

Figure 1

Figure 1
<p>Smart home system.</p>
Full article ">Figure 2
<p>Smart home environment.</p>
Full article ">Figure 3
<p>Proposed architecture of the smart home system.</p>
Full article ">Figure 4
<p>Demand-side load management strategies.</p>
Full article ">Figure 5
<p>Overall layout of smart home architecture.</p>
Full article ">Figure 6
<p>Humpback whale bubble-net feeding.</p>
Full article ">Figure 7
<p>Step-by-step procedure of the WOA.</p>
Full article ">Figure 8
<p>Smart home device registration.</p>
Full article ">Figure 9
<p>Smart home security based on WOA-DCNN.</p>
Full article ">Figure 10
<p>Intruder detection system architecture based on WOA-DCNN.</p>
Full article ">Figure 11
<p>Proposed system-trained confusion matrix of detecting smart home appliances from the intrusion detection system.</p>
Full article ">Figure 12
<p>Cloud federated authentication.</p>
Full article ">Figure 13
<p>(<b>a</b>) EED (<b>b</b>) Throughput of various scenarios.</p>
Full article ">Figure 14
<p>Comparison of proposed and existing systems.</p>
Full article ">Figure 14 Cont.
<p>Comparison of proposed and existing systems.</p>
Full article ">Figure 15
<p>Proposed system training and validation loss.</p>
Full article ">Figure 16
<p>Proposed system training and validation accuracy.</p>
Full article ">Figure 17
<p>QoE after 88 iterations with <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>20</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 18
<p>QoE after 88 iterations with <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>15</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 19
<p>QoE after 88 iterations with <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 20
<p>Reliability analysis.</p>
Full article ">Figure 21
<p>Overall system stability.</p>
Full article ">Figure 22
<p>Message cost comparisons.</p>
Full article ">
30 pages, 1713 KiB  
Article
Long-Range Wide Area Network Intrusion Detection at the Edge
by Gonçalo Esteves, Filipe Fidalgo, Nuno Cruz and José Simão
IoT 2024, 5(4), 871-900; https://doi.org/10.3390/iot5040040 - 4 Dec 2024
Cited by 1 | Viewed by 1043
Abstract
Internet of Things (IoT) devices are ubiquitous in various applications, such as smart homes, asset and people tracking, and city management systems. However, their deployment in adverse conditions, including unstable internet connectivity and power sources, present new cybersecurity challenges through new attack vectors. [...] Read more.
Internet of Things (IoT) devices are ubiquitous in various applications, such as smart homes, asset and people tracking, and city management systems. However, their deployment in adverse conditions, including unstable internet connectivity and power sources, present new cybersecurity challenges through new attack vectors. The LoRaWAN protocol, with its open and distributed network architecture, has gained prominence as a leading LPWAN solution, presenting novel security challenges. This paper proposes the implementation of machine learning algorithms, specifically the K-Nearest Neighbours (KNN) algorithm, within an Intrusion Detection System (IDS) for LoRaWAN networks. Through behavioural analysis based on previously observed packet patterns, the system can detect potential intrusions that may disrupt critical tracking services. Initial simulated packet classification attained over 90% accuracy. By integrating the Suricata IDS and extending it through a custom toolset, sophisticated rule sets are incorporated to generate confidence metrics to classify packets as either presenting an abnormal or normal behaviour. The current work uses third-party multi-vendor sensor data obtained in the city of Lisbon for training and validating the models. The results show the efficacy of the proposed technique in evaluating received packets, logging relevant parameters in the database, and accurately identifying intrusions or expected device behaviours. We considered two use cases for evaluating our work: one with a more traditional approach where the devices and network are static, and another where we assume that both the devices and the network are mobile; for example, when we need to report data back from sensors on a rail infrastructure to a mobile LoRaWAN gateway onboard a train. Full article
Show Figures

Figure 1

Figure 1
<p>Architecture for IDS in the NS.</p>
Full article ">Figure 2
<p>Architecture for IDS in or near each LoRaWAN gateway.</p>
Full article ">Figure 3
<p>Dataset characteristics.</p>
Full article ">Figure 4
<p>Phik correlation between different variables of the dataset.</p>
Full article ">Figure 5
<p>Functional architecture.</p>
Full article ">Figure 6
<p>Packet classification flowcharts.</p>
Full article ">Figure 7
<p>Schematic of LoRaWAN connection between sensors and the network using an edge computing environment.</p>
Full article ">Figure 8
<p>Characteristics of the packets in the test dataset for the centralized server scenario.</p>
Full article ">Figure 9
<p>Intrusion detection results in the centralized server environment.</p>
Full article ">Figure 10
<p>Locations of the gateway during the edge computing experiment.</p>
Full article ">Figure 11
<p>Characteristics of the packets in the test dataset for the edge computing scenario.</p>
Full article ">Figure 12
<p>Intrusion detection results in the edge computing environment.</p>
Full article ">
9 pages, 2207 KiB  
Proceeding Paper
Embedded Intelligence for Smart Home Using TinyML Approach to Keyword Spotting
by Jyoti Mishra, Timothy Malche and Amit Hirawat
Eng. Proc. 2024, 82(1), 30; https://doi.org/10.3390/ecsa-11-20522 - 26 Nov 2024
Viewed by 404
Abstract
Current research in home automation focuses on integrating emerging technologies like Internet of Things (IoT) and machine learning to create smart home solutions that offer enhanced convenience, efficiency, and security. Benefits include remote control of household devices, optimized energy usage through automated systems, [...] Read more.
Current research in home automation focuses on integrating emerging technologies like Internet of Things (IoT) and machine learning to create smart home solutions that offer enhanced convenience, efficiency, and security. Benefits include remote control of household devices, optimized energy usage through automated systems, and improved user experience with real-time monitoring and alerts. In this study, a TinyML (Tiny Machine Learning)-based keyword spotting machine learning model and system is proposed which enables voice-based home automation. The proposed system allows users to control household devices through voice commands with minimal computational resources and real-time performance. The main objective of this research is to develop the TinyML model for resource-constrained devices. The system enables home systems to efficiently recognize specific keywords or phrases by integrating voice control for enhanced user convenience and accessibility. In this research, the different voice keywords of users of different age groups have been collected in the home environment and trained using machine learning algorithms. An IoT-based system is then developed utilizing the TinyML model to recognize a specific voice command and perform home automation tasks. The model has achieved 98% accuracy with an F1 score of 1.00 and 92% recall. The quantized model uses Latency of 5 ms, 7.9 K of RAM and 43.7 K of flash for keyword classification, which is the best fit for any resource-constrained devices. The proposed system demonstrates the viability of deploying a keyword spotting model for home automation on resource-constrained IoT devices. The research helps in building efficient and user-friendly smart home solutions, enhancing the accessibility and functionality of home automation systems. Full article
Show Figures

Figure 1

Figure 1
<p>Raw data representing ‘close’ keyword.</p>
Full article ">Figure 2
<p>Audio data for 14 classes of keywords.</p>
Full article ">Figure 3
<p>Workflow of KWS.</p>
Full article ">Figure 4
<p>Neural network architecture for KWS.</p>
Full article ">Figure 5
<p>Arduino Nicla Vision.</p>
Full article ">
23 pages, 3210 KiB  
Article
False Data Injection Attacks on Reinforcement Learning-Based Charging Coordination in Smart Grids and a Countermeasure
by Amr A. Elshazly, Islam Elgarhy, Ahmed T. Eltoukhy, Mohamed Mahmoud, William Eberle, Maazen Alsabaan and Tariq Alshawi
Appl. Sci. 2024, 14(23), 10874; https://doi.org/10.3390/app142310874 - 24 Nov 2024
Viewed by 649
Abstract
Reinforcement learning (RL) is proven effective in optimizing home battery charging coordination within smart grids. However, its vulnerability to adversarial behavior poses a significant challenge to the security and fairness of the charging process. In this study, we, first, craft five stealthy false [...] Read more.
Reinforcement learning (RL) is proven effective in optimizing home battery charging coordination within smart grids. However, its vulnerability to adversarial behavior poses a significant challenge to the security and fairness of the charging process. In this study, we, first, craft five stealthy false data injection (FDI) attacks that under-report the state-of-charge (SoC) values to deceive the RL agent into prioritizing their charging requests, and then, we investigate the impact of these attacks on the charging coordination system. Our evaluations demonstrate that attackers can increase their chances of charging compared to honest consumers. As a result, honest consumers experience reduced charging levels for their batteries, leading to a degradation in the system’s performance in terms of fairness, consumer satisfaction, and overall reward. These negative effects become more severe as the amount of power allocated for charging decreases and as the number of attackers in the system increases. Since the total available power for charging is limited, some honest consumers with genuinely low SoC values are not selected, creating a significant disparity in battery charging levels between honest and malicious consumers. To counter this serious threat, we develop a deep learning-based FDI attack detector and evaluated it using a real-world dataset. Our experiments show that our detector can identify malicious consumers with high accuracy and low false alarm rates, effectively protecting the RL-based charging coordination system from FDI attacks and mitigating the negative impacts of these attacks. Full article
(This article belongs to the Special Issue Advanced Applications of Wireless Sensor Network (WSN))
Show Figures

Figure 1

Figure 1
<p>Actual and reported SoC values after applying Attack 1 with <math display="inline"><semantics> <msub> <mi>C</mi> <mrow> <mi>m</mi> <mi>a</mi> <mi>x</mi> </mrow> </msub> </semantics></math> = 6 and 10.</p>
Full article ">Figure 2
<p>SoC values of Consumer 1 (honest) at different times and <math display="inline"><semantics> <msub> <mi>C</mi> <mrow> <mi>m</mi> <mi>a</mi> <mi>x</mi> </mrow> </msub> </semantics></math> of 6 and 10 when the system is under FDI attack #1.</p>
Full article ">Figure 3
<p>SoC of honest consumer #1 and malicious consumer #3 with <math display="inline"><semantics> <msub> <mi>C</mi> <mrow> <mi>m</mi> <mi>a</mi> <mi>x</mi> </mrow> </msub> </semantics></math> of 6 when there are no FDI attacks.</p>
Full article ">Figure 4
<p>Fairness degradation under Attack #1 for two and four malicious consumers. (<b>a</b>) Fairness in power distribution with two malicious consumers under Attack #1. (<b>b</b>) Fairness in power distribution with four malicious consumers under Attack #1.</p>
Full article ">Figure 5
<p>Charging power usage under Attack #1 for two and four malicious consumers. (<b>a</b>) Two malicious consumers. (<b>b</b>) Four malicious consumers.</p>
Full article ">Figure 6
<p>Total reward under Attack #1 for two and four malicious consumers. (<b>a</b>) Total reward with two malicious consumers. (<b>b</b>) Total reward with four malicious consumers.</p>
Full article ">Figure 7
<p>Training and Validation Accuracy and Loss Curves for CNN and CNN-GRU models.</p>
Full article ">Figure 8
<p>ROC Curves for Logistic Regression, CNN, and CNN-GRU models.</p>
Full article ">
24 pages, 1326 KiB  
Article
ZigBeeNet: Decrypted Zigbee IoT Network Traffic Dataset in Smart Home Environment
by Nur Keleşoğlu and Łukasz Sobczak
Appl. Sci. 2024, 14(23), 10844; https://doi.org/10.3390/app142310844 - 23 Nov 2024
Viewed by 941
Abstract
The number of smart homes is increasing steadily. One of the first technologies that comes to mind when talking about smart homes is Zigbee, which stands out for its low cost, low latency, low power consumption, and mesh networking capabilities. One of the [...] Read more.
The number of smart homes is increasing steadily. One of the first technologies that comes to mind when talking about smart homes is Zigbee, which stands out for its low cost, low latency, low power consumption, and mesh networking capabilities. One of the key features of Zigbee is the encryption of payloads within its frames for security purposes. However, being able to decrypt this payload is crucial for fully understanding its operation and for purposes such as testing the network’s security. Therefore, in this paper, we present the decrypted Zigbee IoT Network Traffic dataset, ZigBeeNet. We captured packets using Wireshark in real time from a smart home with 15 Zigbee devices over 20 days and saved them in pcap files. Additionally, we used a key extraction method to obtain the network key, decrypt the payload data, and analyze the characteristic features of network traffic, which we present in this paper. ZigBeeNet will be useful in wider areas than existing datasets with its ability to support network security research, pattern analysis, network performance analysis, and Zigbee traffic generator. We believe that this open-source dataset will contribute significantly to a wide range of industrial and academic research applications. Full article
(This article belongs to the Special Issue AI-Enabled Next-Generation Computing and Its Applications)
Show Figures

Figure 1

Figure 1
<p>Zigbee network topologies.</p>
Full article ">Figure 2
<p>Process flow diagram of the data collection.</p>
Full article ">Figure 3
<p>Plan of the smart-home installation.</p>
Full article ">Figure 4
<p>Example of a corrupted packet capture file in Wireshark.</p>
Full article ">Figure 5
<p>Overview of the dataset in Wireshark.</p>
Full article ">Figure 6
<p>Combined figure: (<b>a</b>–<b>c</b>) illustrate the graph of the number of packets in the dataset per second, per minute, and each 10 min, respectively.</p>
Full article ">Figure 7
<p>Zigbee traffic distribution by device type.</p>
Full article ">Figure 8
<p>Zigbee traffic distribution by network layer type.</p>
Full article ">Figure 9
<p>Comparison of (<b>a</b>) broadcast vs. unicast and (<b>b</b>) broadcast packet distribution by Zigbee layer.</p>
Full article ">Figure 10
<p>Packet transmission by network layer type: (<b>a</b>) overall, (<b>b</b>) Zigbee NWK, (<b>c</b>) Zigbee ZDP, (<b>d</b>) Zigbee HA.</p>
Full article ">Figure 11
<p>Packet type distributed by network layer type: (<b>a</b>) IEEE 802.15.4, (<b>b</b>) Zigbee NWK, (<b>c</b>) Zigbee ZDP, (<b>d</b>) Zigbee HA.</p>
Full article ">Figure 12
<p>Power source distribution of Zigbee traffic: (<b>a</b>) % of packets by source power and (<b>b</b>) average number of packets per device.</p>
Full article ">Figure 13
<p>Distribution of traffic for battery-powered devices.</p>
Full article ">
Back to TopTop