Refine your search
Collections
Co-Authors
Journals
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Memon, Pirah
- Keyless Smart Home:An Application of Home Security and Automation
Abstract Views :211 |
PDF Views:0
Authors
Affiliations
1 Department of Software Engineering, MUET, Jamshoro, PK
2 Institute of Information Technology, University of Sindh Hyderabad, PK
3 Department of Software Engineering, MUET, Jamshoro
1 Department of Software Engineering, MUET, Jamshoro, PK
2 Institute of Information Technology, University of Sindh Hyderabad, PK
3 Department of Software Engineering, MUET, Jamshoro
Source
Oriental Journal of Computer Science and Technology, Vol 11, No 2 (2018), Pagination: 107-114Abstract
The rapid and revolutionary advancement in technology has increased the demand for advanced ubiquitous mobile applications in our daily lives. Home automation system uses collective smart technology to elevate sphere of security and human living standards. Wireless Smart home systems have been prototyped by researchers to realize different applications in vast contexts. In this paper we propose a keyless smart home security system which uses Bluetooth as a communication protocol to automate door locks based on a security code and predefined user credentials. The system combines Android phone as a signal sender to dispatch the input signal from an end users side, Bluetooth communication module as signal receiver, ARDUINO microcontroller as CPU and servo motor and light emitting diodes as an output. The system integrates two modules: one of which is Arduino microcontroller which is responsible for authentication and verification of security code and allows servo motor to process the output according to the received input. The second is android Application which provides an interface to the user to set credentials and security code which is then transmitted to the Arduino microcontroller via Bluetooth technology. Since Arduino and Android are open source, hence implementation rate of the proposed system is inexpensive and feasible.Keywords
Home Security, Home Automation, Keyless Home , Door, Android, Bluetooth.References
- Gartner homepage, available, https://www.gartner.com/technology/home.jsp
- The institute blog [online], available http://theinstitute.ieee.org/ieee-roundup/blogs/blog/is-it-smart-to-have-a-smart-home
- Collotta, Mario, et al., "Bluetooth 5: a concrete step forward towards the IoT." arXiv preprint arXiv:1711.00257 (2017).
- Chang, Ting-Yi, Min-Shiang Hwang, and Chou-Chen Yang. "Password Authenticated Key Exchange and Protected Password Change Protocols." Symmetry 9.8 (2017): 134.
- Verma, Gyanendra K., and Pawan Tripathi. "A digital security system with door lock system using RFID technology." International Journal of Computer Applications (IJCA)(0975–8887) 5.11 (2010).
- Kartika Wong, Felix Hoi Chak Satya, Uriel Jethro "Smartphone–Controlled Fingerprint–Enabled Door Lock System.", Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology, Final Year Project Report, April 15, 2015.
- Shankar, A. Aditya, et al. "Finger Print Based Door Locking System." International Journal of Engineering and Computer Science 4.3 (2015): 10810-10814.
- Anu, and Dinesh Bhatia. "A smart door access system using finger print biometric system." International Journal of Medical Engineering and Informatics 2 6.3 (2014): 274-280.
- Kamelia, Lia, et al.,"DoorAutomation System Using Bluetooth-BasedAndroid For Mobile Phone." ARPN Journal of Engineering and Applied Sciences 9.10 (2014): 1759-1762.
- Sadeque Reza Khan, Farzana Sultana Dristy, “Android based security and home automation system”, International Journal of Ambient Systems and Applications (IJASA), Vol. 3, No. 1, pp. 15-24, March 2015.
- Jain, Ankit, Anita Shukla, and Ritu Rajan. "Password Protected Home Automation System with Automatic Door Lock.", MIT International Journal of Electrical and Instrumentation Engineering, Vol.6, No. 1, January 2016, pp. 28-31.
- ElShafee, Ahmed, and Karim Alaa Hamed. "Design and implementation of a WIFI based home automation system." World academy of science, engineering and technology 68 (2012): 2177-2180.
- Kamelia, Lia, et al., "DoorAutomation System Using Bluetooth-BasedAndroid For Mobile Phone." ARPN Journal of Engineering and Applied Sciences 9.10 (2014): 1759-1762.
- Khan, Sadeque Reza, and Farzana Sultana Dristy. "Android based security and home automation system." arXiv preprint arXiv:1504.03564 (2015).
- Eclipse [online], available at: https://eclipse.org/ide/
- Mutti, Simone, Enrico Bacis, and Stefano Paraboschi. "Sesqlite: Security enhanced sqlite: Mandatory access control for android databases." Proceedings of the 31st Annual Computer Security Applications Conference. ACM, 2015.
- Arduino Software (IDE) [online], available at: https://www.arduino.cc/en/Guide/Environment.
- Y. T. Park, P. Sthapit, and J.-Y. Pyun, "Smart digital door lock for the home automation," in TENCON 2009-2009 IEEE Region 10 Conference, 2009, pp. 1-6: IEEE.
- N. Sriskanthan and Tan Karand. “Bluetooth Based Home Automation System”. Journal of Microprocessors and Microsystems, Vol. 26, pp.281-289, 2002.
- D. Javale, M. Mohsin, S. Nandanwar, and M. Shingate, "Home automation and security system using Android ADK," International journal of electronics communication and computer technology (IJECCT), vol. 3, no. 2, pp. 382-385, 2013.
- Formal Validation of Erratic Delegation of Roles With UML And OCL
Abstract Views :196 |
PDF Views:0
Authors
Affiliations
1 Department of Software Engineering, Mehran University of Engineering and Technology, Jamshoro, Sindh – 76062, PK
1 Department of Software Engineering, Mehran University of Engineering and Technology, Jamshoro, Sindh – 76062, PK
Source
Indian Journal of Science and Technology, Vol 11, No 31 (2018), Pagination: 1-10Abstract
Objective: In emergency situations, when the responsible users for a task in the organization are not available or inadequate, the task should be delegated to eligible candidates satisfactorily. Method: In this paper, we proposed a mechanism for the specification and validation of constraints which can be applied during erratic delegation of roles. We have used Object Constraint Language (OCL) for specification of constraints. Here, UML Specification Environment (USE) tool is employed for the validation of the constraints that will be verified before and after the role delegation of the appropriate users. Findings: Focusing on the present condition of every single organization, there are a number of employees from all over the world who face many problems when distinct tasks are assigned to them. The entire scenario becomes more confused when a simple task is transferred to a user for the delegation, whose conditions need to be explicitly defined. Our delegation model helps to solve this. The results of the proposed delegation mechanism are promising since it is ensured that delegation occurs only when the pre and post conditions are satisfied. The user, who is being granted the role during an emergency, enjoys the same authority as being enjoyed by the actual user. The proposed model can be employed in a variety of situations for role/job delegation, when the organization requires a proper delegation mechanism for job assignment. Novelty/Improvements: In this paper, a validation mechanism has been proposed for the delegation of job roles to and from users with certain conditions and its validation has been carried. Here delegation process is being implemented over two different organizations and results are conferred.References
- Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security (TISSEC). 2001; 4(3):224–74. https://doi.org/10.1145/501978.501980.
- Zhang L, Ahn GJ, Chu BT. A rule-based framework for role-based delegation and revocation. ACM Transactions on Information and System Security (TISSEC). 2003; 6(3):404–41. https://doi.org/10.1145/937527.937530.
- Nguyen TA, Su L, Inman G, Chadwick D. Flexible and manageable delegation of authority in RBAC. Advanced Information Networking and Applications Workshops, AINAW'07. 21st International Conference. 2007; 2:453–8. https://doi.org/10.1109/AINAW.2007.187.
- Qiu W. Exploring user-to-role delegation in role-based access control. Eighth World Congress on the Management of eBusiness (WCMeB); 2007. p. 1–21. https://doi.org/10.1109/WCMEB.2007.47.
- Memon MA, Hashmani M, Sohr K. Validation of temporary delegation and revocation of roles with uml and ocl. International Journal of Computer Theory and Engineering. 2010; 2(1):1–6. https://doi.org/10.7763/IJCTE.2010.V2.107.
- Warmer JB, Kleppe AG. The object constraint language: getting your models ready for MDA. Addison-Wesley Professional. Computer; 2003. p. 1–206.
- The USE tool: A UML-based specification environment [Internet]. [cited 2018 Jul 09]. Available from: https://sourceforge.net/projects/useocl/.
- Sohr K, Drouineaud M, Ahn GJ, Gogolla M. Analyzing and managing role-based access control policies. IEEE Transactions on Knowledge and Data Engineering. 2008; 20(7):924–39. https://doi.org/10.1109/TKDE.2008.28.
- Zhang X, Oh S, Sandhu R. PBDM: a flexible delegation model in RBAC. Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies; 2003. p. 149–57. https://doi.org/10.1145/775412.775431.
- Wainer J, Kumar A. A fine-grained, controllable, user-to-user delegation method in RBAC. Proceedings of the tenth ACM symposium on Access control models and technologies; 2005. p. 59–66. https://doi.org/10.1145/1063979.1063991.
- Barka E, Sandhu R. Framework for role-based delegation models. Computer Security Applications. ACSAC'00. 16th Annual Conference; 2000. p. 168–76. https://doi.org/10.1109/ACSAC.2000.898870.