Please enter verification code
Confirm
Research on Security Evaluation Indicator System of Smart Home
American Journal of Networks and Communications
Volume 9, Issue 1, June 2020, Pages: 11-16
Received: Nov. 26, 2020; Published: Nov. 27, 2020
Views 82      Downloads 33
Authors
Yan Changshun, Faculty of Information Technology, Beijing University of Technology, Beijing, China
Shao Yong, Faculty of Information Technology, Beijing University of Technology, Beijing, China
Article Tools
Follow on us
Abstract
Nowadays, smart home technology is still in continuous development; more and more enterprises and organizations began to enter this industry. However, the security problems and the unknown of emerging technologies make that most people are still in the wait-and-see stage for smart home systems. Under the background that many enterprises have different opinions on the security of smart home systems, this study is committed to forming a set of general evaluation standard index system. The main research work of this paper: the influencing factors of smart home system security are analyzed; according to the characteristics of smart home system equipment, the system security is divided into four aspects: control system, communication technology, intelligent products and cloud services; based on the current national standards, combined with the safety standards of various organizations, safety indicators are selected for each aspect. Finally, the established smart home system security evaluation index system enables users to have a set of relatively general evaluation methods among many different standards to compare and consider the current smart home system with various brands. It is helpful for users to try or further understand the smart home industry to promote the development and progress of the smart home industry.
Keywords
Smart Home, Security Evaluation, Indicator System
To cite this article
Yan Changshun, Shao Yong, Research on Security Evaluation Indicator System of Smart Home, American Journal of Networks and Communications. Vol. 9, No. 1, 2020, pp. 11-16. doi: 10.11648/j.ajnc.20200901.12
References
[1]
Wei Liu, Wei Li, Yao-chen Hu, Analysis of the standard protocol requirements of home Internet of things. Technology Innovation and Application, Vol 23, 2018, pp.74-75.
[2]
Pei Zhao, Peng Tao, Chong Li, Lin-qing Liu, Meng-yu Li, Research and interpretation of Internet of things information security technology standards. Hebei electric poewer, Vol 38, 2019, pp.1-3.
[3]
Hai-yan Li, The status quo of smart city standardization in China and its challenges and Countermeasures. China Standardization, Vol 6, 2019, pp.193-197.
[4]
Yong-shu Xiao, Construction and development analysis of smart home standardization system. Technology Innovation and Application, Vol 15, 2018, pp.40-42.
[5]
Yan Zhang, Practical application of enterprise standard information public service platform. Machinery Industry Standardization & Quality, Vol 15, 2018, pp.40-42.
[6]
Rong-hua Ri, Yang, Yue Zhao, Intelligent transportation system based on ZigBee. Internet of Things Technologies, Vol 10, 2019, pp.107-109.
[7]
Ping Yang, Yang-yang Peng, Chao Hu, Intelligent classroom system design based on IPv6 and: Z-Wave intelligent gateway. Computing Technology and Automation, Vol 38, 2019, pp.96-101.
[8]
Jia-hong Liu, Bao-Lu li, Lan Yang, Shuo-bing Qiu, Yue Li, GPS / Wi Fi Indoor and Outdoor Fusion Positioning Method Based on Grey Prediction Model. Computer Engineering, Vol 45, 2019, pp.264-269.
[9]
Xiang Shen, Design of Internet of things gateway based on hardware TCP / IP protocol. Internet of Things Technologies, Vol 10, 2019, pp.35-37.
[10]
Hua Chen, Jin-xin Xie, Li-huang Chen, CNN-based Encrypted C & C Communication Traffic Identification Method. Computer Engineering, Vol 45, 2018, pp.31-34.
[11]
Yun-long Miao, Yan-hui Lu, Feng Yin, Shou-yi Yang, Research on Wi-Fi indoor location algorithm based on MD5-KNN. Computer Applied Research, Vol 36, 2018, pp.2746-2749.
[12]
Jun Ma, Hui Huang, Chuan-fu Xia, Li-li Zhang, Beidou terminal access authentication negotiation protocol based on identity authentication and SM2 algorithm. Electronic Design Engineering, Vol 28, 2020, pp.67-70.
[13]
Zhu Yuan, Ping Xie, Sheng-ling Geng, Summary of Research for RAID System Scaling Schemes. Acta Electronica Sinica, Vol 47, 2019, pp.2420-2431.
[14]
Ka Feng, Research on Big Data Platform Risk Monitoring System Based on Hadoop, Vol 39, 2020, pp.135-138.
[15]
Guo-dong Jin, Hao-qiong Bian, Yue-guo Chen, X iao-yong Du, Survey on Storage and Optimization Techniques of HDFS. Journal of Software, Vol 31, 2020, pp.137-161.
[16]
Song Yang, Hongshan Liu, Yan Cheng, Overview of design and implementation of cloud computing security system. Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition), Vol 32, 2020, pp.816-824.
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186