Abstract
Smart home design has undergone a metamorphosis in recent years. The field has evolved from designing theoretical smart home frameworks and performing scripted tasks in laboratories. Instead, we now find robust smart home technologies that are commonly used by large segments of the population in a variety of settings. Recent smart home applications are focused on activity recognition, health monitoring, and automation. In this paper, we take a look at another important role for smart homes: security. We first explore the numerous ways smart homes can and do provide protection for their residents. Next, we provide a comparative analysis of the alternative tools and research that has been developed for this purpose. We investigate not only existing commercial products that have been introduced but also discuss the numerous research that has been focused on detecting and identifying potential threats. Finally, we close with open challenges and ideas for future research that will keep individuals secure and healthy while in their own homes.







Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Weiser M (1991) The computer for the twenty-first century. Sci Am 165:94–104
Wilson C, Hargreaves T, Hauxwell-Baldwin R (2015) Smart homes and their users: a systematic analysis and key challenges. Pers Ubiquit Comput 19(2):463–476
Alam MR, Reaz MBI, Ali MAM (2012) A review of smart homes–past, present, and future. IEEE Trans Syst Man Cybern Part C 42(6):1190–1203
Jones T (2012) Artificial intelligence coming to a home near you. In: Digital construction (2012). (Online). http://www.constructiondigital.com/innovations/artificial-intelligence-coming-to-a-home-near-you
Cohen, T.: I’m afraid I can’t let you do that, Dave’: Scientists predict ‘smart’ homes controlled by computer will be a reality in 10 years. Mail Online (2012). (Online). http://www.dailymail.co.uk/sciencetech/article-2122343/Scientists-predict-smart-homes-controlled-reality-10-years.html
Abowd G, Mynatt ED (2005) Designing for the human experience in smart environments. In: Smart environments: technologies, protocols and applications, pp 153–174
Hagras H, Doctor F, Lopez A, Callaghan V (2007) An incremental adaptive life long learning approach for type-2 fuzzy embedded agents in ambient intelligent environments. IEEE Trans Fuzzy Syst 15(1):41–55
Intille S, Larson K, Munguia-Tapia E, Beaudin J, Kaushik P, Nawyn J, Rockinson R (2006) Using a live-in laboratory for ubiquitous computing research. In: Pervasive, pp 349–365
Helal A, Mann W, Elzabadani H, King J, Kaddourah Y, Jansen E, El-Zabadani H, Kaddoura Y (2005) The gator tech smart house: a programmable pervasive space. IEEE Comput 38(3):50–60
Mozer MC (2004) Lessons from an adaptive home. In: Cook DJ, Das SK (eds) Smart environments: technology, protocols, and applications. Wiley, New York, pp 273–298
Cook DJ, Youngblood M, Heierman E, Gopalratnam K, Rao S, Litvin A, Khawaja F (2003) MavHome: an agent-based smart home. In: Pervasive computing, pp 521–524
Cook DJ, Crandall A, Thomas B, Krishnan N (2012) CASAS: a smart home in a box. IEEE Comput 46(7):62–69
Philips D (2003) 365 days’ ambient intelligence research in HomeLab
Intille S, Nawyn J, Logan B, Abowd G (2009) Developing shared home behavior datsets to advance HCI and ubiquitous computing research. In: International conference on human factors in computing systems extended abstracts, pp 4763–4766
ASU (2012) Sensor activity prediction in smart homes
Boxlab (2017) List of home datasets \(2012\). (Online). https://boxlab.wikispaces.com/List+of+Home+Datasets
De la Torre F, Hodgins J, Montano J, Valcarcel S, Macey J (2009) Guide to the Carnegie Mellon University multimodal activity (CMU-MMAC) database
Kim E, Helal S, Lee J, Hossain S (2011) The making of a dataset for smart spaces. In: International conference on ubiquitous intelligence and computing
Malik J, Petrov S, Berg A, Petrox S (2012) Action recognition datasets (Online). http://www.eecs.berkeley.edu/Research/Projects/CS/vision/action/
Wren C, Ivanov Y, Leigh D, Westhues J (2007) The MERL motion detector dataset. In: Workshop on massive datasets, pp 10–14
Bulling A, Blanke U, Schiele B (2014) A tutorial on human activity recognition using body-worn inertial sensors. ACM Comput Surv 46(3):107–140
CASAS (2016) WSU CASAS Datasets (Online). http://ailab.wsu.edu/casas/datasets/
University of Florida (2016) Ambient intelligence dataset. http://www.cise.ufl.edu/~prashidi/Datasets/ambientIntelligence.html
Samsung SmartThings (2016) Stay connected to your home and family (Online). https://www.smartthings.com/
Honeywell (2016) Your connected home (Online). http://homesecurity.honeywell.com/home_automation.html
Google (2016) Get to know google home (Online). https://madeby.google.com/home/
Chen L, Hoey J, Nugent CD, Cook DJ, Yu Z (2012) Sensor-based activity recognition. IEEE Trans Syst Man Cybern Part C Appl Rev 42(6):790–808
Krishnan N, Cook DJ (2014) Activity recognition on streaming sensor data. Pervas Mob Comput 10:138–154
Cook DJ, Krishnan N (2015) Activity learning: discovering, recognizing, and predicting human behavior from sensor data. Wiley, New York
Aggarwal JK, Ryoo MS (2011) Human activity analysis: a review. ACM Comput Surv 43(3):1–47
Chen L, Khalil I (2011) Activity recognition: approaches, practices and trends. In: Chen L, Nugent CD, Biswas J, Hoey J (eds) Activity recognition in pervasive intelligent environments. Atlantis ambient and pervasive intelligence, pp 1–31
Tuaraga P, Chellappa R, Subrahmanian VS, Udrea O, Turaga P (2008) Machine recognition of human activities: a survey. IEEE Trans Circ Syst Video Technol 18(11):1473–1488
Liao IL, Fox D, Kautz H (2005) Location-based activity recognition using relational Markov networks. In: International joint conference on artificial intelligence, pp 773–778
Munguia-Tapia E, Intille SS, Larson K (2004) Activity recognition in the home using simple and ubiquitous sensors. In: Pervasive, pp 158–175
Fang H, Hu C (2014) Recognizing human activity in smart home using deep learning algorithm. In: Chinese control conference, pp 4716–4720
Roy P, Giroux S, Bouchard B, Bouzouane A, Phua C, Tolstikov A, Biswas J (2011) A possibilistic approach for activity recognition in smart homes for cognitive assistance to Alzheimer’s patients. Atl Ambient Pervasive Intell 4:33–58
Fleury A, Noury N, Vacher M (2009) Supervised classification of activities of daily living in health smart homes using SVM. In: Proceedings of the international conference of the IEEE engineering in medicine and biology society, pp 6099–6102
Dawadi P, Cook DJ, Schmitter-Edgecombe M (2016) Automated clinical assessment from smart home-based behavior data. IEEE J Biomed Heal Inf
Cook DJ, Dawadi P, Schmitter-Edgecombe M (2015) Analyzing activity behavior and movement in a naturalistic environment using smart home techniques. IEEE J Biomed Heal Inf 19(6):1882–1892
Morris ME, Adair B, Miller O, Hansen R, Pearce A, Santamaria N, Viegas L, Long M, Said C (2013) Smart home technologies to assist older people to live well at home. J Aging Sci 1:1–9
Walsh L, Kealy A, Loane J, Doyle J (2014) Inferring health metrics from ambient smart home data. IEEE Int Conf Bioinforma, Biomed
Hoey J, Monk A, Mihailidis A (2012) People, sensors, decisions: customizable and adaptive technologies for assistance in healthcare. ACM Trans Interact Intell Syst 2(4)
Deleawe S, Kusznir J, Lamb B, Cook DJ (2010) Predicting air quality in smart environments. J Ambient Intell Smart Environ 2(2):145–154
Riche Y, Dodge J, Metoyer R (2010) Studying always-on electricity feedback in the home. In: International conference on human factors in computing systems, pp 1995–1998
Dinata IBPP, Hardian B (2014) Predicting smart home lighting behavior from sensors and user input using very fast decision tree with Kernel Density Estimation and improved Laplace correction. In: International conference on advanced computer science and information systems, pp 171–175
Fensel A, Tomic S, Kumar V, Stefanovic M, Aleshin SV, Novikov DO (2013) SESAME-S: Semantic smart home system for energy efficiency. Informatik-Spektrum 36(1):46–57
Gupta S, Reynolds MS, Patel SN (2010) ElectriSense: single-point sensing using EMI for electrical event detection and classification in the home. In: ACM international conference on ubiquitous computing, pp 139–148
Scott J, Brush AJB, Krumm J, Meyers B, Hazas M, Hodges S, Villar N (2011) PreHeat: controlling home heating using occupancy prediction. In: International conference on ubiquitous computing, pp 281–290
Bureau of Labor Statistics (2016) American time use survey ((Online)). http://www.bls.gov/tus/
Skubic M, Harris BH, Stone E, Ho KC, Su BY, Rantz M (2016) Testing non-wearable fall detection methods in the homes of older adults. In: IEEE international conference of the engineering in medicine and biology society, pp 557–560
Mubashir M, Shao L, Seed L (2013) A survey on fall detection: Principles and approaches. Neurocomputing 100:144–152
Noury N, Herve T, Rialle V, Virone G, Mercier E, Morey G, Moro A, Porcheron T (2000) Monitoring behavior in home using a smart fall sensor and position sensors. In: International conference on microtechnologies in medicine and bioloy, pp 607–610
Sprint G, Cook DJ (2016) Unsupervised detection and analysis of changes in everyday physical activity data. J Biomed Inform
Sprint G, Cook DJ, Fritz R, Schmitter-Edgecombe M (2016) Using smart homes to detect and analyze health events. IEEE Comput
Demiris G, Hensel BK (2010) Technologies for an aging society: a systematic review of ‘smart home’ applications. IMIA Yearb Med Inf 47(1):33–40
Guillet S, Bouchard B, Bousouane A (2013) Correct by construction security approach to design fault tolerant smart homes for dsabled people. In: International conference on emerging ubiquitous systems and pervasive, pp 257–264
Pardo E, Espes D, Le-Parc P (2016) A framework for anomaly diagnosis in smart homes based on ontology. In: International conference on ambient systems, networks and technologies, pp 545–552
Komninos N, Philippou E, Pitsillides A (2014) Survey in smart grid and smart home security: Issues, challenges, and countermeasures. IEEE Commun Surv Tutor 16(4):1933–1954
Storm D (2015) Of 10 IoT-connected home security systems tested. 100% are full of security FAIL. computerworld.com
Hill K (2013) When ‘smart homes’ get hacked: i haunted a complete stranger’s house via the internet. Forbes (Online). http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/
Brown E (2016) Who needs the internet of things? linux.com
Ring (2016) Never miss a visitor. With ring, you’re always home (Online). https://ring.com/
Icontrol Networks (2016) Home security (Online). https://getpiper.com/howitworks/
SmartThings (2016) Discovery ways to use smartThings for monitoring and security (Online). https://www.smartthings.com/uses/monitoring-security
Zhuang X, Huang J, Potamianos G, Hasegawa-Johnson M (2009) Acoustic fall detection using Gaussian mixture models and GMM supervectors. In: IEEE international conference on acoustics, speech, and signal processing, pp 69–72
Moncrieff S, Venkatesh S, West G, Greenhill S (2007) Multi-modal emotive computing in a smart house environment. Pervas Mob Comput 3(2):79–94
Jain AK, Nandakumar K (2012) Biometric authentication: system security and user privacy. IEEE Comput 45(11):87–92
euronews (2016) Smarter home security camera recognises intrduers says maker (Online). http://www.euronews.com/2016/08/03/smarter-home-security-camera-recognises-intruders-says-maker
Andersson V, Dutra R, and R. Araujo, “Anthropometric and human gait identification using skeleton data from Kinect sensor. In: ACM Symp Appl Comput, 60–61
Helal A, Mann W, Elzabadani H, King J, Kaddourah Y, Jansen E (2005) Gator tech smart house: a programmable pervasive space. IEEE Comput Mag 64–74
Jenkins J, Ellis C (2007) Using ground reaction forces from gait analysis: body mass as a weak biometric. In: Pervasive computing, pp 251–267
Watanabe K, Kurihara Y, Tanaka H (2009) Ubiquitous health monitoring at home–sensing of human biosignals on flooring, on tatami mat, in the bathtub, and in the lavatory. IEEE Sens J 9(12):1847–1855
Matsushita N, Tajima S, Ayatsuka Y, Rekimoto J (2000) Wearable key: device for personalizing nearby environment. In: International symposium on wearable computers, pp 119–126
Venkatesh A (2008) Digital home technologies and transformation of households. Inf Syst Front 10(4):391–395
Crandall A, Cook DJ (2013) Behaviometrics for multiple residents in a smart environment. In: Human aspects in ambient intelligence, pp 55–71
Teoh C, Tan C (2010) A neural network approach towards reinforcing smart home security. In: Asia-pacific symposium on information and telecommunication technologies
Chitnis S, Deshpande N, Shalgram A (2016) An investigative study for smart home security: Issues, challenges and countermeasures. Wireless Sens Netw 8:61–68
Chitnis S, Deshpande N, Shaligram A (2016) An investigative study for smart home security: Issues, challenges and countermeasures. Wirel Sens Netw 8:61–68
Petersen J, Austin D, Kaye JA, Pavel M, Hayes TL (2014) Unobtrusive in-home detection of time spent out-of-home with applications to loneliness and physical activity. IEEE J Biomed Heal Inf 18(5):1590–1596
Dodge HH, Mattek NC, Austin D, Hayes TL, Kaye JA (2012) In-home walking speeds and variability trajectories associated with mild cognitive impairment. Neurology 78(24):1946–1952
Hodges M, Kirsch N, Newman M, Pollack M (2010) Automatic assessment of cognitive impairment through electronic observation of object usage. In: International conference on pervasive computing, pp 192–209
Dawadi P, Cook D, Schmitter-Edgecombe M (2015) Modeling patterns of activities using activity curves. Pervasive Mob Comput
Lotfi A, Mahmoud LCSM, Akhlaghinia MJ (2012) Smart homes for the elderly dementia sufferers: identification and prediction of abnormal behavior. J Ambient Intell Humaniz Comput 3:205–218
Ali H, Amalarethinam DG (2014) Detecting abnormality in activites performed by people with dementia in smart environment. Int J Comput Sci Inf Technol 5:2453–2457
Das B, Cook DJ, Krishnan N, Schmitter-Edgecombe M (2016) One-class classification-based real-time activity error detection in smart homes. IEEE J Sel Top Signal Process
Marson D, Hebert K (2006) Functional assessment. In: Geriatric neuropsychology assessment and intervention, pp 158–189
Desai A, Grossberg G, Sheth D (2004) Activities of daily living in patients with dementia: Clinical relevance, methods of assessment and effects of treatment. CNS Drugs 18:853–875
Sonn U, Grimbyand G, Svanborg A (1996) Activities of daily living studied longitudinally between 70 and 76 years of age. Disabil Rehabil 18:91–100
Zimmerman S, Magaziner J (1995) Methodological issues in measuring the functional status of cognitively impaired nursing home residents: the use of proxies and performance-based measures. Alzheimer Dis Assoc Disord 8:S281–S290
Barberger-Gateau P, Dartigues J, Letenneur L (1993) Four instrumental activities of daily living score as a predictor of one-year incident dementia. Age Ageing 22:457–463
Peres K, Chrysostome V, Fabrigoule C, Orgogozo J, Dartigues J, Barberger-Gateau P (2006) Restriction in complex activities of daily living in MCI. Neurology 67:461–466
Nourhashemi F, Andrieu S, Gillette-Guyonnet S, Vellas B, Albarede J, Grandjean H (2001) Instrumental activities of daily living as a potential marker of frailty: a study of 7364 community-dwelling elderly women (the EPIDOS study). J Gerontechnol 56A:M448–M453
Cuddihy P, Weisenberg J, Graichen C, Ganesh M (2007) Algorithm to automatically detect abnormally long periods of inactivity in a home. In: ACM SIGMOBILE international workshop on systems and networking support for healthcare and assisted living environments, pp 89–94
Stone E, Skubic M (2015) Fall detection in homes of older adults using the Microsoft Kinect. IEEE J Biomed Heal Informatics 19(1):290–301
Lord SR, Sherrington C, Menz HB (2001) Falls in older people: risk factors and strategies for prevention. England, Cambridge
Bourke AK, Klenk J, Schwickert L, Aminian K, Ihlen EAF, Mellone S, Helbostad JL, Chiari L, Becker C (2016) Fall detection algorithms for real-world falls harvested from lumbar sensors in the elderly population: a machine learning approach. In: IEEE annual international conference of the engineering in medicine and biology society, pp 1–6
Li Y, Zeng L, Popescu M, Ho KC (2010) Acoustic fall detection using a circular microphone array. In: IEEE annual international conference of the engineering in medicine and biology society, pp 2242–2245
Rougier C, Meunier J, St-Arnaud A, Rousseau J (2011) Robust video surveillance for fall detection based on human shape deformation. IEEE Trans Circ Syst Video Technol 21(5):611–622
Alwan M, Rajendran PJ, Kell S, Mack D, Dalal S, Wolfe M, Felder R (2006) A smart and passive floor-vibration based fall detector for elderly. In: IEEE international conference on information and communication technology, pp 1003–1007
Aicha AN, Englebienne G, Krose B (2014) Modeling visit behaviour in smart homes using unsupervised learning. In: ACM conference on ubiquitous computing, pp 1193–1200
Petersen J, Larimer N, Kaye JA, Pavel M, Hayes TL (2012) SVM to detect the presence of visitors in a smart home environment. In: International conference of the IEEE engineering in medicine and biology society, pp 5850–5853
Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41:1–15
Youngblood GM, Cook DJ (2007) Data mining for hierarchical model creation. IEEE Trans Syst Man Cybern Part C 37(4):1–12
Ordonez F, de Toldeo P, Sanchis A (2015) Sensor-based Bayesian detection of anomalous living patterns in a home setting. Pers Ubiquitous Comput 19:259–270
Haque S, Rahman M, Aziz A (2015) Sensor anomaly detection in wireless sensor networks for healthcare. Sensors 15:8764–8786
Aran O, Sanchez-Cortes D, Do MT, Gatica-Perez D (2016) Anomaly detection in elderly daily behavior in ambient sensing environments. In: Human behavior understanding, pp 51–67
Novak M (2013) Anomaly detection in user daily patterns in smart-home environment. J Sel Areas Heal Inf 3:1–11
Virone G (2009) Assesing everday life behavioral rythms for the older generation. Pervas Mob Comput 5:606–622
Barger T, Brown D, Alwan M (2005) Health status monitoring through analysis of behavioral patterns. IEEE Trans Syst Man Cybern Part A 35(1):22–27
Ke S-R, Thuc HLU, Lee Y-J, Hwang J-N, Yoo J-H, Choi K-H (2013) A review on video-based human activity recognition. Computers 2(2):88–131
Han Y, Han M, Lee S, Sarkar AMJ, Lee Y-K (2012) A framework for supervising lifestyle diseases using long-term activity monitoring. Sensors 12:5363–5379
Williams J, Cook D (2016) Forecasting behavior in smart homes based on past sleep and wake patterns. Technol Heal Care
Mocanu E, Florea AM (2011) A model for activity recognition and emergency detection in smart environments. In: International conference on ambient computing, applications, services and technologies, pp 13–19
Cardinaux F, Brownsell S, Hawley M, Bradley D (2008) Modelling of behavioural patterns for abnormality detection in the context of lifestyle reassurance. Prog Pattern Recognit Image Anal Appl 5197:243–251
Elbert D, Storf H, Eisenbarth M, Unalan O, Schmitt M (2011) An approach for detecting deviations in daily routine for long-term behavior analysis. In: In pervasive health, pp 426–433
Mori T, Fujii A, Shimosaka M, Noguchi H, Sato T (2007) Typical behavior patterns extraction and anomaly detection algorithm based on accumulated home sensor data. In: Conference on future generation communication and networking
Hoque E, Dickerson R, Preum S, Hanson M, Barth A, Stankovic J (2015) Holmes: a comprehensive anomaly detection system for daily in-home activities. In: International conference on distributed computing in sensor systems, pp 40–51
Hoque E, Stankovic J (2012) Semantic anomaly detection in daily activities integrate expert rules for acceptable anomalies. In: ACM international joint conference on pervasive and ubiquitous computing, pp 633–634
Okeyo G, Chen L, Wang H, Sterritt R (2014) Dynamic sensor data segmentation for real-time knowledge-driven activity recognition. Pervas Mob Comput 10:155–172
Tong Y, Chen R, Gao J (2015) Hidden state conditional random field for abnormal activity recogniton in smart homes. Entropy 17:1358–1378
Dredze M, Crammer K (2008) Active learning with confidence. In: Proceedings of ACL, pp 233–236
Joshi AJ, Porikli F, Papanikolopoulos N (2009) Multi-class active learning for image classification. In: IEEE conference on computer vision and pattern recognition
Freund Y, Schapire RE (1996) Experiments with a new boosting algorithm. In: International conference on machine learning, pp 148–156
Krempl G, Kottke D, Lemaire V (2015) Optimised probabilistic active learning (OPAL) for fast, non-myopic, cost-sensitive active classification. Mach Learn 100(2):449–476
Lazarevic A, Srivastava J, Kumar V (2004) Data mining for analysis of rare events: a case study in security, financial and medical applications. In: Pacific-asia conference on knowledge discovery and data mining
Harrison D, Seah W, Rayudu R (2016) Rare event detection and propagation in wireless sensor networks. ACM Comput Surv 48:58
Pelleg D, Moore AW (2004) Active learning for anomaly and rare-category detection. In: Advances in neural information processing systems, pp 1073–1080
Koh S, Ravana SD (2016) Unsupervised rare pattern mining: a survey. ACM Trans Knowl Discov Data 10(4):45
Aminikhanghahi S, Cook DJ (2016) A survey of methods for time series change point detection. Knowl Inf Syst 1–29
Akoglu L, Tong H, Koutra D (2015) Graph based anomaly detection and description: a survey. Data Min Knowl Discov 29(3):626–688
Noble C, Cook DJ (2003) Graph-based anomaly detection. In: Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining
Eberle W, Holder L, Massengill B (2012) Graph-based anomaly detection applied to homeland security cargo screening. In: Florida artificial intelligence research society conference
Rayana S, Akoglu L (2016) Less is more: Building selective anomaly ensembles. ACM Trans Knowl Discov Data 10(4):42
Eberle W, Holder L (2015) Scalable anomaly detection in graphs. Intell Data Anal 19:57–74
Cook D, Holder L, Thompson S, Whitney P, Chilton L (2009) Graph-based analysis of nuclear smuggling data. J Appl Secur Res 4(4):501–517
Chakrabarti D, Zhan Y, Blandford D, Faloutsos C, Blelloch G (2004) “NetMine: new mining tools for large graphs. In: SIAM workshop on link analysis, counter-terrorism and privacy
Efron B, Tibshirani RJ (1994) An introduction to the bootstrap. CRC Press, New York
Fernandes E, Jung J, Prakash A (2016) Security analysis of emerging smart home applications. In: IEEE symposium on security and privacy, pp 636–654
Lee A (2013) Hacking the connected home: when your house watches you. Readwrite (Online). http://readwrite.com/2013/11/13/hacking-the-connected-home-when-your-house-watches-you&awesm=~osmDA6o9bkgx84
Clemons T (2016) Wake up call: mom learns daughters’ bedroom webcam was hacked
O’Flynn C (2016) A lightbulb worm?
Rose A, Ramsey B (2016) Picking bluetooth low energy locks from a quarter mile away. DefCon
Wang P, Chao K-M, Lo C-C, Lin W-H, Lin H-C, Chao W-J (2016) Using malware for software-defined networking-based smart home security management through a taint checking approach. Int J Distrib Sens Netw 12(8):2016
Hadid A (2014) Face biometrics under spoofing attacks: vulnerabilities, countermeasures, open issues and research directions. In: IEEE conference on computer vision and pattern recognition workshops, pp 113–118
Xu Y, Price T, Frahm JM, Monrose F (2016) Virtual u: defeating face liveness detection by building virtual models from your public photos. In: USENIX security symposium, pp 497–512
Lai C, Tai C (2016) A smart spoofing face detector by display features analysis. Sensors 16(7):1136–1150
Robles RJ, Kim T (2010) A review on security in smart home development. Int J Adv Sci Technol 15:13–22
Xie M, Han S, Tian B, Parvin S (2011) Anomaly detection in wireless sensor networks: a survey. J Netw Comput Appl 34(4):1302–1325
Acknowledgements
This work was supported in part by the National Science Foundation under Grant 121407.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Dahmen, J., Cook, D.J., Wang, X. et al. Smart secure homes: a survey of smart home technologies that sense, assess, and respond to security threats. J Reliable Intell Environ 3, 83–98 (2017). https://doi.org/10.1007/s40860-017-0035-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40860-017-0035-0