Internet of Things (IoTs): Applications in Home Automation

Inam Ullah Khan, Muhammad Umar Shahzad, Muhammad Abul Hassan

Abstract


Over the last decade in the field of science & technology, the internet has made significant impact in our economies & societies by bringing in remarkable communication & networking infrastructure. In continuation with this pattern, it is ready to develop as a "Web of Things (IoTs)" where the web will give a medium to physical world articles to take an interest in cooperation. Along these lines the computerized data innovation can incorporate the physical world to the online world, to give a typical cooperation stage. The Internet of Things (IoTs) portrays an overall system of intercommunicating gadgets.

 

It coordinates the worldwide correspondences, general figuring, and likewise the surrounding knowledge. Now, (IoTs) must be viewed as a dream where "things", particularly regular items, for example, almost all home machines additionally furniture, garments, vehicles, streets and shrewd materials, and more, are intelligible, conspicuous, locatable, addressable or controllable through the Internet. This will provide the basis for many new applications, such as energy monitoring, transport safety systems or building security. This vision will surely change with the passage of time, especially as collaborations between Identification Technologies, Wireless Sensor Networks, Intelligent Devices & Nano-technology will enable a number of advanced applications.

 

The innovative use of technologies is contributing to create a value proposition for Internet of Things stakeholders.We have successfully developed an IoTs system section of home automation applications for automating the AC appliances to be used at domestic level. This type of automation uses wireless communication between user & as well as devices to be used. The main back-end principle behind the communication established between all the devices is of serial type. Here we have also adjusted the developed system in such a way to operate manually the similar appliances, connected with it. It is advantageous in system’s faulty situations & also for new users/guests.


References


. M. A. Jan, P. Nanda, X. He and R. P. Liu, “PASCCC: Priority-based application-specific congestion control clustering protocol” Computer Networks, Vol. 74, PP-92-102, 2014.

. InamUllah khan and Muhammad abulhassan, Network layer attacks mechanisms in MANETS-A Survey IJRCCT VOl5 ,ISSUE-6 June 2016.

. Fida, N., Khan, F., Jan, M. A., & Khan, Z., (2017). Performance Analysis of Vehicular Adhoc Network using different Highway Traffic Scenarios in Cloud Computing. Future5v Conference, Lecture Notes in Computer Science, Springer. In Press.

. Khan, F., Khan, M., Iqbal. Z., Rahman, I., &Alam, M. (2017). Secure and Safe Surveillance System using Sensors Networks - Internet of Things. Future5v Conference, Lecture Notes in Computer Science, Springer. In Press.

. Khan, F., Rahman, I., Khan, M., Iqbal, N., &Alam, M., (2017). CoAP-based Request-Response Interaction Model for the Internet of Things. Future5v Conference, Lecture Notes in Computer Science, Springer. In Press.

. Younas, N., Asghar, Z., Qayyum, M., & Khan. F., (2017). Education and Socio Economic Factors Impact on Earning for Pakistan- A Bigdata Analysis. Future5v Conference, Lecture Notes in Computer Science, Springer. In Press.

. Khan, F., & Nakagawa, K. (2013). Comparative study of spectrum sensing techniques in cognitive radio networks. In Computer and Information Technology (WCCIT), 2013 World Congress on (pp. 1-8). IEEE.

. Khan, F., Bashir, F., & Nakagawa, K. (2012). Dual head clustering scheme in wireless sensor networks. In Emerging Technologies (ICET), 2012 International Conference on (pp. 1-5). IEEE.

. Khan, F., Kamal, S. A., &Arif, F. (2013). Fairness improvement in long chain multihop wireless ad hoc networks. In 2013 International Conference on Connected Vehicles and Expo (ICCVE) (pp. 556-561). IEEE.

. Khan, F. (2014). Secure communication and routing architecture in wireless sensor networks. In 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE) (pp. 647-650). IEEE.

. Khan, S., & Khan, F. (2015). Delay and Throughput Improvement in Wireless Sensor and Actor Networks. In 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW) (pp. 1-8).

. M. A. Jan, P. Nanda, X. He, Z. Tan and R. P. Liu, “A robust authentication scheme for observing resources in the internet of things environment” in 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 205-211, 2014, IEEE.

. M. A. Jan, P. Nanda and X. He, “Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN,” in Wired/Wireless Internet Communication, Lecture Notes in Computer Science, pp. 154–167, Springer, Berlin, Germany, 2013.

. Khan, F., Jan, S. R., Tahir, M., Khan, S., &Ullah, F. (2016). Survey: Dealing Non-Functional Requirements at Architecture Level. VFAST Transactions on Software Engineering, 9(2), 7-13.

. Khan, F., Khan, S., & Khan, S. A. (2015, October). Performance improvement in wireless sensor and actor networks based on actor repositioning. In 2015 International Conference on Connected Vehicles and Expo (ICCVE) (pp. 134-139). IEEE.

. Jabeen, Q., Khan, F., Khan, S., & Jan, M. A. (2016). Performance Improvement in Multihop Wireless Mobile Adhoc Networks. the Journal Applied, Environmental, and Biological Sciences (JAEBS), 6(4S), 82-92.

. Khan, F. (2014, May). Fairness and throughput improvement in multihop wireless ad hoc networks. In Electrical and Computer Engineering (CCECE), 2014 IEEE 27th Canadian Conference on (pp. 1-6). IEEE.

. Khan, S., Khan, F., Arif, F., Q., Jan, M. A., & Khan, S. A. (2016). Performance Improvement in Wireless Sensor and Actor Networks. Journal of Applied Environmental and Biological Sciences, 6(4S), 191-200.

. Khan, F., Jan, S. R., Tahir, M., & Khan, S. (2015, October). Applications, limitations, and improvements in visible light communication systems. In2015 International Conference on Connected Vehicles and Expo (ICCVE)(pp. 259-262). IEEE.

. Younas. N, Asghar, Z, Qayyum. M,& Khan. F. Education and Socio Economic Factors Impact on Earning for Pakistan- A Bigdata Analysis

. Jabeen, Q., Khan, F., Hayat, M. N., Khan, H., Jan, S. R., &Ullah, F. (2016). A Survey: Embedded Systems Supporting By Different Operating Systems. International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN, 2395-1990.

. M. A. Jan, P. Nanda, X. He and R. P. Liu, “A Sybil Attack Detection Scheme for a Centralized Clustering-based Hierarchical Network” in Trustcom/BigDataSE/ISPA, Vol.1, PP-318-325, 2015, IEEE.

. Khan, S., Babar, M., Khan, F., Arif, F., Tahir, M. (2016). Collaboration Methodology for Integrating Non-Functional Requirements in Architecture. In the Journal of Applied Environmental and Biological Sciences (JAEBS), 6(4S), 63-67

. M. A. Jan, P. Nanda, X. He, and R. P. Liu,“A Sybil Attack Detection Scheme for a Forest Wildfire Monitoring Application,” Elsevier Future Generation Computer Systems (FGCS), “Accepted”, 2016.

. M. A. Jan, P. Nanda, X. He and R. P. Liu, “Enhancing lifetime and quality of data in cluster-based hierarchical routing protocol for wireless sensor network”, 2013 IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC & EUC), pp. 1400-1407, 2013.

. Zeeshan, M., Khan, F., & Jan, S. R. (2016). Congestion Detection and Mitigation Protocols for Wireless Sensor Networks. International Journal of Scientific Research in Computer Science, Engineering and Information Technology

. Hayat, M. N., Khan, F., Khan, H., Khan, M. Y., & Shah, M. (2016). Review of Cluster-based Energy Routing Protocols for WSNs. International Journal of Interdisciplinary Research Centre

. Zeeshan, M., Khan, F., & Jan, S. R. (2016). Review of various Congestion Detection and Routing Protocols in Wireless Sensor Networks. International Journal of Interdisciplinary Research Centre

. Khan, H., Hayat, F., Khan, M. N., Khan, M. Y., & Shah, M. (2016). A Systematic Overview of Routing Protocols in WSNs. International Journal of Advanced Research in Computer Engineering & Technology, 5(7), pp-2088.

. Khan.W., Javeed. D., Khan. M.T., Jan. S.R., Khan, F. (2016). Applications of Wireless Sensor Networks in Food and Agriculture Sectors. International Journal of Advanced Research in Computer Engineering & Technology, 5(6), pp-2048.

. Khan. M.Y, Shah. M, Khan. H, Hayat. M.N, Khan. F. (2016). Amplified Forms of LEACH based Clustering Protocols for WSNs- A Survey, International Journal of Advanced Research in Computer Engineering & Technology, 5(6), pp.2053.

. Alam, M., Yang, D., Huq, K., Saghezchi, F., Mumtaz, S., & Rodriguez, J. (2015). Towards 5G: Context Aware Resource Allocation for Energy Saving. Journal of Signal Processing Systems, 83(2), 279–291. doi:10.1007/s11265-015-1061-x

. Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2015, August). DPBSV--An Efficient and Secure Scheme for Big Sensing Data Stream. InTrustcom/BigDataSE/ISPA, 2015 IEEE (Vol. 1, pp. 246-253). IEEE.

. Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2015). A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream. In Web Information Systems Engineering–WISE 2015 (pp. 93-108). Springer International Publishing.

. Alam, M., Trapps, P., Mumtaz, S., & Rodriguez, J. (2016). Context-aware cooperative testbed for energy analysis in beyond 4G networks. Telecommunication Systems. doi:10.1007/s11235-016-0171-5

. Alam, M., Albano, M., Radwan, A., & Rodriguez, J. (2013). CANDi: context-aware node discovery for short-range cooperation. Transactions on Emerging Telecommunications Technologies, 26(5), 861–875. doi:10.1002/ett.2763

. Alam, M., Mumtaz, S., Saghezchi, F. B., Radwan, A., Rodriguez, J. (2013). Energy and Throughput Analysis of Reservation Protocols of Wi Media MAC. Journal of Green Engineering, 3(4), 363–382. doi:10.13052/jge1904-4720.341

. M. Usman, M. A. Jan, and X. He,“Cryptography-based Secure Data Storage and SharingUsing HEVC and Public Clouds,” Elsevier Information sciences, “accepted”, 2016.

. M. Usman, M. A. Jan, X. He and P. Nanda, “Data Sharing in Secure Multimedia Wireless Sensor

Networks,” in 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), “accepted”, 2016.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.