Home appliances energy management based on the IoT system

Document Type : Research Paper

Authors

1 Faculty of Mechanics, Electrical and Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran

2 Faculty of Computer Engineering- Artificial intelligence, Kharazmi University, Tehran, Iran

3 Faculty of architecture engineering, West Tehran Branch, Islamic Azad University, Tehran, Iran

4 Faculty of architecture engineering, South Tehran Branch, Islamic Azad University, Tehran, Iran

Abstract

The idea of the Internet of Things (IoT) has turned out to be increasingly prominent in the cutting edge period of innovation than at any other time. From little family unit gadgets to extensive modern machines, the vision of IoT has made it conceivable to interface the gadgets with the physical world around them. This expanding prominence has likewise made the IoT gadgets and applications in the focal point of consideration among aggressors. Officially, a few sorts of pernicious exercises exist that endeavor to bargain the security and protection of the IoT gadgets. One fascinating rising risk vector is the assaults that misuse the utilization of sensors on IoT gadgets. IoT gadgets are  powerless against sensor-based dangers because of the absence of legitimate security estimations accessible to control the utilization of sensors by applications. By abusing the sensors (e.g., accelerometer, gyrator, mouthpiece, light sensor, and so on) on an IoT gadget, assailants can separate data from the gadget, exchange malware to a gadget, or trigger a pernicious movement to bargain the gadget. In this review, we investigate different dangers focusing on IoT gadgets and talk about how their sensors can be mishandled for malignant purposes. Specifically, we present an itemized study about existing sensor-based dangers to IoT gadgets and countermeasures that are grown specifically to verify the sensors of IoT gadgets. Besides, we talk about the security and protection issues of IoT gadgets with regards to sensor-based dangers and finish up with future research headings.

Keywords