The Analysis of the Structure and Security of Home Control Subnet

نویسندگان

  • Chengyi Wang
  • Yun Zhang
چکیده

A lot of technologies can be used in home control subnet, but the hardware and software resources available for the home control subnet are limited. There are security problems easily seen. The paper gives the systematic analysis of the structure and function of home control subnet based on the general model of home network. The paper has also analyzed two types of major equipment, namely sub-gateways and terminal equipment. The major networking technology used in home control subnet is summarized and concluded. In combination with relationship among home control subnet, home network, as well as the outside main network, the paper has systematically studied various safety problems related to home control gateways and the possible solutions to those problems have been made.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Designing a Home Security System using Sensor Data Fusion with DST and DSMT Methods

Today due to the importance and necessity of implementing security systems in homes and other buildings, systems with higher certainty, lower cost and with sensor fusion methods are more attractive, as an applicable and high performance methods for the researchers. In this paper, the application of Dempster-Shafer evidential theory and also the newer, more general one Dezert-Smarandache theory ...

متن کامل

Home appliances energy management based on the IoT system

The idea of the Internet of Things (IoT) has turned out to be increasingly prominent in the cuttingedge period of innovation than at any other time. From little family unit gadgets to extensive modernmachines, the vision of IoT has made it conceivable to interface the gadgets with the physical worldaround them. This expanding prominence has likewise made the IoT gadgets and ap...

متن کامل

Security of Sponge structures

Sponge structure is a structure widely used in the design of cryptographic algorithms that reduces the design of the algorithms to the design of a permutation or pseudo-random function. The development of sponge-based algorithms and the selection of designs based on this structure in SHA3 and CAESAR competitions increase the need to examine its security against various types of attacks. In the ...

متن کامل

Developing a grounded-based model of tranquility in contemporary apartments in Urmia City

Introduction: Stressful life and lack of tranquility in modern society, have been serious problems for human life. Environmental psychology has shown that physical and architectural environments play an important role in this, and since the home is one of the most important environments, they try to offer solutions. This study tries to identify the factors that play an effective role in creatin...

متن کامل

Effectiveness of ontological security training on psychological safety and existential anxiety of elder people

Introduction: Old ages are one of the most major period of human life which because of its nature and being close to death time enhances deep questions about existential identity of man, anxiety related to effacement and annihilation, meaningfulness, feelings of unsafety, loneliness and seclusion in mind of most elder people. So this research has been done to review the effectiveness of ontolog...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Wireless Sensor Network

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2009