The Analysis of the Structure and Security of Home Control Subnet
نویسندگان
چکیده
A lot of technologies can be used in home control subnet, but the hardware and software resources available for the home control subnet are limited. There are security problems easily seen. The paper gives the systematic analysis of the structure and function of home control subnet based on the general model of home network. The paper has also analyzed two types of major equipment, namely sub-gateways and terminal equipment. The major networking technology used in home control subnet is summarized and concluded. In combination with relationship among home control subnet, home network, as well as the outside main network, the paper has systematically studied various safety problems related to home control gateways and the possible solutions to those problems have been made.
منابع مشابه
Designing a Home Security System using Sensor Data Fusion with DST and DSMT Methods
Today due to the importance and necessity of implementing security systems in homes and other buildings, systems with higher certainty, lower cost and with sensor fusion methods are more attractive, as an applicable and high performance methods for the researchers. In this paper, the application of Dempster-Shafer evidential theory and also the newer, more general one Dezert-Smarandache theory ...
متن کاملHome appliances energy management based on the IoT system
The idea of the Internet of Things (IoT) has turned out to be increasingly prominent in the cuttingedge period of innovation than at any other time. From little family unit gadgets to extensive modernmachines, the vision of IoT has made it conceivable to interface the gadgets with the physical worldaround them. This expanding prominence has likewise made the IoT gadgets and ap...
متن کاملSecurity of Sponge structures
Sponge structure is a structure widely used in the design of cryptographic algorithms that reduces the design of the algorithms to the design of a permutation or pseudo-random function. The development of sponge-based algorithms and the selection of designs based on this structure in SHA3 and CAESAR competitions increase the need to examine its security against various types of attacks. In the ...
متن کاملDeveloping a grounded-based model of tranquility in contemporary apartments in Urmia City
Introduction: Stressful life and lack of tranquility in modern society, have been serious problems for human life. Environmental psychology has shown that physical and architectural environments play an important role in this, and since the home is one of the most important environments, they try to offer solutions. This study tries to identify the factors that play an effective role in creatin...
متن کاملEffectiveness of ontological security training on psychological safety and existential anxiety of elder people
Introduction: Old ages are one of the most major period of human life which because of its nature and being close to death time enhances deep questions about existential identity of man, anxiety related to effacement and annihilation, meaningfulness, feelings of unsafety, loneliness and seclusion in mind of most elder people. So this research has been done to review the effectiveness of ontolog...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Wireless Sensor Network
دوره 1 شماره
صفحات -
تاریخ انتشار 2009