F¨or vidare forskning kan ¨ovriga aspekter av kommunikationen unders¨okas, s˚a som kom- munikationen mellan resterande delar av systemet eller andra m¨ojliga slutsatser utifr˚an den tillg¨angliga informationen. ¨Aven den fysiska aspekten av l˚asets s¨akerhet kan t¨ankas unders¨okas f¨or att uppn˚a en komplett s¨akerhetsutv¨ardering.
Inom smarta hem-omr˚adet kan det vara av intresse att utf¨ora liknande unders¨okningar p˚a andra enheter inom hemmet f¨or att kontrollera till vilken utstr¨ackning denna typ av problem existerar inom omr˚adet.
I syfte att l¨osa problemet kring utvinning av k¨anslig information ¨ar det betydelsefullt att unders¨oka gr¨anserna f¨or problematiken kring design, s˚asom hur mycket prestanda som anv¨andaren ¨ar beredd att offra f¨or fullgod s¨akerhet och integritet eller hur stor merkost- nad som accepteras f¨or att ¨aven bibeh˚alla anv¨andbarheten. En genomf¨orbarhetsanalys av alternativa l¨osningarna likt de som f¨oreslagits i kapitel 7 ¨ar ocks˚a av vikt.
9
Referenser
[1] M.R. Alam, M.B.I. Reaz och M.A.M. Ali. ”A Review of Smart Homes - Past, Present, and Future”. I: Systems, Man, and Cybernetics, Part C: Applications and
Reviews, IEEE Transactions on 42.6 (nov. 2012), s. 1190–1203. issn: 1094-6977.
doi: 10.1109/TSMCC.2012.2189204.
[2] Nazmiye Balta-Ozkan m. fl. ”Social barriers to the adoption of smart homes”. I:
Energy Policy 63 (2013), s. 363–374. issn: 0301-4215. doi:
http://dx.doi.org/10.1016/j.enpol.2013.08.043. url: http://www. sciencedirect.com/science/article/pii/S0301421513008471.
[3] Louise Barkhuus och Anind Dey. ”Is Context-Aware Computing Taking Control away from the User? Three Levels of Interactivity Examined”. English. I: UbiComp
2003: Ubiquitous Computing. Utg. av AnindK. Dey, Albrecht Schmidt och
JosephF. McCarthy. Vol. 2864. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2003, s. 149–156. isbn: 978-3-540-20301-8. doi:
10.1007/978-3-540-39653-6_12. url: http://dx.doi.org/10.1007/ 978-3-540-39653-6_12.
[4] N. Ben-Asher m. fl. ”An Experimental System for Studying the Tradeoff between Usability and Security”. I: Availability, Reliability and Security, 2009. ARES ’09.
International Conference on. Mars 2009, s. 882–887. doi: 10.1109/ARES.2009.174.
[5] A.Z. Broder. ”On the resemblance and containment of documents”. I: Compression
and Complexity of Sequences 1997. Proceedings. Juni 1997, s. 21–29. doi:
10.1109/SEQUEN.1997.666900.
[6] A.J. Bernheim Brush m. fl. ”Home Automation in the Wild: Challenges and Opportunities”. I: Proceedings of the SIGCHI Conference on Human Factors in
Computing Systems. CHI ’11. Vancouver, BC, Canada: ACM, 2011, s. 2115–2124.
isbn: 978-1-4503-0228-9. doi: 10.1145/1978942.1979249. url: http://doi.acm. org/10.1145/1978942.1979249.
[7] N. Dhanjani. Hacking Lightbulbs. url: http://www.dhanjani.com/docs/Hacking %20Lighbulbs%20Hue%20Dhanjani%202013.pdf(h¨amtad 2015-04-06).
[8] N. Dhanjani. Reconsidering the perimeter security argument. url: http://www. dhanjani.com/docs/Reconsidering%20the%20Perimeter%20Security
%20Argument.pdf(h¨amtad 2015-04-06).
[9] Oxford Dictionaries. definition of smart home in English from the Oxford
dictionary. url: http://www.oxforddictionaries.com/definition/english/
smart-home(h¨amtad 2015-03-09).
[10] William Green m. fl. ”Capturing User Requirements for an Integrated Home Environment”. I: Proceedings of the Third Nordic Conference on Human-computer
Interaction. NordiCHI ’04. Tampere, Finland: ACM, 2004, s. 255–258. isbn:
1-58113-857-1. doi: 10.1145/1028014.1028053. url: http://doi.acm.org/10. 1145/1028014.1028053.
[11] Tom Hargreaves och Charlie Wilson. ”Who uses smart home technologies?
Representations of users by the smart home industry”. I: eceee 2013 Summer Study
– Rething, renew, restart. Toulon/Hy`eres, France: eceee, 2013, s. 1769–1780. isbn:
978-91-980482-3-0. url: http://proceedings.eceee.org/papers/ proceedings2013/6-241-13_Hargreaves.pdf.
[12] Michael Herczeg. ”The Smart, the Intelligent and the Wise: Roles and Values of Interactive Technologies”. I: Proceedings of the First International Conference on
Intelligent Interactive Technologies and Multimedia. IITM ’10. Allahabad, India:
ACM, 2010, s. 17–26. isbn: 978-1-4503-0408-5. doi: 10.1145/1963564.1963567. url: http://doi.acm.org/10.1145/1963564.1963567.
[13] Il-kyu Hwang och Jin-wook Baek. ”Wireless access monitoring and control system based on digital door lock”. I: Consumer Electronics, IEEE Transactions on 53.4 (nov. 2007), s. 1724–1730. issn: 0098-3063. doi: 10.1109/TCE.2007.4429276. [14] Business Insider Inc. THE CONNECTED-HOME REPORT: Forecasts And
Growth Trends For The Leading ’Internet Of Things’ Market. url: http://uk.
businessinsider.com/connected-home-forecasts-and-growth-2014-9 (h¨amtad 2015-03-30).
[15] K. Islam, Weiming Shen och Xianbin Wang. ”Security and privacy considerations for Wireless Sensor Networks in smart home environments”. I: Computer Supported
Cooperative Work in Design (CSCWD), 2012 IEEE 16th International Conference on. Maj 2012, s. 626–633. doi: 10.1109/CSCWD.2012.6221884.
[16] Li Jiang, Da-you Liu och Bo Yang. ”Smart home research”. I: Machine Learning
and Cybernetics, 2004. Proceedings of 2004 International Conference on. Vol. 2.
Aug. 2004, 659–663 vol.2. doi: 10.1109/ICMLC.2004.1382266.
[17] Ming Li m. fl. ”The similarity metric”. I: Information Theory, IEEE Transactions
on 50.12 (dec. 2004), s. 3250–3264. issn: 0018-9448. doi:
10.1109/TIT.2004.838101.
[18] Sarah Mennicken, Jo Vermeulen och Elaine M. Huang. ”From Today’s Augmented Houses to Tomorrow’s Smart Homes: New Directions for Home Automation Research”. I: Proceedings of the 2014 ACM International Joint Conference on
Pervasive and Ubiquitous Computing. UbiComp ’14. Seattle, Washington: ACM,
2014, s. 105–115. isbn: 978-1-4503-2968-2. doi: 10.1145/2632048.2636076. url: http://doi.acm.org/10.1145/2632048.2636076.
[19] S. Notra m. fl. ”An experimental study of security and privacy risks with emerging household appliances”. I: Communications and Network Security (CNS), 2014
IEEE Conference on. Okt. 2014, s. 79–84. doi: 10.1109/CNS.2014.6997469.
[20] Yong Tae Park, P. Sthapit och Jae-Young Pyun. ”Smart digital door lock for the home automation”. I: TENCON 2009 - 2009 IEEE Region 10 Conference. Jan. 2009, s. 1–6. doi: 10.1109/TENCON.2009.5396038.
[21] Ian Sommerville. Software Engineering (9th Edition). Pearson, 2010. isbn: 9780137053469.
[22] Yang Song m. fl. ”Modeling and simulation of smart home scenarios based on Internet of Things”. I: Network Infrastructure and Digital Content (IC-NIDC),
2012 3rd IEEE International Conference on. Sept. 2012, s. 596–600. doi:
10.1109/ICNIDC.2012.6418824.
[23] Specification for the Advanced Encryption Standard (AES). Federal Information
Processing Standards Publication 197. 2001. url: http://csrc.nist.gov/ publications/fips/fips197/fips-197.pdf.
[24] Vijay Srinivasan, John Stankovic och Kamin Whitehouse. ”Protecting Your Daily In-home Activity Information from a Wireless Snooping Attack”. I: Proceedings of
the 10th International Conference on Ubiquitous Computing. UbiComp ’08. Seoul,
Korea: ACM, 2008, s. 202–211. isbn: 978-1-60558-136-1. doi:
10.1145/1409635.1409663. url: http://doi.acm.org/10.1145/1409635. 1409663.
[25] Charlie Wilson, Tom Hargreaves och Richard Hauxwell-Baldwin. ”Smart Homes and Their Users: A Systematic Analysis and Key Challenges”. I: Personal
Ubiquitous Comput. 19.2 (febr. 2015), s. 463–476. issn: 1617-4909. doi:
10.1007/s00779-014-0813-0. url: http://dx.doi.org/10.1007/ s00779-014-0813-0.
10
Bilagor
A: Skript - procentuella likheter
http://webshare.mah.se/ab4837/da230a/bilaga-a.zip
B: Skript - sekventiella likheter
http://webshare.mah.se/ab4837/da230a/bilaga-b.zip
C: Insamlad data
http://webshare.mah.se/ab4837/da230a/bilaga-c.zip