• No results found

F¨or vidare forskning kan ¨ovriga aspekter av kommunikationen unders¨okas, s˚a som kom- munikationen mellan resterande delar av systemet eller andra m¨ojliga slutsatser utifr˚an den tillg¨angliga informationen. ¨Aven den fysiska aspekten av l˚asets s¨akerhet kan t¨ankas unders¨okas f¨or att uppn˚a en komplett s¨akerhetsutv¨ardering.

Inom smarta hem-omr˚adet kan det vara av intresse att utf¨ora liknande unders¨okningar p˚a andra enheter inom hemmet f¨or att kontrollera till vilken utstr¨ackning denna typ av problem existerar inom omr˚adet.

I syfte att l¨osa problemet kring utvinning av k¨anslig information ¨ar det betydelsefullt att unders¨oka gr¨anserna f¨or problematiken kring design, s˚asom hur mycket prestanda som anv¨andaren ¨ar beredd att offra f¨or fullgod s¨akerhet och integritet eller hur stor merkost- nad som accepteras f¨or att ¨aven bibeh˚alla anv¨andbarheten. En genomf¨orbarhetsanalys av alternativa l¨osningarna likt de som f¨oreslagits i kapitel 7 ¨ar ocks˚a av vikt.

9

Referenser

[1] M.R. Alam, M.B.I. Reaz och M.A.M. Ali. ”A Review of Smart Homes - Past, Present, and Future”. I: Systems, Man, and Cybernetics, Part C: Applications and

Reviews, IEEE Transactions on 42.6 (nov. 2012), s. 1190–1203. issn: 1094-6977.

doi: 10.1109/TSMCC.2012.2189204.

[2] Nazmiye Balta-Ozkan m. fl. ”Social barriers to the adoption of smart homes”. I:

Energy Policy 63 (2013), s. 363–374. issn: 0301-4215. doi:

http://dx.doi.org/10.1016/j.enpol.2013.08.043. url: http://www. sciencedirect.com/science/article/pii/S0301421513008471.

[3] Louise Barkhuus och Anind Dey. ”Is Context-Aware Computing Taking Control away from the User? Three Levels of Interactivity Examined”. English. I: UbiComp

2003: Ubiquitous Computing. Utg. av AnindK. Dey, Albrecht Schmidt och

JosephF. McCarthy. Vol. 2864. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2003, s. 149–156. isbn: 978-3-540-20301-8. doi:

10.1007/978-3-540-39653-6_12. url: http://dx.doi.org/10.1007/ 978-3-540-39653-6_12.

[4] N. Ben-Asher m. fl. ”An Experimental System for Studying the Tradeoff between Usability and Security”. I: Availability, Reliability and Security, 2009. ARES ’09.

International Conference on. Mars 2009, s. 882–887. doi: 10.1109/ARES.2009.174.

[5] A.Z. Broder. ”On the resemblance and containment of documents”. I: Compression

and Complexity of Sequences 1997. Proceedings. Juni 1997, s. 21–29. doi:

10.1109/SEQUEN.1997.666900.

[6] A.J. Bernheim Brush m. fl. ”Home Automation in the Wild: Challenges and Opportunities”. I: Proceedings of the SIGCHI Conference on Human Factors in

Computing Systems. CHI ’11. Vancouver, BC, Canada: ACM, 2011, s. 2115–2124.

isbn: 978-1-4503-0228-9. doi: 10.1145/1978942.1979249. url: http://doi.acm. org/10.1145/1978942.1979249.

[7] N. Dhanjani. Hacking Lightbulbs. url: http://www.dhanjani.com/docs/Hacking %20Lighbulbs%20Hue%20Dhanjani%202013.pdf(h¨amtad 2015-04-06).

[8] N. Dhanjani. Reconsidering the perimeter security argument. url: http://www. dhanjani.com/docs/Reconsidering%20the%20Perimeter%20Security

%20Argument.pdf(h¨amtad 2015-04-06).

[9] Oxford Dictionaries. definition of smart home in English from the Oxford

dictionary. url: http://www.oxforddictionaries.com/definition/english/

smart-home(h¨amtad 2015-03-09).

[10] William Green m. fl. ”Capturing User Requirements for an Integrated Home Environment”. I: Proceedings of the Third Nordic Conference on Human-computer

Interaction. NordiCHI ’04. Tampere, Finland: ACM, 2004, s. 255–258. isbn:

1-58113-857-1. doi: 10.1145/1028014.1028053. url: http://doi.acm.org/10. 1145/1028014.1028053.

[11] Tom Hargreaves och Charlie Wilson. ”Who uses smart home technologies?

Representations of users by the smart home industry”. I: eceee 2013 Summer Study

– Rething, renew, restart. Toulon/Hy`eres, France: eceee, 2013, s. 1769–1780. isbn:

978-91-980482-3-0. url: http://proceedings.eceee.org/papers/ proceedings2013/6-241-13_Hargreaves.pdf.

[12] Michael Herczeg. ”The Smart, the Intelligent and the Wise: Roles and Values of Interactive Technologies”. I: Proceedings of the First International Conference on

Intelligent Interactive Technologies and Multimedia. IITM ’10. Allahabad, India:

ACM, 2010, s. 17–26. isbn: 978-1-4503-0408-5. doi: 10.1145/1963564.1963567. url: http://doi.acm.org/10.1145/1963564.1963567.

[13] Il-kyu Hwang och Jin-wook Baek. ”Wireless access monitoring and control system based on digital door lock”. I: Consumer Electronics, IEEE Transactions on 53.4 (nov. 2007), s. 1724–1730. issn: 0098-3063. doi: 10.1109/TCE.2007.4429276. [14] Business Insider Inc. THE CONNECTED-HOME REPORT: Forecasts And

Growth Trends For The Leading ’Internet Of Things’ Market. url: http://uk.

businessinsider.com/connected-home-forecasts-and-growth-2014-9 (h¨amtad 2015-03-30).

[15] K. Islam, Weiming Shen och Xianbin Wang. ”Security and privacy considerations for Wireless Sensor Networks in smart home environments”. I: Computer Supported

Cooperative Work in Design (CSCWD), 2012 IEEE 16th International Conference on. Maj 2012, s. 626–633. doi: 10.1109/CSCWD.2012.6221884.

[16] Li Jiang, Da-you Liu och Bo Yang. ”Smart home research”. I: Machine Learning

and Cybernetics, 2004. Proceedings of 2004 International Conference on. Vol. 2.

Aug. 2004, 659–663 vol.2. doi: 10.1109/ICMLC.2004.1382266.

[17] Ming Li m. fl. ”The similarity metric”. I: Information Theory, IEEE Transactions

on 50.12 (dec. 2004), s. 3250–3264. issn: 0018-9448. doi:

10.1109/TIT.2004.838101.

[18] Sarah Mennicken, Jo Vermeulen och Elaine M. Huang. ”From Today’s Augmented Houses to Tomorrow’s Smart Homes: New Directions for Home Automation Research”. I: Proceedings of the 2014 ACM International Joint Conference on

Pervasive and Ubiquitous Computing. UbiComp ’14. Seattle, Washington: ACM,

2014, s. 105–115. isbn: 978-1-4503-2968-2. doi: 10.1145/2632048.2636076. url: http://doi.acm.org/10.1145/2632048.2636076.

[19] S. Notra m. fl. ”An experimental study of security and privacy risks with emerging household appliances”. I: Communications and Network Security (CNS), 2014

IEEE Conference on. Okt. 2014, s. 79–84. doi: 10.1109/CNS.2014.6997469.

[20] Yong Tae Park, P. Sthapit och Jae-Young Pyun. ”Smart digital door lock for the home automation”. I: TENCON 2009 - 2009 IEEE Region 10 Conference. Jan. 2009, s. 1–6. doi: 10.1109/TENCON.2009.5396038.

[21] Ian Sommerville. Software Engineering (9th Edition). Pearson, 2010. isbn: 9780137053469.

[22] Yang Song m. fl. ”Modeling and simulation of smart home scenarios based on Internet of Things”. I: Network Infrastructure and Digital Content (IC-NIDC),

2012 3rd IEEE International Conference on. Sept. 2012, s. 596–600. doi:

10.1109/ICNIDC.2012.6418824.

[23] Specification for the Advanced Encryption Standard (AES). Federal Information

Processing Standards Publication 197. 2001. url: http://csrc.nist.gov/ publications/fips/fips197/fips-197.pdf.

[24] Vijay Srinivasan, John Stankovic och Kamin Whitehouse. ”Protecting Your Daily In-home Activity Information from a Wireless Snooping Attack”. I: Proceedings of

the 10th International Conference on Ubiquitous Computing. UbiComp ’08. Seoul,

Korea: ACM, 2008, s. 202–211. isbn: 978-1-60558-136-1. doi:

10.1145/1409635.1409663. url: http://doi.acm.org/10.1145/1409635. 1409663.

[25] Charlie Wilson, Tom Hargreaves och Richard Hauxwell-Baldwin. ”Smart Homes and Their Users: A Systematic Analysis and Key Challenges”. I: Personal

Ubiquitous Comput. 19.2 (febr. 2015), s. 463–476. issn: 1617-4909. doi:

10.1007/s00779-014-0813-0. url: http://dx.doi.org/10.1007/ s00779-014-0813-0.

10

Bilagor

A: Skript - procentuella likheter

http://webshare.mah.se/ab4837/da230a/bilaga-a.zip

B: Skript - sekventiella likheter

http://webshare.mah.se/ab4837/da230a/bilaga-b.zip

C: Insamlad data

http://webshare.mah.se/ab4837/da230a/bilaga-c.zip

Related documents