0% found this document useful (0 votes)
66 views5 pages

LE 4000 Integrated Outline Template

Smart homes bring convenience but also security risks, privacy concerns, and issues with different systems being incompatible. The document discusses how wireless connectivity in smart homes makes the systems vulnerable to hacking and monitoring. Privacy is also at risk since personal information can be accessed over the internet. Compatibility between different vendors' products and protocols is still limited, making maintenance difficult and costly. In conclusion, smart home technology is still developing and has issues that need to be addressed regarding security, privacy, and conformity before widespread implementation.

Uploaded by

Syahmi Isahak
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views5 pages

LE 4000 Integrated Outline Template

Smart homes bring convenience but also security risks, privacy concerns, and issues with different systems being incompatible. The document discusses how wireless connectivity in smart homes makes the systems vulnerable to hacking and monitoring. Privacy is also at risk since personal information can be accessed over the internet. Compatibility between different vendors' products and protocols is still limited, making maintenance difficult and costly. In conclusion, smart home technology is still developing and has issues that need to be addressed regarding security, privacy, and conformity before widespread implementation.

Uploaded by

Syahmi Isahak
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

1

LE 4000
INTEGRATED OUTLINE TEMPLATE


NAME: Mohamad Ikhmal Amri Bin Yusof NAME: Mohamed Syahmi Bin Isahak
MATRIC: 1514293 MATRIC: 1513185
KULLIYAH: Engineering KULLIYAH: Engineering



THEME/TOPIC: Engineering / Home Living


WORKING TITLE: Smart home brings more harm than good.


Smart home should not be implemented in terms of
security, privacy and conformity.
THESIS STATEMENT:





INTRODUCTION

ITEM DETAIL SOURCE
BACKGROUND Smart homes are becoming a norm
today. It is an integrated system inside
a house, which performing various
functions for daily use without any
human interaction.



PROBLEM/ISSUE Even though smart home bringing
more easiness and comfortability
toward users inside the house, some
issue should not be observe lightly as
this technology also risky to the users.




WRITER’S POV It is firmly agree that smart home
brings more risks than good.





MAIN IDEA 1
LE 4000 OUTLINE
2

ITEM DETAIL SOURCE
MAIN IDEA In term of security, the integrated
system inside the house is vulnerable
since it is using the wireless network,
which is mostly connected to the
Internet.




SUPPORTING “As it is already knows to us that in a Utkarsh Saxena, Dr. J.S Sodhi,
DETAIL 1 smart home there exist a Dr.Yaduveer Singh, Analysis of
heterogeneous devices which are security attacks in a smart
connected to each other, this causes home networks, 7th
one more vulnerability in a smart International Conference on
home network because due to its cloud computing, Data Science
heterogeneous nature it uses & Engineering, pp 432-436,
broadcasting for packet transferring 2017
from one node to other node and that
broadcasted packet can be easily
trapped by the intruder.”





SUPPORTING “Wormhole Attacks in which the two Utkarsh Saxena, Dr. J.S Sodhi,
DETAIL 2 adversaries’ node communicate with Dr.Yaduveer Singh, Analysis of
each other. These two nodes have security attacks in a smart
much better communication home networks, 7th
resources than any other nodes in a International Conference on
network and can establish a much cloud computing, Data Science
better communication channel. In & Engineering, pp 432-436,
this the wormhole node makes a 2017
false tunnel between other nodes in
such a way that it disturb the routing
table. When a data packet is
delivered from one node to other
node the wormhole node transfer the
packets to some different node as a
result the destination node gets the
data packet very late.”









LE 4000 OUTLINE
3

MAIN IDEA 2

ITEM DETAIL SOURCE
MAIN IDEA As for privacy concern, the smart home
system is not an assurance to the users
since it is connected to the Internet, the
outsider or intruders can easily
monitored therefore the privacy inside
the house is been violated.



SUPPORTING “As smart home is connected to the Utkarsh Saxena, Dr. J.S Sodhi,
DETAIL 1 internet and there are several attacks Dr.Yaduveer Singh, Analysis of
present to the network because smart security attacks in a smart home
home network is no different from any networks, 7th International
other wireless network, So there is Conference on cloud computing,
always a risk associated with the Data Science & Engineering, pp
wireless network.” 432-436, 2017





SUPPORTING “Another evidence that privacy has fall Alam, M. R., Reaz, M. B., & Ali, M. A.
DETAIL 2 into the victim of smart homes is that (2012). A Review of Smart Homes-
identity theft could happen due to the Past, Present, and Future.
flow of information being sent and Transactions on System, Man, and
received over the internet. As it has Cybernetics-Part C: Applications
been discussed in safety, everything and Reviews, 42(6), 1190-1203.
that is connected to internet is prone to doi:10.1109/TSMCC.2012.2189204
attack.”



















LE 4000 OUTLINE
4






MAIN IDEA 3

ITEM DETAIL SOURCE
MAIN IDEA When it comes to conformity, the
smart home sysems are relatively new
and it not suitable to be implemented
due to the unconfirmity of this
technology.




SUPPORTING “The reliability of smart homes Alam, M. R., Reaz, M. B., & Ali, M. A.
DETAIL 1 depends on the communication (2012). A Review of Smart Homes-
protocols, services, and systems used. Past, Present, and Future.
The most significant problem is the Transactions on System, Man, and
compatibility between different Cybernetics-Part C: Applications
protocols from different vendors. Most and Reviews, 42(6), 1190-1203.
appliances support a specific protocol, doi:10.1109/TSMCC.2012.2189204
which is a problem when using
different vendor products without
changing existing devices and
protocols.”






SUPPORTING “Deploying smart home network and Utkarsh Saxena, Dr. J.S Sodhi,
DETAIL 2 securing it effectively is very much costly Dr.Yaduveer Singh, Analysis of
as for this huge amount of resources are security attacks in a smart home
needed, So making it cost effective and
secure in a best possible manner is the networks, 7th International
challenges for smart home network.” Conference on cloud computing,
Data Science & Engineering, pp
432-436, 2017










LE 4000 OUTLINE
5
CONCLUSION

ITEM DETAIL SOURCE
REPHRASE THESIS Safety, privacy, and conformity could
be harmed if smart homes system are
being implemented



SUMMARY Smart homes are still in development
and it needs to be mature enough to be
implemented inside the house. Safety
is an element that we need to highlight
because it involves on person’s life.
Breach of privacy in smart home
system could result in identity theft.
The unconformity, inconsistency and
incompatibility between various
vendors make smart home not suitable
to be impliment and it leads to higher
cost for maintanance.




SUGGESTIONS/ Build an impenetrable security
RECOMMENDATION solution that can make everynoe safe
to use smart home system. Besides, a
complete guideline on the usage of
private information must be existed so
that privacy transgress will not be a
risk. Last but not least, a standardise
smart home system must be
implemented to ensure the tecnology
being used in this system is not
complicated so that the cost for
maintaning the system is cheap an
affordable for household.






LE 4000 OUTLINE

You might also like