Analysis of Visible Light Communication using Integrated Avalanche Photodiode
Volume-4 | Issue-2

Smart WSN-based System for Forest Fire Detection with Reduced False Alarms
Volume-5 | Issue-2

Smart Dustbin using ESP32 for Waste Management
Volume-6 | Issue-4

A Review on Identifying Suitable Machine Learning Approach for Internet of Things Applications
Volume-3 | Issue-3

TOWARDS GHZ METALLIC ACCESS NETWORKS
Volume-1 | Issue-1

A Survey on Wireless Network Intrusion Detection
Volume-4 | Issue-1

Investigation on Unmanned Aerial Vehicle (UAV): An Overview
Volume-4 | Issue-3

REVIEW ON UBIQUITOUS CLOUDS AND PERSONAL MOBILE NETWORKS
Volume-1 | Issue-3

Process Control Ladder Logic Trouble Shooting Techniques Fundamentals
Volume-1 | Issue-4

Digital Transformation by Data Fabric
Volume-4 | Issue-3

TRUST BASED ROUTING ALGORITHM IN INTERNET OF THINGS (IoT)
Volume-1 | Issue-1

Hybrid Micro-Energy Harvesting Model using WSN for Self-Sustainable Wireless Mobile Charging Application
Volume-3 | Issue-3

Three Phase Coil based Optimized Wireless Charging System for Electric Vehicles
Volume-3 | Issue-3

Cyber-attack and Measuring its Risk
Volume-3 | Issue-4

REVIEW ON UBIQUITOUS CLOUDS AND PERSONAL MOBILE NETWORKS
Volume-1 | Issue-3

Analysis of Solar Power Generation Performance Improvement Techniques
Volume-4 | Issue-3

Pollination Inspired Clustering Model for Wireless Sensor Network Optimization
Volume-3 | Issue-3

Design of Low Power Cam Memory Cell for the Next Generation Network Processors
Volume-3 | Issue-4

A STUDY OF RESEARCH NOTIONS IN WIRELESS BODY SENSOR NETWORK (WBSN)
Volume-1 | Issue-2

Computation of Constant Gain and NF Circles for 60 GHz Ultra-low noise Amplifiers
Volume-3 | Issue-3

Home / Archives / Volume-5 / Issue-2 / Article-3

Volume - 5 | Issue - 2 | june 2023

Smart Home Security Analysis Using Microcontroller Open Access
Arjun S  , GopiKrishna V, Gowtham B, Siddharthan B, Dr. V. Manikandan  119
Pages: 108-120
Cite this article
S, Arjun, GopiKrishna V, Gowtham B, Siddharthan B, and Dr. V. Manikandan. "Smart Home Security Analysis Using Microcontroller." IRO Journal on Sustainable Wireless Systems 5, no. 2 (2023): 108-120
DOI
10.36548/jsws.2023.2.003
Published
19 June, 2023
Abstract

To prevent data theft, unauthorized access, and network misuse, data modification network security plays a major role in it. Another important role is preventing DOS (Denial Of Service) attacks and making sure of uninterrupted service for legal network users. Network Security also has some defense protocols to protect the data from internal and external attacks. The proposed work is based on creating a safe and secure network by creating a double authentication i.e., by using mail and SMS. Double authentication can also be used in banks as many thefts are being done in a single authentication, if double authentication is implemented through SMS and mail it provides additional security for transactions that are done online. This research is implemented with the help of servers and a microcontroller to develop an application that is essential in a smart home design.

Keywords

Microcontroller Cybersecurity smart home authentication

×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

To access the full PDF, please complete the payment process.

Subscription Details

Category Fee
Article Access Charge
15 USD
Open Access Fee Nil
Annual Subscription Fee
200 USD
After payment,
please send an email to irojournals.contact@gmail.com / journals@iroglobal.com requesting article access.
Subscription form: click here