Home automation

Project description

Bonn-Rhine-Sieg University of Applied Sciences

Motivation

The world we live in is changing every day, especially in the areas of digitalization and automation. Much of what we had to do ourselves a short time ago, we can now leave to automated processes. Not only is industry becoming more automated, but so is the world of every individual. Home automation technologies surround us and enrich our lives.

home automation technologies are characterized by great heterogeneity, lack of interoperability and poor security. In the context of the basic projects, individual technologies are examined and new communication concepts are developed.

Research is being conducted on the following topics: track recognition, person recognition, behavioral analysis and data backup and analysis of android smartphones.

Speech recognition

In home automation, voice recognition is used to control actuators ("lights on"), "window close"). As part of a student project, existing voice recognition methods are to be integrated into home automation. special emphasis is placed on protecting privacy; in particular, recorded (voice) data should not leave the user’s private environment.

Bonn-Rhine-Sieg University of Applied Sciences

WLAN-based motion detection

Personal Recognition

Person recognition is intended to make it possible to identify people by name at the front door or in a room. This makes it possible to address a guest individually ("hello, mrs. muller") even if the name of the guest has slipped your mind.

Behavioral analysis

The analysis of people’s behavior serves to detect deviations from the usual behavior. The aim is to enable rapid assistance if a person z.B. has fallen and is lying helplessly in his own apartment.

Data backup and analysis for android smartphones

The project examines user-related data that is collected about the user while using an android smartphone. This involves analyzing data that is stored both on the smartphone and in the cloud. The aim of this project is to create a guide that can help smartphone users to carry out independent data backup and analysis.

This goal is achieved by securing and analyzing the data collected and stored, such as the data on the home. B. user accounts, contacts, messages, passwords, location coordinates, internet history and other personal information that is not directly visible to the smartphone user or the user himself. Without its knowledge being recorded, achieved.

In addition to the information obtained, methods for securing data on smartphones are presented and described. The methods mentioned are explained and compared with each other using practical examples.

On the one hand, the most popular analysis tools for forensic investigations were tested in a test environment with regard to their functional scope and the data saved. Second, the project developed the android data analyzer (ADA) computer program to automatically secure and analyze user data. In contrast to the other applications examined, the applications were developed with the aim of offering users of smartphones with the android operating system a tool for data analysis.

Bonn-Rhine-Sieg University of Applied Sciences

Securing the internet of things

Closely related to research on home automation is the issue of automation security and thus also the security of the internet of things.

In order to create a networked infrastructure of objects and, above all, everyday objects, a great deal of research is being carried out and new concepts are being developed all the time. In some areas, networking and digitization have already reached the production stage. The biggest deficit here is IT security. In order to be able to develop automation concepts more quickly and easily, security aspects usually play no or no role at the time of development. A strongly subordinate role.

The aim of the research is to identify these deficits and develop new security concepts.

contact person for all topics around home automation – securing the internet of things is jannis konrad.

Like this post? Please share to your friends:
Christina Cherry
Leave a Reply

;-) :| :x :twisted: :smile: :shock: :sad: :roll: :razz: :oops: :o :mrgreen: :lol: :idea: :grin: :evil: :cry: :cool: :arrow: :???: :?: :!: