e-space
Manchester Metropolitan University's Research Repository

    Efficient and Secure IoT Based Smart Home Automation Using Multi-Model Learning and Blockchain Technology

    Alturki, N, Alharthi, R, Umer, M, Saidani, O, Alshardan, A, Alhebshi, RM, Alsubai, S and Bashir, AK ORCID logoORCID: https://orcid.org/0000-0001-7595-2522 (2024) Efficient and Secure IoT Based Smart Home Automation Using Multi-Model Learning and Blockchain Technology. CMES - Computer Modeling in Engineering and Sciences, 139 (3). pp. 3387-3415. ISSN 1526-1492

    [img]
    Preview
    Published Version
    Available under License Creative Commons Attribution.

    Download (5MB) | Preview

    Abstract

    The concept of smart houses has grown in prominence in recent years. Major challenges linked to smart homes are identification theft, data safety, automated decision-making for IoT-based devices, and the security of the device itself. Current home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical features. This paper proposes a smart home system based on ensemble learning of random forest (RF) and convolutional neural networks (CNN) for programmed decision-making tasks, such as categorizing gadgets as “OFF” or “ON” based on their normal routine in homes. We have integrated emerging blockchain technology to provide secure, decentralized, and trustworthy authentication and recognition of IoT devices. Our system consists of a 5V relay circuit, various sensors, and a Raspberry Pi server and database for managing devices. We have also developed an Android app that communicates with the server interface through an HTTP web interface and an Apache server. The feasibility and efficacy of the proposed smart home automation system have been evaluated in both laboratory and real-time settings. It is essential to use inexpensive, scalable, and readily available components and technologies in smart home automation systems. Additionally, we must incorporate a comprehensive security and privacy-centric design that emphasizes risk assessments, such as cyberattacks, hardware security, and other cyber threats. The trial results support the proposed system and demonstrate its potential for use in everyday life.

    Impact and Reach

    Statistics

    Activity Overview
    6 month trend
    2Downloads
    6 month trend
    9Hits

    Additional statistics for this dataset are available via IRStats2.

    Altmetric

    Repository staff only

    Edit record Edit record