Internet of things (IOT) is used to define the connection of devices with compatibility features to connect to the internet. This helps them to connect to each other and streamline the operations they are intended for. The following report includes a discussion for the various devices that can implement the IOT concept. In addition, the risks related to the adoption of such devices are also discussed here.
Home automation:
Home automation is used to define the presence of certain IOT devices that helps in connectivity among the home appliances. The basic aim of adoption of such technologies is to provide certain help in the chores of day-to-day activities (Ramlee et al., 2013). The main devices included in this report are the security systems, lighting systems, cleaning and cooking systems.
However, the presence of various issues in the home appliances concerns the effective operations and the security of the house as well as the people. As the requirement of internet is a must for facilitating the connection among the IOT devices, the utility bill of the house increases to a much extent (Baraka et al., 2013). In addition, the vulnerability to outside threats is also increased.
A smart home has all the necessary devices to call it an automated house. These devices will be connected via the internet and the hub will facilitate the connection among all the devices. The list of the devices to be included in the house is:
Fig 1: Smart house
(Source: Created by the author)
This portion of the report discusses about the IOT devices that are to be present in the house.
The main device to be used here is the Wink Hub 2. This device is used to make connections to all the devices present in the house which reduces the need for controlling each of the devices.
a) The device has a small problem where its accuracy is reduced by the amount of time it is used. This causes the user to repair it or buy a new one.
b) The major control issues are the requirement of a high-end Smartphone to operate the mobile application. It is thus, important for the manufacturers to scale down the app.
c) The mesh topology of the hub as well as the z-wave technology makes up for most of all the connectivity issues. This causes the user to restart the device several times to make it work.
d) The security issues here are the most common one which is present in all IOT connection. The vulnerabilities to outside threats and hacking are the one that is to be referenced by the manufacturers.
e) The presence of public profile made by the device is the most common privacy concern.
The Net gear Arlo Pro is the chosen device in this report. The device is made to be waterproof with wireless connectivity which removes the presence of any installation problems. In addition, the device can be rotated to 130°.
a) The glitches in the video feeds are the most common usage issues. These glitches are present only for 1-2 sec.
b) The requirement for a high-end Smartphone is another control issues that is needed to be addressed by the manufacturers.
c) The application that is used to connect to the device crashes several times on startup. This connectivity issue is also another need to be addressed by the manufacturers.
d) The security issues here are the most common one which is present in all IOT connection. The vulnerabilities to outside threats and hacking are the one that is to be referenced by the manufacturers.
e) The presence of public profile made by the device is the most common privacy concern.
The August Smart Lock is the chosen device in this report. The main security aspect is addressed by this device. The device comes with a very own application which is used as a key for the lock. In addition, the user can answer the guests by looking at the live video feed.
a) The device needs the user to be present close to the device which is the main usage issues. As the technology used is Bluetooth, range of the connection is not too great.
b) The use of the app by the user in front of the door is the main control issue in this device. The app is used to send signals to the lock which will then be opened by the user.
c) The main connection issues are the requirement for an IOS Smartphone as the device has their own toolkit for IOS. This applies as a disadvantage in front of the android users.
d) The security issues here are the most common one which is present in all IOT connection. The vulnerabilities to outside threats and hacking are the one that is to be referenced by the manufacturers.
e) The presence of public profile made by the device is the most common privacy concern.
The chosen device is the Abode bundles which is another device used to address the security related functions of the home. The device locks the door automatically when the user leaves home and opens it when the user is very close to the house.
a) The device needs the presence of new infrastructure to work. In case of older systems, the device does not work properly which is a major usage problem.
b) The control issue is that the mobile application is not enough to add new devices to the network. The requirement for desktop access is necessary for each new connection to be made.
c) The requirement for cellular data is necessary for operations in case of power outage. As it is not predictable as when outage will occur, the device has to be connected all time by cellular data which is another connectivity issue.
d) The security issues here are the most common one which is present in all IOT connection. The vulnerabilities to outside threats and hacking are the one that is to be referenced by the manufacturers.
e) The presence of public profile made by the device is the most common privacy concern.
The Nest thermostat is the main device that is used to provide heating solutions to the house. The device is user friendly and activates when the user is close to the house. The activities of it can also be measured by using their mobile application.
a) The wiring problem in the internal interface is the main usage problem of the device. Due to this, the heat exceeds the set level and causes hindrance to the users. The manufacturers are to address the problems.
b) The glitches in the device leading to total stopping of the device is the control issue of the device. The developers need to apply the relevant technologies to address them.
c) The device going offline due to excessive draining of battery is the connectivity issue of the device.
d) The security issues here are the most common one which is present in all IOT connection. The vulnerabilities to outside threats and hacking are the one that is to be referenced by the manufacturers.
e) The presence of public profile made by the device is the most common privacy concern.
The Hisense 10,000 BTU air conditioner is the chosen device which can be connected using Wi-Fi technology. It also comes with a mobile application to facilitate control over a Smartphone.
a) The noise production is the main usage issue that the developers need to address. Customers have lodged several complaints regarding that.
b) The control issue is the need for small space. In case the space is large, efficiency is reduced to a much lower level.
c) The application that is used to connect to the device crashes several times on startup. This connectivity issue is also another need to be addressed by the manufacturers.
d) The security issues here are the most common one which is present in all IOT connection. The vulnerabilities to outside threats and hacking are the one that is to be referenced by the manufacturers.
e) The presence of public profile made by the device is the most common privacy concern.
The Philips Hue bulb is the device to be used for lighting purposes. The major feature of the bulb is that it can change color in accordance to the user’s need. It can also be connected through a mobile application.
a) The usage issue of the device is that the change in color cannot be effectively applied.
b) The control issue is the making of a plastic remote for operation. This can be less durable and subjected to breaking.
c) The device needs to be connected to the hue bridge first. This is done by connecting the bridge to the home network by an Ethernet cable. This is the main connectivity issue.
d) The security issues here are the most common one which is present in all IOT connection. The vulnerabilities to outside threats and hacking are the one that is to be referenced by the manufacturers.
e) The presence of public profile made by the device is the most common privacy concern.
For cooking related uses, the Char-Broil Digital Electric Smoker is used. The time taken is very short and has 2-3 sections inside it. In addition, the temperature can be controlled by the use of a mobile application.
a) During cooking, sometimes the device is reported to exude a lot of smoke. The manufacturer of the device needs to address this usage issues.
b) In addition, the temperature of the device cannot be controlled and exceeds a much higher level. This is the main control issue.
c) The main connectivity issue is that the application is not of much use in controlling the temperature.
d) The security issues here are the most common one which is present in all IOT connection. The vulnerabilities to outside threats and hacking are the one that is to be referenced by the manufacturers.
e) The presence of public profile made by the device is the most common privacy concern.
The June Intelligent Oven is used for use as an oven. The device has inbuilt camera and artificial intelligence programs which can be connected by Wi-Fi.
a) The mobile application displays an error message when the food is not recognized. This is the main usage issue of the device.
b) The control issue is the deficiency of manual temperature control which can lead to uncooked foods sometime.
c) The mobile application is IOS supportive. The connectivity issue lies in the absence for android use.
d) The security issues here are the most common one which is present in all IOT connection. The vulnerabilities to outside threats and hacking are the one that is to be referenced by the manufacturers.
e) The presence of public profile made by the device is the most common privacy concern.
Eufy RoboVac 11 is used for cleaning purposes. The device can be remotely controlled by the user.
a) The usage issue is the need for remote control.
b) The control issue that is reported by most of the customers is the requirement for control every 45 seconds.
c) The absence of automation in control is the main connectivity issue of the device.
d) The security issues here are the most common one which is present in all IOT connection. The vulnerabilities to outside threats and hacking are the one that is to be referenced by the manufacturers.
e) The presence of public profile made by the device is the most common privacy concern.
Conclusion:
Thus, the conclusion that can be drawn from the report is the application of automation in the houses can be done by implementing the various devices discussed in the report. The analysis of the issues related to the devices is also referred in the report. Along with this, the solutions that can be applied to address such issues are to be met to meet the needs of the customers.
References:
2, W. (2017). Wink Hub 2. Wink.com. Retrieved 15 September 2017, from https://www.wink.com/products/wink-hub-2/
Air Conditioners Portable | Portable AC | Hisense Appliances. (2017). Hisense USA. Retrieved 18 September 2017, from https://www.hisense-usa.com/appliances/portable-ac
Baraka, K., Ghobril, M., Malek, S., Kanj, R., & Kayssi, A. (2013, June). Low cost arduino/android-based energy-efficient home automation system with smart task scheduling. In Computational Intelligence, Communication Systems and Networks (CICSyN), 2013 Fifth International Conference on(pp. 296-301). IEEE.
Bundle and Save with abode!. (2017). Goabode.com. Retrieved 15 September 2017, from https://goabode.com/sale/
Cleaner, R., & Cleaner, R. (2017). RoboVac 11 Vacuum Cleaner. Eufy. Retrieved 18 September 2017, from https://www.eufylife.com/products/robovac-11
Digital Electric Smoker | Char-Broil®. (2017). Charbroil.com. Retrieved 18 September 2017, from https://www.charbroil.com/digital-electric-smoker
ElShafee, A., & Hamed, K. A. (2012). Design and implementation of a WIFI based home automation system. World academy of science, engineering and technology, 68, 2177-2180.
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660.
How It Works | Smart Lock & Smarter Home Access™ | August. (2017). August. Retrieved 15 September 2017, from https://august.com/how-it-works/
Hue products – Meethue | Philips Lighting. (2017). Philips. Retrieved 18 September 2017, from https://www2.meethue.com/en-us/products/all#filters=BULBS_SU&sliders=&support=&price=&priceBoxes=&page=&layout=12.subcategory.p-grid-icon
Jain, S., Vaibhav, A., & Goyal, L. (2014, February). Raspberry Pi based interactive home automation system through E-mail. In Optimization, Reliabilty, and Information Technology (ICROIT), 2014 International Conference on (pp. 277-280). IEEE.
June Oven. (2017). Juneoven.com. Retrieved 18 September 2017, from https://juneoven.com/
Kailas, A., Cecchi, V., & Mukherjee, A. (2012). A survey of communications and networking technologies for energy management in buildings and home automation. Journal of Computer Networks and Communications, 2012.
Medaglia, C. M., & Serbanati, A. (2010). An overview of privacy and security issues in the internet of things. In The Internet of Things (pp. 389-395). Springer, New York, NY.
Meet the Nest Learning Thermostat. (2017). Nest. Retrieved 15 September 2017, from https://nest.com/thermostats/nest-learning-thermostat/overview/
Mennicken, S., Vermeulen, J., & Huang, E. M. (2014, September). From today’s augmented houses to tomorrow’s smart homes: new directions for home automation research. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (pp. 105-115). ACM.
Ramlee, R. A., LEONG, M. H., SARBAN SINGH, R. S. A., ISMAIL, M. M., OTHMAN, M. A., SULAIMAN, H. A., … & ALICE, M. (2013). Bluetooth remote home automation system using android application.
Rechargeable Wireless Security Camera: Arlo Pro | Arlo by NETGEAR. (2017). Arlo.com. Retrieved 15 September 2017, from https://www.arlo.com/en-us/products/arlo-pro/default.aspx
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download