GPSPiChain-Blockchain and AI based Self-Contained Anomaly Detection Family Security System in Smart Home

Ali Raza , Lachlan Hardy , Erin Roehrer , Soonja Yeom , Byeong Ho Kang

Journal of Systems Science and Systems Engineering ›› 2021, Vol. 30 ›› Issue (4) : 433 -449.

PDF
Journal of Systems Science and Systems Engineering ›› 2021, Vol. 30 ›› Issue (4) : 433 -449. DOI: 10.1007/s11518-021-5496-2
Article

GPSPiChain-Blockchain and AI based Self-Contained Anomaly Detection Family Security System in Smart Home

Author information +
History +
PDF

Abstract

With advancements in technology, personal computing devices are better adapted for and further integrated into people’s lives and homes. The integration of technology into society also results in an increasing desire to control who and what has access to sensitive information, especially for vulnerable people including children and the elderly. With blockchain rise as a technology that can revolutionize the world, it is now possible to have an immutable audit trail of locational data over time. By controlling the process through inexpensive equipment in the home, it is possible to control whom has access to such personal data. This paper presents a block-chain based family security system for outdoor tracking and in-house monitoring of users’ activities via sensors to detect anomalies in users’ daily activities with the integration of Artificial Intelligence (AI). For outdoor tracking the locations of the consenting family members’ smart phones are logged and stored in a private blockchain which can be accessed through a node installed in the family home on a computer. The data for the whereabouts and daily activities of family members stays securely within the family unit and does not go to any third-party organizations. A Self-Organizing Maps (SOM) based smart contract is used for anomaly detection in users’ daily activities in a smart home, which notifies emergency contact or other family members in case of anomaly detection. The approach described in this paper contributes to the development of in-house data processing for outdoor tracking, and daily activities monitoring and prediction without any third-party hardware or software. The system is implemented at a small scale with one miner, two user nodes and several device nodes, as a proof of concept; the technical feasibility is discussed along with the limitations of the system. Further research will cover the integration of the system into a smart-home environment with additional sensors and multiple users, and ethical implementations of tracking, especially of vulnerable people, via the immutability of blockchain.

Keywords

Blockchain / security / global positioning system (GPS) / self-organizing maps (SOM) / smart home

Cite this article

Download citation ▾
Ali Raza, Lachlan Hardy, Erin Roehrer, Soonja Yeom, Byeong Ho Kang. GPSPiChain-Blockchain and AI based Self-Contained Anomaly Detection Family Security System in Smart Home. Journal of Systems Science and Systems Engineering, 2021, 30(4): 433-449 DOI:10.1007/s11518-021-5496-2

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

Allan B M, Arnould J P, Martin J K, Ritchie E G. A cost-effective and informative method of GPS tracking wildlife. Wildlife Research, 2013, 40: 345-348.

[2]

Arrington B, Barnett L, Rufus R, Esterline A. 25th International Conference on Computer Communication and Networks (ICCCN), 2016

[3]

Bajaj R, Ranaweera S L, Agrawal D P. GPS: location-tracking technology. Computer, 2002, 35: 92-94.

[4]

Castro M, Liskov B. OSDI, 1999

[5]

Collins A. Contemporary Security Studies, 2016

[6]

Crosby M, Pattanayak P, Verma S, Kalyanaraman V. Blockchain technology: Beyond bitcoin. Applied Innovation, 2016, 2: 71

[7]

Divya M, Biradar N B. IOTA-next generation blockchain. International Journal of Engineering Computer Science, 2018, 7: 23823-23826.

[8]

Eisses J, Verspeek L, Dawe C, Dijkstra S (2018). Effect Network: Decentralized Network for Artificial Intelligence.

[9]

Hagel J, Brown J S, Samoylova T, Lui M. Deloitte Center for the Edge, 2013

[10]

Hanke T, Movahedi M, Williams D (2018). Dfinity technology overview series, consensus system. arXiv preprint 1805.04548.

[11]

Hay J. Designing homes to be the first line of defense: Safe households, mobilization, and the new mobile privatization. Cultural Studies, 2006, 20: 349-377.

[12]

Kiayias A, Russell A, David B, Oliynykov R. Annual International Cryptology Conference, 2017

[13]

Kohonen T, Honkela T (2007). Kohonen network. Available: http://www.scholarpedia.org/article/Kohonennetwork

[14]

Komninos N, Philippou E, Pitsillides A. Survey in smart grid and smart home security: Issues, challenges and countermeasures. IEEE Communications Surveys & Tutorials, 2014, 16(4): 1933-1954.

[15]

Koshima H, Hoshen J. Personal locator services emerge. IEEE Spectrum, 2000, 37: 41-48.

[16]

Kremer S, Ryan M, Smyth B. European Symposium on Research in Computer Security, 2010

[17]

Liu Z, Zhang A, Li S. Proceedings of 2013 IEEE International Conference on Vehicular Electronics and Safety, 2013

[18]

Lyu M, Sherratt D, Sivanathan A, Gharakheili H H, Radford A, Sivaraman V. Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

[19]

Mascheroni G, Ólafsson K. Lse Research Online Documents on Economics, 2014

[20]

Melgosa A, Scott R. School Internet Safety More than ‘Block It to Stop It’. The Education Digest, 2013, 79: 46

[21]

Nakamoto S (2008). Bitcoin: A peer-to-peer electronic cash system. Available: https://bitcoin.org/bitcoin.pdf

[22]

Noury N, Hadidi T, Laila M, Fleury A, Villemazet C, Rialle V, Franco A. 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2008

[23]

Philips Hue Tap Wireless Smart Switch. Available: https://www.harveynorman.com.au/philips-hue-tap-wireless-smart-switch.html.

[24]

Poushter J. Smartphone ownership and internet usage continues to climb in emerging economies. Pew Research Center, 2016, 22: 1-44.

[25]

Sagiroglu S, Sinanc D. International Conference on Collaboration Technologies and Systems (CTS), 2013

[26]

Sha L, Gopalakrishnan S, Liu X, Wang Q. IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2008), 2008

[27]

Shin D-H. The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers, 2010, 22: 428-438.

[28]

SIM900 Datasheet. Available: https://components101.com/sites/default/files/component_datasheet/SIM900A%20Datasheet.pdf

[29]

Soria-Comas J, Domingo-Ferrer J. Big data privacy: Challenges to privacy principles and models. Data Science and Engineering, 2016, 1: 21-28.

[30]

Starosta P, Brzeziński K. The structure of social trust in post-industrial cities of Central and Eastern Europe. Przegląd Socjologiczny, 2014, 63: 49-79.

[31]

Subbalakshmi S, Madhavi K. Security challenges of Big Data storage in Cloud environment: A survey. International Journal of Applied Engineering Research, 2018, 13: 13237-13244.

[32]

Urwyler P, Rampa L, Stucki R, Büchler M, Müri R, Mosimann U P, Nef T. Recognition of activities of daily living in healthy subjects using two ad-hoc classifiers. Biomedical Engineering Online, 2015, 14: 54.

[33]

Varadharajan V. Internet filtering-issues and challenges. IEEE Security, Privacy, 2010, 8: 62-65.

[34]

Wang X, Wong A K S, Kong Y. The International Conference on Information Network, 2012

[35]

Yang W, Garg S, Raza A, Herbert D, Kang B. Pacific Rim Knowledge Acquisition Workshop, 2018

[36]

Yeh S C, Hsu W H, Su M Y, Chen C H, Liu K H. International Conference on Networking, Sensing and Control, 2009

[37]

Zhang T, Luo Z, Zhou F, Yang X. The 9th International Conference for Young Computer Scientists, 2008

AI Summary AI Mindmap
PDF

153

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/