Please wait a minute...
Computer & Telecommunication
Current Issue | Archive | Adv Search |
Study on the Security of Smart Home System
ZHENG Jian-guo
Zhejiang Post and Telecommunications College
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  With the development of Internet of Things, the smart home system has been widely used, providing users with an intelligent home life experience. However, the smart home system also has some security risks. Therefore, it is necessary to strengthen the smart home system security program design, enhancing the security of smart home system. This article briefly describes the concept and architecture of smart home system, analyzes the its security model, and explores on the design of system security program,hoping to provide some reference.
Key wordssmart home      system      security     
:  TN929.5  
  TP391.45  

Cite this article:

ZHENG Jian-guo. Study on the Security of Smart Home System. Computer & Telecommunication, 2018, 1(3): 19-20.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2018/V1/I3/19

[1] LI Gai GUO Ze-hao. TrustOCCR: Social One Class Collaborative Ranking Recommendation Algorithm by Trust[J]. 电脑与电信, 2024, 1(6): 7-10.
[2] DING Wen-chao YU Shuang-bo XUE Yan-zhu FANG Dong-li. A Trust Service Adaptation Method Based on Security Proxy[J]. 电脑与电信, 2024, 1(6): 31-34.
[3] LI Chun-hui WANG Xiao-ying ZHANG Qing-jie LIU Han-zhuo LIANG Jia-ye GAO Ning-kang. DDoS Attack Detection Method Based on Multi-scale Convolutional Neural Network [J]. 电脑与电信, 2024, 1(6): 35-.
[4] LI Jing-feng QIAO Gao-xue . Research on Intelligent Elevator Blocking System Based on Mobile Internet of Things[J]. 电脑与电信, 2024, 1(6): 78-83.
[5] CHEN Liang ZHU Yuan-kai LI Chang-ying. Application of Modified Chameleon Swarm Algorithm in Power System Stability[J]. 电脑与电信, 2024, 1(5): 69-.
[6] CHEN Yang WANG Wei . Design and Implementation of an Intelligent Chemical Park Management System Based on B/S Architecture[J]. 电脑与电信, 2024, 1(5): 92-.
[7] SHAO Ze-jun  DAI Bing  HU You-ming  YIN Jun-han  LIU Yue-chao. Research on the Autonomous and Controllable Maturity of Provincial Enterprise Data Centers: Take Shandong Province for Example[J]. 电脑与电信, 2024, 1(5): 103-.
[8] WU Guo-song. The Implementation of IPv6 Network Deployment and IPv4 Network Security Reinforcement for Web Application Systems Based on Intelligent DNS and Reverse Proxy[J]. 电脑与电信, 2024, 1(3): 7-.
[9] ZHANG Bi-xian. Research on the Reform of Practical Teaching System of the Crossover of Computer Major and Modern Medicine for New Engineering Education: A Case Study of Fuzhou Institute of Technology[J]. 电脑与电信, 2024, 1(3): 21-.
[10] LIU Ping WANG Shi-wei JIANG Meng-yun. Research on the Ideological and Political Education in the Courses of Embedded System in Applied Undergraduate[J]. 电脑与电信, 2024, 1(3): 24-.
[11] BAO Hai-yan. Leading by Ideological and Political Education, Integrating Industry and Education --Research on the Teaching Innovation of Computer Network Security[J]. 电脑与电信, 2024, 1(1): 4-7.
[12] LI Rui-xia  WANG Yan. Research on the Diversified Curriculum System of Vocational Colleges under the Background of Industry and Education Integration[J]. 电脑与电信, 2024, 1(1): 40-42.
[13] PAN Mei-qin ZHU Fa-cai PENG Hai-ling ZHOU Yuan.
Exploration on Ideological and Political Education of Fundamentals of Program Design in IoT Major
[J]. 电脑与电信, 2023, 1(1-2): 22-26.
[14] HU Li-hua ZHANG Ji-fu LIU Ai-qin. Teaching Reform and Practice on Compiling Principle for Ability Training of Computer System[J]. 电脑与电信, 2023, 1(11): 42-44.
[15] LI Jing ZHAO Ming-chao.
Application and Research of Classroom Response System in Instructional Design
——Take Ottawa University for Example
[J]. 电脑与电信, 2022, 1(9): 4-9.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd