Research Article
Designing Efficient Smart Home Management with IoT Smart Lighting: A Case Study
Table 2
Comparison of principal characteristics of the most relevant security technologies.
| Ref. | Hardware design | Sensors | Purpose | Application | Prices | Security |
| [25] | Digital fingerprints | No | Reduced cost solution for authenticating edge devices | No | >$1000 | No | [26] | Intel Galileo board | Temperature | A secure solution for IoTs smart home | ThinkSpeak | >$1000 | TBSA | [27] | No | No | Modified hash-chain authentication mechanisms | No | No | Hash train | [28] | No | No | Developed a security framework | No | No | Hash function | [29] | No | No | Established data protection mechanisms | No | NA | Hash function | [30] | No | No | Find the optimal hash function in order to increase security | Contiki OS | No | SHA function | [31] | No | No | Developed a security framework based on ZigBee protocol | Yes | No | AES-128 | [32] | No | No | A secure solution for IoTs smart home | No | No | Hash function & XOR | [33] | No | No | A secure solution for IoTs smart home | No | No | Hash function & XOR | [34] | Yes | Yes | Developed a security framework | No | No | Logical sensing | [35] | No | No | Developed a security framework | Yes | No | Soft-security | [36] | Yes | Yes | Developed a security framework based on IoT | No | Low-cost | Stereo matching | Our proposed | Yes | Yes | The design of a smart light system developed on a security framework for IoT smart home with a low-cost and enhanced security | Yes | <$200 | SHA-256 |
|
|