Research Article

Designing Efficient Smart Home Management with IoT Smart Lighting: A Case Study

Table 2

Comparison of principal characteristics of the most relevant security technologies.

Ref.Hardware designSensorsPurposeApplicationPricesSecurity

[25]Digital fingerprintsNoReduced cost solution for authenticating edge devicesNo>$1000No
[26]Intel Galileo boardTemperatureA secure solution for IoTs smart homeThinkSpeak>$1000TBSA
[27]NoNoModified hash-chain authentication mechanismsNoNoHash train
[28]NoNoDeveloped a security frameworkNoNoHash function
[29]NoNoEstablished data protection mechanismsNoNAHash function
[30]NoNoFind the optimal hash function in order to increase securityContiki OSNoSHA function
[31]NoNoDeveloped a security framework based on ZigBee protocolYesNoAES-128
[32]NoNoA secure solution for IoTs smart homeNoNoHash function & XOR
[33]NoNoA secure solution for IoTs smart homeNoNoHash function & XOR
[34]YesYesDeveloped a security frameworkNoNoLogical sensing
[35]NoNoDeveloped a security frameworkYesNoSoft-security
[36]YesYesDeveloped a security framework based on IoTNoLow-costStereo matching
Our proposedYesYesThe design of a smart light system developed on a security framework for IoT smart home with a low-cost and enhanced securityYes<$200SHA-256