Systematic Survey On Smart Home Safety and Security Systems Using The Arduino Platform
Systematic Survey On Smart Home Safety and Security Systems Using The Arduino Platform
fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3008610, IEEE Access
Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000.
Digital Object Identifier 10.1109/ACCESS.2017.DOI
ABSTRACT Smart home safety and security systems have gained much importance over the last few
years owing to their notable impact in reducing and preventing losses in resources and human life caused
by unwanted situations that could occur while homeowners are far away from their homes. To date, there is
a lack of an in-depth literature analysis that could help researchers and developers better understand these
systems and their applications in different contexts. It is therefore crucial that research evidence published
in this area is presented. In this study, 63 research papers that examined smart home safety and security
systems using the Arduino platform from popular literature databases were thoroughly surveyed to extract
useful data. Then, the extracted data were analyzed to answer many research questions concerning state-of-
the-art applications of these systems, their architectures, their enabling technologies, their components, etc.
In addition, several challenges that these systems currently face and how future research could enable better
implementation and use of these systems were discussed.
INDEX TERMS Arduino, smart homes, safety systems, security systems, sensors and actuators, architec-
tures, enabling technologies.
VOLUME 4, 2016 1
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3008610, IEEE Access
security systems starts with monitoring the surrounding envi- data in smart homes. Additionally, the technologies required
ronment and then reacting to the abovementioned unexpected to enable IoT and big data in smart homes were provided,
incidents that may occur while homeowners are away by along with their possible applications and services. In [8],
sending alert notifications. In addition, some proper actions the authors described the benefits and applications of using
may also be taken by the systems such as stopping fire the IoT in smart homes. Then, they dedicated a section to
through the spraying of water and reducing the concentra- IoT-based smart home security systems. In that section, they
tion of gas via air ventilation. The monitoring process of presented the use of sensors such as infrared (IR), passive
these systems is performed by means of sensors such as infrared (PIR) sensors, and cameras for developing motion
temperature sensors, gas sensors, and motion sensors. In detection security systems. Additionally, the authors in [9]
event of an emergency, these systems may send notifications provided different IoT-based smart home applications. Then,
such as messages and emails. Additionally, they may use they described a number of concerns about using the IoT
actuators such as buzzers, lights, and screens to notify nearby in smart home systems such as security, data management,
people. A communication medium is required to interact with communication issues, etc. The authors in [10] and [11]
these systems. Wireless communication, such as the Global presented different interesting functions of smart home sys-
System for Mobile Communications (GSM), Bluetooth, and tems. Then, they described the monitoring and controlling
WiFi, is widely used in this context. Of course, the selection processes in smart homes and highlighted the advantages
of the appropriate communication medium is subject to a and disadvantages of various wireless technologies such as
number of factors, including the cost, range, and technical Bluetooth, GSM, ZigBee, and WiFi. Moreover, they pro-
specifications [5]. This study presents a detailed systematic vided an overview of different smart home architectures. The
survey covering the past six years to analyze the state-of-the- authors in [12]–[14] focused on the applications, enabling
art research evidence related to Arduino-based smart home technologies, and security challenges in smart homes. In [15],
safety and security systems. The study begins with defining the authors conducted a systematic review on smart home
several research questions (RQs) covering several aspects of systems and their applications from the users’ perspective.
this topic. Then, it identifies the related papers that should Additionally, they presented different types of smart home
be examined to answer the identified questions. Finally, it systems and their benefits. Then, they highlighted the chal-
concludes with a discussion of potential opportunities for lenges and barriers of implementing smart home systems.
research in the field. To achieve the aforementioned aims, The focus of the aforementioned studies was not to con-
the relevant published papers were collected and extensively duct a dedicated systematic literature study on smart home
analyzed using a systematic process. safety and security systems. In contrast, our paper presents
This systematic survey study was motivated by a number a comprehensive and systematic literature study with a well-
of factors: (a) Safety and security systems in smart homes are defined research methodology to investigate several aspects
an important topic of research. Therefore, it is imperative to of smart home safety and security systems, such as ap-
conduct a survey of related works to better understand the ap- plications, architectures, enabling technologies, challenges
plications, implementations, and current research directions with possible solutions, and possible research gaps. Thus, it
of this topic. (b) Carrying out a survey study could potentially extends the details of other works on this topic by addressing
benefit numerous researchers and developers interested in the nine important research questions that are not addressed in
field and aid in its future development. (c) There is no in- the literature. Potentially, this study provides a more detailed
depth survey study that explores the topic of this paper. survey on the development and use of smart home safety and
The remainder of this survey paper is structured as follows: security systems.
Section II presents the related works for this study. Section III
describes in detail the research methodology used to conduct III. RESEARCH METHODOLOGY
this study systematically. Section IV presents the results and In this study, the guidelines for conducting systematic map-
outcomes of the study. Section V presents the threats to ping studies [16] and systematic literature review studies
validity and the actions taken into account to avoid them. [17] were followed. The systematic process employed in this
Finally, the conclusions of the study are provided in Section study consists of five stages, as shown in Figure 1.
VI. The first stage is to identify the objectives and questions
of this study. Here, the study’s research problem is identified,
II. RELATED WORKS and various questions are defined to address the identified
This section briefly presents the most relevant literature problem. The search process is performed in the second
publications on the topic. The authors in [6] provided an stage. Here, a search strategy for selecting the relevant publi-
overview of smart homes and their main components. Then, cations on the topic of this study is specified. The third stage
they presented different security issues related to smart home is the selecting and filtering of the publications obtained from
systems. In addition, they provided a summary of the security the preceding stage. The fourth stage is the data extraction, in
studies that are conducted to address the security problems in which the relevant publications are extensively analyzed and
smart homes and some possible solutions. The authors in [7] the useful details needed to answer the identified questions of
presented a brief survey of the works that use the IoT and big this study are extracted. The final stage is the reporting and
2 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3008610, IEEE Access
B. SEARCH STRATEGY
1) Literature Sources
Five standard online databases that index the publications
relevant to the scope of this survey were selected as sources.
Table 1 presents these sources and their web-links.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3008610, IEEE Access
2) Snowballing
To reduce the risk of missing some relevant papers, the snow- FIGURE 2. Results of the paper selection process
balling search technique [20] was applied to the remaining
papers. In snowballing, the reference list of each paper is TABLE 2. Data extraction form
checked with the inclusion/exclusion criteria. Then, the paper
selection process is applied recursively to the papers that have Data Item Value RQ
Paper number Integer ID None
just been found. Paper title Title of the study None
Figure 2 shows the number of included and excluded pa- Publication year Calendar year RQ1
pers at each stage of the paper selection process. In addition, Publication type Category of publication type RQ1
Publication venue Name of publication venue RQ1
Table 14 lists all papers (with their references, titles, and Active university Name of the active universities and their RQ2
publication years) obtained after applying the paper selection details
process. Applications and Applications and enabling sensors of RQ3
enabling sensors Arduino-based safety and security systems
in smart homes
D. DATA EXTRACTION AND ANALYSIS Arduino boards Arduino boards used in smart home safety RQ4
From the selected papers, data were extracted and extensively and security systems
Alert notifications Alert notifications and response actions pro- RQ5
analyzed to answer the identified RQs. The extracted data and actions vided by Arduino-based smart home safety
were stored in an Excel sheet of various fields created specif- and security systems
ically for this study. Each field has a data item and a value, Architectures Architectures used in Arduino-based smart RQ6
home safety and security system
as presented in Table 2. In this stage, the data were extracted Architectures: de- Useful details and findings extracted from RQ7
first and then double-checked to ensure accuracy. tails and findings the identified system architectures
Challenges Challenges and issues of implementing and RQ8
using Arduino-based smart home safety and
IV. RESULTS
security systems
To answer the identified RQs of this study, all the selected Future Research Possible future research directions RQ9
publications were intensively analyzed. Each RQ, repre-
sented by a short title, is discussed in the following subsec-
tions based on the obtained results. publication number is an indication of the successful applica-
tions of Arduino-based safety and security systems in smart
A. DISTRIBUTION OF PUBLICATIONS (RQ1) homes. Another valid reason is the appearance of new techni-
1) Publication Frequency cal advancements in the IoT, pocket-sized microcontrollers,
All the selected papers of this study were analyzed to de- and a variety of affordable sensors/actuators, providing many
termine their publication frequency and evolution. Figure 3 possibilities for implementing and using these systems.
shows the results of this analysis. The results show that the
average number of publications per year is approximately 11 2) Publication Venue
papers. Additionally, it can be noted that the interest in this As evident in Figure 4, the selected studies are distributed
topic increased in the last three years. This increase in the across several publication venues, of which 60 are conference
4 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3008610, IEEE Access
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3008610, IEEE Access
detection", "Fire detection", and "Gas detection" have 41, 25, "ultrasonic", "camera", "IR", and "microwave" sensors,
and 23 relevant published papers, respectively. Additionally, respectively. It is worth mentioning that some papers
it is observable that some papers implemented more than one employed more than one type of motion sensor.
application area.
Ambient Temperature
Measurement Angle
can be detected via three detection methods, namely, motion-
Operating Voltage
Trigger Condition
Sensitivity Range
Sensing Type
Sensor Name
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3008610, IEEE Access
an intrusion activity. Each sensor is designed with two voltage will be. The lower the smoke concentration is,
parts: one part is set on a window or door frame, and the lower the output voltage will be. Analyzing the pa-
the other part is set on the window or door itself. Thus, pers considered in this study reveals that 100% (12/12)
when the two parts are separated from each other, the of the total published papers considered the "MQ2"
contact is broken, which triggers an alarm. Analyzing sensor in developing their systems, as shown in Figure
the papers considered in this study reveals that 100% 10.
(5/5) of the total published papers considered the "MC-
38" magnetic contact switch sensor in developing their
systems as shown in Figure 9.
Detection Method Published Papers Total FIGURE 11. Number of published papers vs. temperature sensor type
Smoke-based detection [23], [66], [43], [49], [32], [67], 12
[68], [69], [70], [71], [34], [72] It is worth mentioning that each sensor has its own set of
Temperature-based detection [3], [29], [39], [23], [42], [45], [68], 10
[70], [71], [73] technical specifications, and it is difficult for developers
Flame-based detection [24], [68], [55], [59], [74], [73], 8 to choose the most suitable sensor for building their
[63], [65] temperature-based fire detection systems. To help in this
Image-based detection [31] 1
respect, Table 8 briefly presents the main differences
between these four temperature sensors.
• Smoke-based detection: In this type of detection, • Flame-based detection: Flame sensors can also be used
smoke sensors are used to detect the presence of smoke to detect fire and they are available in two main types,
(which is a main indicator of fire occurrence) in the namely, ultraviolet (UV)-based flame sensors and IR-
monitoring area. These sensors work on the basis of the based flame sensors. As most types of fire produce
relationship between voltage and the measured smoke certain levels of UV radiation in the atmosphere, UV
concentration in the atmosphere. In other words, the sensors can be used to detect these levels of radiation.
higher the smoke concentration is, the higher the output The main drawback of these sensors is that they can
VOLUME 4, 2016 7
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3008610, IEEE Access
TABLE 8. Comparison of temperature sensors the wide range of their detection compared to other
methods. Here, the fire detection process is performed
Temperature Range
Operating Voltage
Library Required
via four main steps: (a) Image acquisition: here, images
Output Signal
Measurement
Sensor Name
Accuracy
might be preprocessed via different techniques (e.g.,
contrast adjustment, intensity adjustment, and color
Temperature +/-2ºC conversion) to enhance their quality or to reduce their
DHT11 Digital 3-5.5V 0-50ºC Yes
Humidity (at 0-50ºC)
Temperature +/-0.5ºC computational complexity [82]. (c) Image similarity
DHT22 Digital 3-6V -40-80ºC Yes measurement: here, two captured images are compared
Humidity (at -40-80ºC)
+/-0.5ºC to each other to decide how close they are. This can be
LM35 Temperature Analog 4-30V -55-150ºC No
(at 25ºC)
+/-0.5ºC
performed by using different image similarity measure-
DS18B20 Temperature Digital 3-5.5V -55-125ºC Yes ments (e.g., Euclidean distance, Mahalanobis distance,
(at -10-85ºC)
and Chord distance) [83]. The outcome from this step
is then used to check whether there is fire in a specific
produce false alarms as a result of detecting other UV monitoring area or not. (d) Image background subtrac-
sources, such as electrical sparks and lighting. Addition- tion: here, the regions of image intensity changes due
ally, their detection could be inhibited by thick smoke, to fire can be extracted for further processing. Often,
vapor, and dust. On the other hand, IR sensors can detect the absolute image subtraction method represented by
fires that emit light in the infrared spectrum. The main |image1-image2| is used for this purpose. Thus, the
drawback of these sensors is that they can produce false output pixels will mostly be zero values in the regions
alarms because they have poor detection performance where no intensity changes are found. Otherwise, the
for stable flames. Analyzing the papers considered in pixels in regions where intensity changes are found
this study reveals that 100% (8/8) of the total published will exhibit significant absolute differences between the
papers considered the "YG1006" IR sensor in develop- two compared images (image before fire and image
ing their systems, as shown in Figure 12. There are many after fire). In most cases, the output from this step is
valid reasons for preferring IR sensors over UV sensors, not very meaningful. Thus, the representation of the
including the fact that IR sensors are more insensitive to output image is converted into another new image that
dust and dirt, are more insensitive to light, and provide is more meaningful and easy to analyze. To do so, the
good detection within the range of approximately 60 thresholding method is employed to convert the output
metre from fire sources. image into a binary image that shows the impact and
size of fire in a more understandable way [84].
3) Gas Detection
LPG is a colorless odorless liquid that readily evaporates into
a gas. Normally, it is provided in cylinders, with odorants
added to help detect leaks. LPG is an essential need of every
household, as it is used for cooking and heating. However, its
FIGURE 12. Number of published papers vs. flame sensor type
leakage could lead to disasters. When the gas meets a source
of ignition, it can burn or explode. Inhaling LPG vapor at
Table 9 presents the technical specifications of the
high concentrations even for a short time can cause fainting,
"YG1006" flame sensor.
asphyxiation, and/or death. Here, different gas sensors can
TABLE 9. "YG1006" sensor specifications be used to detect the presence of gas in the atmosphere.
Analyzing the papers considered in this study reveals that
Specification Detail
Operating Voltage 3.3V-5V the "MQ2", "MQ5", "MQ6", and "MQ9" gas sensors are the
On-board Chip LM393 focus of researchers in the literature. Figure 13 shows this
Detection Angle 60 degrees information. The figure also shows that approximately 70%
Wavelength Detection Range 760nm-1100nm
Distance Detection Range Up to 60 meters
(16/23), 22% (5/23), 4% (1/23), and 4% (1/23) of the total
Dust/Dirt Sensitivity Very low published papers considered "MQ2", "MQ5", "MQ6", and
Light Sensitivity Very low "MQ9", respectively.
Table 10 presents the target gas and concentration range of
• Image-based detection: In this type of detection, im- these four MQ series gas sensors [85].
ages captured by cameras are processed with complex
image processing and analysis techniques to detect D. MOST USED ARDUINO BOARDS (RQ4)
changes, including fire occurrence [81]. The main ad- The smart home safety and security systems in the con-
vantage of using image-based fire detection systems is sidered papers of this study are based on Arduino boards.
8 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3008610, IEEE Access
Operating Voltage
Processor Type
Flash Memory
Analog Inputs
Board Name
Clock Speed
Digital I/O
SRAM
PWM
Uno 5V ATmega328P 16 MHz 14 6 6 32 KB 2 KB
Mega 5V ATmega2560 16 MHz 54 16 15 256 KB 8 KB
Due 3.3V ATSAM3X8E 84 MHz 54 12 12 512 KB 96 KB
FIGURE 13. Number of published papers vs. gas sensor type
ATmega32U4 16 MHz 32 KB 2.5 KB
Yun 5V 20 12 7
AR9331 Linux 400 MHz 64 MB 16 MB
ATmega168 16 KB 1 KB
TABLE 10. MQ sensors target gas Nano 5V 16 MHz 14 8 6
ATmega328P 32 KB 2 KB
Leonardo 5V ATmega32U4 16 MHz 20 12 7 32 KB 2.5 KB
Sensor Model Target Gas Detect Concentration
MQ2 LPG, Methane, Butane, Smoke 300-10000ppm
MQ5 LPG, Natural Gas 300-10000ppm
MQ6 LPG, Butane 200-10000ppm actions (e.g., to stop or reduce the impact of dangerous
MQ9 LPG, Carbon Monoxide, Coal 100-10000ppm situations) in response to these undesired situations. Ana-
Gas, Liquefied Gas lyzing the selected papers reveals that "playing sound" and
"sending SMS" with approximately 60% (38/63) and 46%
(29/63) of the total published papers, respectively, are the
These boards are open-source microcontroller-based boards
two most commonly used notification mechanisms. Figure
developed by "Arduino.cc" [86]. Each board has a number
15 shows this information. It is worth mentioning that many
of digital input/output pins, a number of analog input/output
studies employed more than one notification mechanism in
pins, can be powered by a USB cable or by an external power
their systems. Sound is played using buzzers/speakers. The
supply, and is programmable with the Arduino program-
sound of an alarm scares off intruders/infiltrators and catches
ming language. Arduino pins can be interfaced with various
the attention of nearby people towards event taking place.
sensors, actuators, modules, and shields to further expand
Sending SMS messages to designated phone numbers (e.g.,
each board’s capabilities and thus provide more functionality
to homeowners, police stations, or fire stations to enable them
to users [87]. Figure 14 shows the most commonly used
to take proper actions) is performed using GSM communica-
Arduino boards in the selected studies. It is worth mentioning
tion.
that some studies used two boards in a single system. How-
ever, it can be noted that "Arduino Uno" and "Arduino Mega"
are the most used boards, with percentages of approximately
65% (41/63) and 30% (19/63) of the total publications,
respectively. Table 11 presents a brief comparison of the used
Arduino boards.
FIGURE 14. Number of published papers vs. Arduino board Regarding the proper actions considered against unwanted
situations, Figure 16 shows that "water sprinkling", "exhaust
fan", and "fire extinguisher" with approximately 11% (7/63),
E. ALERT NOTIFICATIONS AND RESPONSE ACTIONS 5% (3/63), and 2% (1/63) of the total published papers ,
(RQ5) respectively, are the only three proper actions used. Water
When any unwanted situation (e.g., gas leak, fire, and in- sprinkling is performed via a solenoid valve, which is a valve
trusion) occurs while homeowners are far away, it is crucial switch controlled by an electromagnet. The used valve is a
for the installed safety and security systems to activate alert normally closed (NC) valve, which means that if pressurized
notifications to notify owners or even perform some proper water is supplied to an NC solenoid valve, water will not
VOLUME 4, 2016 9
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3008610, IEEE Access
flow through the valve. If a suitable power is supplied to communication medium (ZigBee). The receiver XBee
the valve, the valve will open, and the water will flow. An board is then connected to the Arduino board. The
exhaust fan is a device used to pull out (by moving the air Arduino board is connected to the Internet using the
from inside to outside) the air in a room/house via fans or Arduino Ethernet shield. This connection provides the
blowers. Using exhaust fans helps to clear smoke or leaked opportunity to use an embedded web server that can be
gas. A fire extinguisher is a fire protection device used accessed remotely from everywhere. The Arduino board
for extinguishing or preventing fires. In smart homes, the continuously uploads the readings from the sensors to
extinguisher is controlled and turned on by a servo motor. the embedded web server. Thus, the user can use his/her
mobile phone for example to wirelessly access and
display the readings stored in the web server. Figure 18
shows this architecture type.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3008610, IEEE Access
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3008610, IEEE Access
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3008610, IEEE Access
FIGURE 25. Smart home architecture 8 FIGURE 27. Smart home architecture 10
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3008610, IEEE Access
FIGURE 29. Smart home architecture 12 nected to the mobile network using GSM. In case of an
emergency, the Arduino board will activate alarms via
the actuators and then will send an alarm notification
shows this architecture type. wirelessly to the user. Figure 32 shows this architecture
type.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3008610, IEEE Access
FIGURE 33. Smart home architecture 16 FIGURE 34. Smart home architecture 17
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3008610, IEEE Access
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3008610, IEEE Access
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3008610, IEEE Access
FIGURE 41. Number of published papers vs. connection type • Internet outage: Many of the proposed systems de-
pend on the Internet to send alarm notifications or to
TABLE 13. Comparison between Wifi and Ethernet connections upload readings obtained from different sensors to the
cloud to be accessed by users. Without Internet con-
Factors Wifi Ethernet nectivity, users will not be notified of any unwanted
Speed Slow data transfer speed Faster data transfer speed situations. To overcome this issue, the installed system
Reliability Suffers from signal inter- Does not suffer from sig-
ference to due environ- nal interference should periodically check the Internet connectivity. In
mental conditions the case of Internet outages, the system should be able
Security Data needs to be en- Data does not require to to send its notifications and upload its readings once
crypted be encrypted
Latency Higher Lower the Internet is available again. Another valid solution
Cable Installation Not required Required is to employ GSM technology in addition to using the
Deployment Easy to install and deploy Difficult to install and de- Internet [47], [55]. When there is no Internet, GSM
ploy
communication can be used.
• Software compatibility: In the papers considered in
this study, all the proposed systems that enable home-
duino and their enabling technologies. The following points owners to use mobile applications to access the readings
summarize those challenges and issues. of sensors or interact with the system have associated
• Physical attacks: The distributed and unattended na- Android native mobile applications that were created
ture of sensors and actuators installed in smart homes for this purpose. The rationale for developing mobile
makes them susceptible to different types of physical applications for only Android-based devices is the fact
attacks [91]. They may physically be destroyed (e.g., that Android has become the most popular operating
via physical force, heat, or counterfeiting of their asso- system for mobile phones and tablets [57]. Considering
ciated circuitry), disabled, or even stolen. Therefore, it that all homeowners have Android-based devices is not
is essential to install and deploy these devices in secure viable. To overcome this issue, web applications or
locations to protect them against physical attacks [92]. hybrid mobile applications that are developed using web
• Device failure: Because there are a number of sensors, technologies (e.g., HTML, CSS, and JavaScript) can be
actuators, and microcontrollers that communicate with used instead of native mobile applications. Doing so will
each other, failure in one of these devices may lead enable users to utilize the proposed systems using smart
to failure of the entire system. It is recommended that phones with any operating system installed or by using
when the installed system starts working, it should dis- computers. Web applications provide full interoperabil-
play the status of all connected devices to the user. Thus, ity or cross-platform compatibility features. Therefore,
the user from the beginning will notice if any device is they can be accessed and used by any software plat-
not working properly. Otherwise, the developed system form. On the other hand, developing native mobile
should be adaptable and continue working in case of applications limits their use [93]. In addition, any large
simple failures or immediately warn users about the change occurring in that platform means that the whole
occurrence of any failure. application will need to be changed accordingly, which
• Power outage: A power outage due to damaged elec- is not feasible and time consuming.
trical transmission lines, short circuits, etc., prevents • Arduino clones: Most of the proposed systems in the
the deployed system from delivering its services to the literature used Arduino clones, not original devices, in
user. One valid solution to this issue is to use power their systems. This may lead to problems in the long
backups such as solar panels with rechargeable batteries run for many reasons owing to the following: (a) They
to power the system [59]. There are many benefits of are not made from the best hardware components (e.g.,
using solar energy, including the fact that it does not integrated circuits (ICs), I/O pins, communication ports,
harm the environment/atmosphere and can be collected and soldering materials). (b) They have the issue of
every day, even on cloudy days [65]. drivers not working on some operating systems. (c)
18 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3008610, IEEE Access
They are not fully tested for better quality before being usage, and SRAM usage, different coding strategies
shipped. (optimization) can be employed. However, analyzing
• Security: Many of the proposed systems utilize the the considered papers reveals that no study analyzed
IoT to deliver services to homeowners. However, the and measured the impact of writing efficient code for
IoT core physical components, such as wireless sensor programming Arduino-based safety and security sys-
networks (WSNs) and wireless communication devices, tems. Additionally, to use sensors such as DHT11 and
are vulnerable to various security threats [94]. This is DHT22 for measuring humidity and temperature, an
because these components suffer from resource lim- external software library must be included in the code.
itations, computing constraints, small storage spaces, For example, the libraries: [96], [97], and [98] can all
and limited wireless channel bandwidth. Any security be used to program the DHT11 sensor, but one of them
threat in this respect may lead to the entire system provides better performance and outperforms the others
being compromised. To overcome this security issue, in terms of runtime, flash memory usage, and SRAM
software and hardware enhancements may be useful in space. There is no study in the literature addressing
some cases. To address the issue properly and com- this important issue. Therefore, it will be interesting to
prehensively, sophisticated countermeasures must be examine the capabilities and performance of each avail-
applied, such as malicious node detection techniques, able library to help developers select the most suitable
lightweight encryption algorithms, secure key manage- one.
ment mechanisms, and secure routing protocols [95]. • Visualization: Using a large number of different sensors
in homes can create a large amount of data related to
I. FUTURE DIRECTIONS OF RESEARCH (RQ9) what is happening in one’s home. However, if these
Several possible directions for future research were identified data are not reduced and visualized in a meaningful
based on the analysis of the papers included in this study. and understandable way, they will overwhelm the home-
These future directions are summarized and categorized un- owner. One solution to this issue is to apply filters to
der the following points: separate the sensors readings into different abstraction
• Extendability: The installed Arduino-based smart levels. Thus, the homeowner can look for the data
home safety and security systems should allow home- within a specific level only instead of going through
owners to add new types of sensors and actuators when all the displayed data. In this way, the user can better
needed without making large changes to the software understand the displayed data. Additionally, it has been
and hardware design. This can be achieved by allowing found that most developed systems display raw sensors
owners to add new devices and then register (e.g., by data to users who are mostly nontechnical and thus
providing the type of device, type of device output, and cannot understand the data without it being processed
device pin) them using a new software feature called and displayed in an informative format.
“add new sensor/actuators” that should be provided by • Testing: Smart home safety and security system testing
the software application developed for this purpose. requires a variety of connected sensors, actuators, and
Here, one issue that developers may face could be un- devices to be deployed and then actually tested. In
derstanding how the software functionality for a specific practice, certain situations such as considering fire in
added device will be added or generated. In addition, all the rooms of a house are difficult and not safe to
what will the impact, cost, or effort be in achieving this? be provided. Therefore, developers should be equipped
An intensive investigation in this regard can therefore be with various types of simulation software to resolve
considered a successful step forward. this deployment issue. These tools should allow various
• Satisfaction: The goal of using smart home safety and critical scenarios to be simulated and should also allow
security systems is to help notify homeowners in the testing systems under these scenarios before they are
event of an unwanted situation while they are far from used in reality.
home. However, are homeowners truly satisfied with
using the developed systems? In the considered papers, V. THREATS TO VALIDITY
there is no research addressing this important concern. Different threats may affect the validity of literature survey
Thus, it is crucial to measure user satisfaction and even studies. For this paper, the following actions were taken into
involve it in some parts of the development process. consideration to avoid threats to validity.
• Performance: Arduino devices suffer from resource • Finding related papers: It cannot be ensured whether
limitations and computing capabilities (e.g., limited all the related studies can be found. Thus, several litera-
code storage space, limited data memory size, and ture databases were used and a search string with several
limited processing power). Therefore, it is crucial to term synonyms was applied to obtain the relevant stud-
efficiently program these devices, especially when the ies. However, there may still remain some undiscovered
aim is to develop time-sensitive applications where each papers. To address this threat, there was intensive appli-
second matters. To increase the performance of Arduino cation of the snowballing search technique to reduce the
programs in terms of execution time, flash memory probability of missing important relevant papers.
VOLUME 4, 2016 19
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3008610, IEEE Access
• Accuracy of data extraction: Many mistakes may [6] M. B. Yassein, I. Hmeidi, F. Shatnawi, W. Mardini, and Y. Khamayseh,
occur when extracting data from the selected papers. “Smart home is not smart enough to protect you - protocols, challenges
and open issues,” Procedia Computer Science, vol. 160, pp. 134 – 141,
To tackle this threat, the data extraction process was 2019.
performed manually. Automatic mining and filtering [7] A. Daissaoui, A. Boulmakoul, L. Karim, and A. Lbath, “Iot and big data
provided by Microsoft Excel were also used in the analytics for smart buildings: A survey,” Procedia Computer Science, vol.
170, pp. 161 – 168, 2020.
spreadsheet. The results from both methods were then [8] V. Williams, S. Terence J., and J. Immaculate, “Survey on internet of
compared to determine the differences and reach a final things based smart home,” in 2019 International Conference on Intelligent
dataset. Sustainable Systems (ICISS), 2019, pp. 460–464.
[9] M. Alaa, A. Zaidan, B. Zaidan, M. Talal, and M. Kiah, “A review of smart
• Study reproducibility: Another threat is whether other home applications based on internet of things,” Journal of Network and
researchers could obtain similar results if they per- Computer Applications, vol. 97, pp. 48 – 65, 2017.
form/duplicate this study. To address this threat, all [10] M. Asadullah and A. Raza, “An overview of home automation systems,” in
the steps of the research methodology followed and 2016 2nd International Conference on Robotics and Artificial Intelligence
(ICRAI), 2016, pp. 27–31.
performed in this study were described in detail (see [11] M. Hasan, P. Biswas, M. T. I. Bilash, and M. A. Z. Dipto, “Smart
Section III). home systems: Overview and comparative analysis,” in 2018 Fourth
International Conference on Research in Computational Intelligence and
Communication Networks (ICRCICN), 2018, pp. 264–268.
VI. CONCLUSIONS
[12] K. Karimi and S. Krit, “Smart home-smartphone systems: Threats, security
This survey systematically reports the state-of-the-art con- requirements and open research challenges,” in 2019 International Confer-
tributions in smart home safety and security systems using ence of Computer Science and Renewable Energies (ICCSRE), 2019, pp.
1–5.
Arduino. Thus, to classify, compare, and discuss the appli-
[13] N. Komninos, E. Philippou, and A. Pitsillides, “Survey in smart grid
cations, the enabling sensors, the Arduino boards, the alert and smart home security: Issues, challenges and countermeasures,” IEEE
notifications, and the architectures that have been employed Communications Surveys Tutorials, vol. 16, no. 4, pp. 1933–1954, 2014.
and used in these systems were identified. In this study, [14] C. Lee, L. Zappaterra, Kwanghee Choi, and Hyeong-Ah Choi, “Secur-
ing smart home: Technologies, security challenges, and security require-
63 relevant research papers from five well-known literature ments,” in 2014 IEEE Conference on Communications and Network
databases published over the past six years from 2014-2019 Security, 2014, pp. 67–72.
were selected. The published papers were a mixture of con- [15] D. Marikyan, S. Papagiannidis, and E. Alamanos, “A systematic review of
the smart home literature: A user perspective,” Technological Forecasting
tributions from conferences, journals, and workshops, with and Social Change, vol. 138, pp. 139 – 154, 2019.
the majority of papers being published in conferences. The [16] K. Petersen, S. Vakkalanka, and L. Kuzniarz, “Guidelines for conducting
considered papers were extensively reviewed and analyzed systematic mapping studies in software engineering: An update,” Informa-
tion and Software Technology, vol. 64, pp. 1–18, 2015.
from different perspectives and were based on a set of RQs. [17] B. Kitchenham and S. Charters, “Guidelines for Performing Systematic
The obtained results yielded many categories. For example, Literature Reviews in Software Engineering,” version 2.3., EBSE Techni-
statistics regarding the selected papers, publication venues, cal Report EBSE- 2007-01, Software Engineering Group, School of Com-
puter Science and Mathematics, Keele University, UK and Department of
and active universities were given. Then, the applications of Computer Science, University of Durham, 2007.
these systems were classified. All the sensors, actuators, noti- [18] P. Brereton, B. A. Kitchenham, D. Budgen, M. Turner, and M. Khalil,
fications, and architectures that enabled the operation of these “Lessons from applying the systematic literature review process within the
systems were also discussed. The findings presented in this software engineering domain,” Journal of Systems and Software, vol. 80,
no. 4, pp. 571–583, 2007.
survey could be of great value to other researchers interested [19] S. Gunputh, A. P. Murdan, and V. Oree, “Design and implementation of
in the topic. Therefore, we hope this systematic survey will be a low-cost Arduino-based smart home system,” in IEEE 9th International
considered a primary reference that can facilitate the process Conference on Communication Software and Networks (ICCSN). IEEE,
2017, pp. 1491–1495.
of finding the most relevant information. [20] C. Wohlin, “Guidelines for snowballing in systematic literature studies and
a replication in software engineering,” in Proceedings of the 18th Interna-
REFERENCES tional Conference on Evaluation and Assessment in Software Engineering
[1] A. Adriansyah and A. W. Dani, “Design of small smart home system based (EASE). ACM Press, 2014, pp. 1–10.
on arduino,” in Proceedings - 2014 Electrical Power, Electronics, Commu- [21] O. Pedreira, F. García, N. Brisaboa, and M. Piattini, “Gamification in
nications, Control and Informatics Seminar (EECCIS). In conjunction with software engineering - a systematic mapping,” Information and Software
the 1st Joint Conference UB-UTHM, 2014, pp. 121–125. Technology, vol. 57, pp. 157–168, 2015.
[2] J. W. Lartigue, C. McKinney, R. Phelps, R. Rhodes, A. D. Rice, and A. Ry- [22] R. E. Lopez-herrejon, L. Linsbauer, and A. Egyed, “A systematic mapping
der, “A Tablet-controlled, Mesh-network Security System: An Architec- study of search-based software engineering for software product lines,”
ture for a Secure, Mesh Network of Security and Automation Systems Us- Information and Software Technology, vol. 61, pp. 33–51, 2015.
ing Arduino and Zigbee Controllers and an Android Tablet Application,” [23] N. Sinha, K. E. Pujitha, and J. S. R. Alex, “Xively based sensing and
in Proceedings of the 2014 ACM Southeast Regional Conference, 2014, monitoring system for IoT,” in International Conference on Computer
pp. 33:1–33:4. Communication and Informatics (ICCCI), 2015.
[3] M. F. M. Fuzi, A. F. Ibrahim, M. H. Ismail, and N. S. A. Halim, “HOME [24] G. Kesavan, P. Sanjeevi, and P. Viswanathan, “A 24 hour IoT framework
FADS: A dedicated fire alert detection system using ZigBee wireless for monitoring and managing home automation,” in International Confer-
network,” in Proceedings - 2014 5th IEEE Control and System Graduate ence on Inventive Computation Technologies (ICICT). IEEE, 2016, pp.
Research Colloquium (ICSGRC), 2014, pp. 53–58. 1–5.
[4] D. Chowdhry, R. Paranjape, and P. Laforge, “Smart home automation [25] I. Majumdar, B. Banerjee, M. T. Preeth, and M. K. Hota, “Design of
system for intrusion detection,” in Canadian Workshop on Information Weather Monitoring System and Smart Home Automation,” in ieee inter-
Theory (CWIT), 2015, pp. 75–78. national conference on system, computation, automation and networking
[5] W. Anani, A. Ouda, and A. Hamou, “A survey of wireless communications (ICSCAN). IEEE, 2018, pp. 1–5.
for iot echo-systems,” in IEEE Canadian Conference of Electrical and [26] P. Mahalakshmi, R. Singhania, D. Shil, and A. Sharmila, “Home Security
Computer Engineering (CCECE), 2019, pp. 1–6. System Using GSM,” in International Conference on Emerging Research
20 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3008610, IEEE Access
in Computing, Information, Communication and Applications, 2018, pp. Conference on Communication and Electronics Systems (ICCES). IEEE,
627–634. 2017, pp. 803–807.
[27] K. S. Obheroi, A. Chaurasia, T. Choudhury, and P. Kumar, “Economical [47] K. C. Sahoo and U. C. Pati, “IoT based intrusion detection system using
Home Monitoring System Using IOT,” in Proceedings of the Second PIR sensor,” in 2nd IEEE International Conference on Recent Trends in
International Conference on Computational Intelligence and Informatics, Electronics, Information Communication Technology (RTEICT). IEEE,
ser. Advances in Intelligent Systems and Computing. Singapore: Springer 2017, pp. 1641–1645.
Singapore, 2017, pp. 627–637. [48] H. M. Saber and N. K. Al-Salihi, “IoT: Secured and automated house,”
[28] K. Sehgal and R. Singh, “Iot Based Smart Wireless Home Security in International Carnahan Conference on Security Technology (ICCST).
Systems,” in 3rd International conference on Electronics, Communication IEEE, 2017, pp. 1–6.
and Aerospace Technology (ICECA). IEEE, 2019, pp. 323–326. [49] V. Hassanpour, S. Rajabi, Z. Shayan, Z. Hafezi, and M. M. Arefi, “Low-
[29] A. I. Nurrahman and K. Mutijarsa, “Intelligent home management system cost home automation using Arduino and Modbus protocol,” in 5th
prototype design and development,” in International Conference on Infor- International Conference on Control, Instrumentation, and Automation
mation Technology Systems and Innovation (ICITSI). IEEE, 2015, pp. (ICCIA). IEEE, 2017, pp. 284–289.
1–6. [50] S. Minocha and A. Dumka, “RFID Device Based Home Security System
[30] T. Juhana and V. G. Anggraini, “Design and implementation of Smart to Detect Intruder Trespassing,” in International Confrerence on Intelligent
Home Surveillance system,” in International Conference on Telecommu- Communication, Control and Devices, 2017, pp. 1445–1454.
nication Systems Services and Applications (TSSA). IEEE, 2016, pp. [51] S. S. Syazlina Mohd Soleh, M. M. Som, M. H. Abd Wahab, A. Mustapha,
1–5. N. A. Othman, and M. Z. Saringat, “Arduino-Based Wireless Motion
[31] M. M. Hasan and M. A. Razzak, “An automatic fire detection and warning Detecting System,” in IEEE Conference on Open Systems (ICOS). IEEE,
system under home video surveillance,” in Proceeding - 2016 IEEE 2018, pp. 71–75.
12th International Colloquium on Signal Processing and its Applications [52] W. A. Jabbar, M. H. Alsibai, N. S. S. Amran, and S. K. Mahayadin,
(CSPA), 2016, pp. 258–262. “Design and Implementation of IoT-Based Automation System for Smart
[32] F. B. Shahin, P. Tawheed, M. F. Haque, M. R. Hasan, and M. N. R. Khan, Home,” in International Symposium on Networks, Computers and Com-
“Smart home solutions with sun tracking solar panel,” in 4th International munications (ISNCC). IEEE, 2018, pp. 1–6.
Conference on Advances in Electrical Engineering (ICAEE). IEEE, 2017, [53] M. Ebrahim Abidi, A. L. Asnawi, N. Azmin, A. Jusoh, S. Noorjannah
pp. 766–769. Ibrahim, H. A. M. Ramli, and N. A. Malek, “Development of Voice
[33] M. Hasan, M. H. Anik, and S. Islam, “Microcontroller Based Smart Home Control and Home Security for Smart Home Automation,” in 7th In-
System with Enhanced Appliance Switching Capacity,” in the 5th HCT ternational Conference on Computer and Communication Engineering
Information Technology Trends (ITT). IEEE, 2018, pp. 364–367. (ICCCE). IEEE, 2018, pp. 1–6.
[34] J. Miah and R. H. Khan, “Service Development of Smart Home Automa- [54] A. Nagaria, H. Ansari, M. Qadeer, and E. M. Kashif Shaikh, “ElectriCare
tion System,” in Proceedings of the 2019 2nd International Conference – Care, Protection Automation,” in 2nd International Conference on Smart
on Computational Intelligence and Intelligent Systems. New York, NY, Sensors and Application (ICSSA). IEEE, 2018, pp. 88–92.
USA: ACM, 2019, pp. 161–167. [55] F. Nurpandi, A. Musrifalr, and I. Rizaldi, “Prototype Residence Monitor-
[35] M. S. Mahamud, M. S. R. Zishan, S. I. Ahmad, A. R. Rahman, M. Hasan, ing and Automation System Using Microcontroller Arduino,” in Interna-
and M. L. Rahman, “Domicile - An IoT Based Smart Home Automation tional Conference on ICT for Smart Society (ICISS). IEEE, 2018, pp.
System,” in International Conference on Robotics,Electrical and Signal 1–5.
Processing Techniques (ICREST). IEEE, 2019, pp. 493–497. [56] M. Škrgić, U. Drakulić, and E. Mujčić, “Smart Home System - Remote
[36] S. Kumar and S. R. Lee, “Android based smart home system with control Monitoring and Control Using Mobile Phone,” in International Sym-
via Bluetooth and internet connectivity,” in Proceedings of the Interna- posium on Innovative and Interdisciplinary Applications of Advanced
tional Symposium on Consumer Electronics (ISCE), 2014, pp. 1–2. Technologies, 2018, pp. 409–419.
[37] A. R. Behera, J. Devi, and D. S. Mishra, “A comparative study and [57] L. D. Liao, C. C. Chuang, T. R. Ger, Y. Wang, Y. C. Tsao, I. J. Wang, D. F.
implementation of real time home automation system,” in International Jhang, T. S. Chu, C. H. Tsao, C. N. Tsai, and S. F. Chen, “Design and
Conference on Energy Systems and Applications. IEEE, 2015, pp. 28– Validation of a Multifunctional Android-Based Smart Home Control and
33. Monitoring System,” IEEE Access, vol. 7, no. 1, pp. 1–9, 2019.
[38] H. T. Sukmana, M. G. Farisi, and D. Khairani, “Prototype utilization of [58] Š. Koprda, Z. Balogh, and M. Magdin, “Developing System from Low-
PIR motion sensor for real time surveillance system and web-enabled Cost Devices to Build a Security and Fire System as a Part of IoT,” in
lamp automation,” in Asia Pacific Conference on Wireless and Mobile International Conference on Intelligent Computing, 2019, pp. 142–154.
(APWiMob). IEEE, 2015, pp. 183–187. [59] S. Amit, A. S. Koshy, S. Samprita, S. Joshi, and N. Ranjitha, “Internet of
[39] R. S. Ransing and M. Rajput, “Smart home for elderly care, based on wire- Things (IoT) enabled Sustainable Home Automation along with Security
less sensor network,” in International Conference on Nascent Technologies using Solar Energy,” in International Conference on Communication and
in the Engineering Field (ICNTE), 2015. Electronics Systems (ICCES). IEEE, 2019, pp. 1026–1029.
[40] J. R. Tew and L. Ray, “ADDSMART: Address digitization and smart mail- [60] M. Z. Saeed, R. R. Ahmed, O. Bin Samin, and N. Ali, “IoT based Smart
box with RFID technology,” in Annual Ubiquitous Computing, Electronics Security System using PIR and Microwave Sensors,” in 13th International
Mobile Communication Conference (UEMCON). IEEE, 2016, pp. 1–6. Conference on Mathematics, Actuarial Science, Computer Science and
[41] A. Howedi and A. Jwaid, “Design and implementation prototype of a smart Statistics (MACS). IEEE, 2019, pp. 1–5.
house system at low cost and multi-functional,” in Future Technologies [61] S. Adamu, U. I. Bature, A. Y. Nasir, A. M. Hassan, K. I. Jahun, and
Conference (FTC). IEEE, 2016, pp. 876–884. U. S. Toro, “IOT Controlled Home Automation Technologies,” in 2nd
[42] Suresh S., J. Bhavya, S. Sakshi, K. Varun, and G. Debarshi, “Home International Conference of the IEEE Nigeria Computer Chapter (Nige-
Monitoring and Security system,” in International Conference on ICT in riaComputConf). IEEE, 2019, pp. 1–7.
Business Industry Government (ICTBIG). IEEE, 2016, pp. 1–5. [62] V. Teslyuk, P. Denysyuk, N. Kryvinska, K. Beregovska, and T. Teslyuk,
[43] B. Jadhav and S. Patil, “Wireless Home monitoring using Social Internet “Neural controller for smart house security subsystem,” Procedia Com-
of Things (SIoT),” in International Conference on Automatic Control and puter Science, vol. 160, pp. 394–401, 2019.
Dynamic Optimization Techniques (ICACDOT). IEEE, 2016, pp. 925– [63] U. Singh and M. A. Ansari, “Smart Home Automation System Using
929. Internet of Things,” in 2nd International Conference on Power Energy,
[44] V. Govindraj, M. Sathiyanarayanan, and B. Abubakar, “Customary homes Environment and Intelligent Control (PEEIC). IEEE, 2019, pp. 144–149.
to smart homes using Internet of Things (IoT) and mobile application,” [64] K. Suneetha and M. Sreekanth, “Smart home monitoring and automation
in International Conference On Smart Technologies For Smart Nation energy efficient system using IoT devices,” in International Conference on
(SmartTechCon). IEEE, 2017, pp. 1059–1063. Computing Communications and Data Engineering, 2019, pp. 627–637.
[45] M. A. Raja, G. R. Reddy, and Ajitha, “Design and implementation of [65] N. Shubha, S. Sahana, K. Pavithra, M. S. Meghana, and K. Panimozhi,
security system for smart home,” in International Conference on Algo- “Smart Old Age Home Using Zigbee,” in Proceeding of the International
rithms, Methodology, Models and Applications in Emerging Technologies Conference on Computer Networks, Big Data and IoT (ICCBI), 2019, pp.
(ICAMMAET). IEEE, 2017, pp. 1–4. 100–111.
[46] S. A. Joshi, S. Poojari, T. Chougale, S. Shetty, and M. K. Sandeep, [66] W. H. W. Ismail, H. R. M. Husny, and N. Y. Abdullah, “Smoke Detec-
“Home automation system using wireless network,” in 2nd International tion Alert System via Mobile Application,” in Proceedings of the 10th
VOLUME 4, 2016 21
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3008610, IEEE Access
International Conference on Ubiquitous Information Management and [87] A. Nayyar and V. Puri, “A review of arduino board’s, lilypad’s arduino
Communication (IMCOM). New York, New York, USA: ACM Press, shields,” in 2016 3rd International Conference on Computing for Sustain-
2016, pp. 1–6. able Global Development (INDIACom), 2016, pp. 1485–1492.
[67] H. Zhang, G. Li, and Y. Li, “A Home Environment Monitoring Design on [88] H. Saha, S. Mandal, S. Mitra, S. Banerjee, and U. Saha, “Comparative
Arduino,” in International Conference on Intelligent Transportation, Big Performance Analysis between nRF24L01+ and XBEE ZB Module Based
Data Smart City (ICITBS). IEEE, 2018, pp. 53–56. Wireless Ad-hoc Networks,” International Journal of Computer Network
[68] F. S. Perilla, G. R. Villanueva, N. M. Cacanindin, and T. D. Palaoag, “Fire and Information Security (IJCNIS), vol. 9, no. 7, pp. 36–44, 2017.
Safety and Alert System Using Arduino Sensors with IoT Integration,” [89] H. Hejazi, H. Rajab, T. Cinkler, and L. Lengyel, “Survey of platforms
in Proceedings of the 7th International Conference on Software and for massive iot,” in 2018 IEEE International Conference on Future IoT
Computer Applications (ICSCA). New York, New York, USA: ACM Technologies (Future IoT), 2018, pp. 1–8.
Press, 2018, pp. 199–203. [90] A. Jame, “Wi-fi vs. ethernet: Which connection to use?” https://ubidots.
[69] T. Mahara Jothi, A. Periyanayaki, R. Srimathy, M. Vinotha, and G. Gopika, com/blog/wi-fi-vs-ethernet-which-connection-to-use/, accessed: 01-05-
“GSM Based Home Environment Monitoring System,” in the 2nd Inter- 2020.
national Conference on Trends in Electronics and Informatics (ICOEI). [91] X. Wang, W. Gu, K. Schosek, S. Chellappan, and D. Xuan, “Sensor
IEEE, 2018, pp. 1263–1268. network configuration under physical attacks,” in International Conference
[70] O. Giandi and R. Sarno, “Prototype of fire symptom detection system,” in on Networking and Mobile Computing (ICCNMC), 2005, pp. 23–32.
International Conference on Information and Communications Technol- [92] K. Karimi and S. Krit, “Smart home-smartphone systems: Threats, security
ogy (ICOIACT). IEEE, 2018, pp. 489–494. requirements and open research challenges,” in 2019 International Confer-
[71] L. Salhi, T. Silverston, T. Yamazaki, and T. Miyoshi, “Early Detection Sys- ence of Computer Science and Renewable Energies (ICCSRE), 2019, pp.
tem for Gas Leakage and Fire in Smart Home Using Machine Learning,” in 1–5.
IEEE International Conference on Consumer Electronics (ICCE). IEEE, [93] N. Fernandes, D. Costa, C. Duarte, and L. Carriço, “Evaluating the
2019, pp. 1–6. accessibility of web applications,” Procedia Computer Science, vol. 14,
[72] J. Kang, S. Basnet, and S. M. Farhad, “Smart Fire-Alarm System for pp. 28–35, 2012.
Home,” in Conference on Complex, Intelligent, and Software Intensive [94] K. Zhao and L. Ge, “A survey on the internet of things security,” in
Systems, 2019, pp. 474–483. 2013 Ninth International Conference on Computational Intelligence and
Security, 2013, pp. 663–667.
[73] M. R. Habib, N. Khan, K. Ahmed, M. R. Kiran, A. Asif, M. I. Bhuiyan,
[95] T. Zia and A. Zomaya, “Security issues in wireless sensor networks,” in
and O. Farrok, “Quick Fire Sensing Model and Extinguishing by Using
2006 International Conference on Systems and Networks Communications
an Arduino Based Fire Protection Device,” in 2019 5th International
(ICSNC’06), 2006, pp. 40–40.
Conference on Advances in Electrical Engineering (ICAEE). IEEE, 2019,
[96] “Class for dhtxx sensors,” https://playground.arduino.cc/Main/DHTLib/,
pp. 435–439.
accessed: 01-05-2020.
[74] S. Shrestha, V. P. Krishna Anne, and R. Chaitanya, “IoT based smart gas
[97] “Efficient dht library for arduino,” https://github.com/markruys/
management system,” in Proceedings of the International Conference on
arduino-DHT, accessed: 01-05-2020.
Trends in Electronics and Informatics (ICOEI). IEEE, 2019, pp. 550–
[98] “Arduino library for dht11, dht22, etc temperature humidity sensors,”
555.
https://github.com/adafruit/DHT-sensor-library, accessed: 01-05-2020.
[75] H. U. Zaman, Rafiunnisa, and A. M. Shams, “A User-Friendly Low-
Cost Mobile App Based Home Appliance Control And Circuit Breaker,”
in Second International Conference on Computing Methodologies and
Communication (ICCMC). IEEE, 2018, pp. 203–208.
[76] A. Chaudhari, B. Mapari, and S. Jog, “Effective Environmental Monitoring
Domestic Home Conditions by Implementation of IoT,” in 4th Interna-
tional Conference on Computing Communication Control and Automation
(ICCUBEA). IEEE, 2018, pp. 1–5.
[77] V. Suma, R. R. Shekar, and K. A. Akshay, “Gas Leakage Detection Based
on IOT,” in 3rd International conference on Electronics, Communication
and Aerospace Technology (ICECA). IEEE, 2019, pp. 1312–1315.
[78] P. Ghosh and P. K. Dhar, “GSM Based Low-cost Gas Leakage, Explosion
and Fire Alert System with Advanced Security,” in International Confer-
ence on Electrical, Computer and Communication Engineering (ECCE).
IEEE, 2019, pp. 1–5.
[79] A. K. Srivastava, S. Thakur, A. Kumar, and A. Raj, “IoT based LPG cylin- QUSAY I. SARHAN received the B.Sc. degree in
der monitoring system,” in Proceedings IEEE International Symposium on Software Engineering from University of Mosul,
Smart Electronic Systems (iSES), 2019, pp. 268–271. Iraq, in 2007 and the M.Tech. degree in Software
[80] A. Samiha, F. H. Sarker, R. N. K. Chowdhury, A. K. M. R. R. Habib, and Engineering from Jawaharlal Nehru Technologi-
R. Rahman, “Ogrodut: GSM based Gas Leakage Detection and Ventilation cal University, India, in 2011. Currently, he is a
System using Arduino and Servo Motor,” in International Energy and lecturer and the leader of Software Engineering
Sustainability Conference (IESC). IEEE, 2019, pp. 1–6. and Embedded Systems (SEES) research group
[81] R. J. Radke, S. Andra, O. Al-Kofahi, and B. Roysam, “Image change at University of Duhok, Iraq. He has a couple
detection algorithms: a systematic survey,” IEEE Transactions on Image of national and international publications and his
Processing, vol. 14, no. 3, pp. 294–307, 2005. research interests include software engineering,
[82] P. Vasuki, J. Kanimozhi, and M. B. Devi, “A survey on image preprocess- internet of things, and embedded systems.
ing techniques for diverse fields of medical imagery,” in IEEE International
Conference on Electrical, Instrumentation and Communication Engineer-
ing (ICEICE), 2017, pp. 1–6.
[83] Chaur-Chin Chen and Hsueh-Ting Chu, “Similarity measurement between
images,” in 29th Annual International Computer Software and Applica-
tions Conference (COMPSAC), 2005, pp. 41–42.
[84] D. C. Wang, A. H. Vagnucci, and C. Li, “Digital image enhancement: A
survey,” Computer Vision, Graphics, and Image Processing, vol. 24, no. 3,
pp. 363 – 381, 1983.
[85] A. Nayyar, V. Puri, and D.-N. Le, “A comprehensive review of
semiconductor-type gas sensors for environmental monitoring,” Review of
Computer Engineering Research, vol. 3, no. 3, pp. 55–64, 2016.
[86] “Arduino website,” https://www.arduino.cc/, accessed: 01-05-2020.
22 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3008610, IEEE Access
VOLUME 4, 2016 23
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3008610, IEEE Access
24 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.