Select Git revision
hivatkozasok.bib
hivatkozasok.bib 13.58 KiB
@thesis{bizt-rendszerek,
author = {Török Krisztián Antal},
title = {Biztonságtechnikai rendszerek üzemeltetése-karbantartása},
type = {szakdolgozat},
year = {2024},
month = nov,
institution = {Debreceni Egyetem Műszaki Kar Gépészmérnök Tanszék},
url = {https://hdl.handle.net/2437/386296},
urldate = {2025-04-10},
}
@manual{dsc,
author = {{DSC Hungária Kft.}},
title = {PowerSeries Neo Riasztó Központok - Részletes Építészeti és Mérnöki
műszaki leírás},
url = {
https://dsc.hu/themes/frontend/documents/muszaki_leiras_a_powerseries_neo_riaszto_kozpontokrol_v12.pdf
},
urldate = {2025-04-15},
}
@manual{paradox,
author = {{Paradox}},
title = {MG5050+ Installation Guide},
url = {https://www.paradox.com/Downloader?ID=11643},
urldate = {2025-04-15},
}
@online{ring,
author = {{Ring LLC}},
title = {Technical specifications for Ring Alarm devices},
url = {
https://ring.com/gb/en/support/articles/x9gba/Technical-Specifications-for-Ring-Alarm-Devices
},
urldate = {2025-04-15},
}
@manual{zwave-spec,
author = {{Z-Wave Alliance}},
title = {Application Work Group Z-Wave Specifications},
year = {2024},
month = jul,
url = {https://sdomembers.z-wavealliance.org/document/dl/3252},
urldate = {2025-04-15},
}
@manual{zigbee-spec,
author = {{ZigBee Alliance}},
title = {ZigBee Specification},
year = {2015},
month = aug,
abstract = {The ZigBee Specification describes the infrastructure and
services available to applications operating on the ZigBee
platform},
url = {
https://zigbeealliance.org/wp-content/uploads/2019/11/docs-05-3474-21-0csg-zigbee-specification.pdf
},
urldate = {2025-04-15},
}
@techreport{2-4-spectrum,
author = {Enge, Per AND Akos, Dennis AND Do, Juyong AND Simoneau, Joel B.
AND Pearson, L. Wilson AND Seetharam, Venkatesh AND Oria, A. J.},
title = {Measurements of Man-Made Spectrum Noise Floor},
institution = {{NASA}},
url = {https://ntrs.nasa.gov/citations/20050041714},
urldate = {2025-04-15},
}
@online{homey,
title = {Homey Pro - The Next Generation of Smart Home.},
url = {https://homey.app/en-hu/homey-pro/},
urldate = {2025-04-16},
}
@online{dsc-powerseries-eol,
title = {Discontinuation Notice - PowerSeries Product Line End of Life},
author = {{DSC}},
url = {https://cms.dsc.com/download.php?t=1&id=26516},
urldate = {2025-04-18},
}
@article{zigbee-reliability,
author = {Cheng-Min LIN},
journal = {IEICE TRANSACTIONS on Information},
title = {Reliability Analysis and Modeling of ZigBee Networks},
year = {2010},
volume = {E93-D},
number = {1},
pages = {68-78},
abstract = {The architecture of ZigBee networks focuses on developing
low-cost, low-speed ubiquitous communication between devices. The
ZigBee technique is based on IEEE 802.15.4, which specifies the
physical layer and medium access control (MAC) for a low rate
wireless personal area network (LR-WPAN). Currently, numerous
wireless sensor networks have adapted the ZigBee open standard to
develop various services to promote improved communication
quality in our daily lives. The problem of system and network
reliability in providing stable services has become more
important because these services will be stopped if the system
and network reliability is unstable. The ZigBee standard has
three kinds of networks; star, tree and mesh. The paper models
the ZigBee protocol stack from the physical layer to the
application layer and analyzes these layer reliability and mean
time to failure (MTTF). Channel resource usage, device role,
network topology and application objects are used to evaluate
reliability in the physical, medium access control, network, and
application layers, respectively. In the star or tree networks, a
series system and the reliability block diagram (RBD) technique
can be used to solve their reliability problem. However, a
division technology is applied here to overcome the problem
because the network complexity is higher than that of the others.
A mesh network using division technology is classified into
several non-reducible series systems and edge parallel systems.
Hence, the reliability of mesh networks is easily solved using
series-parallel systems through our proposed scheme. The
numerical results demonstrate that the reliability will increase
for mesh networks when the number of edges in parallel systems
increases while the reliability quickly drops when the number of
edges and the number of nodes increase for all three networks.
More use of resources is another factor impact on reliability
decreasing. However, lower network reliability will occur due to
network complexity, more resource usage and complex object
relationship.},
keywords = {},
doi = {10.1587/transinf.E93.D.68},
ISSN = {1745-1361},
month = jan,
}
@inproceedings{wifi-enc,
author = {Thakur, Hasnain Nizam and Al Hayajneh, Abdullah and Thakur, Kutub
and Kamruzzaman, Abu and Ali, Md Liakat},
booktitle = {2023 IEEE World AI IoT Congress (AIIoT)},
title = {A Comprehensive Review of Wireless Security Protocols and
Encryption Applications},
year = {2023},
volume = {},
number = {},
pages = {0373-0379},
abstract = {The evolution of technology has made our lives more convenient,
allowing us to communicate with anyone across the globe, access
data whenever we need it, and connect our devices to the
internet. Since a large amount of our personal data is stored on
computers or transmitted wirelessly, encryption has become
essential for ensuring the safety and privacy of this data,
limiting access to only authorized personnel. Encryption methods
have become increasingly sophisticated over time, with complex
computer algorithms able to process data within seconds. The
purpose of this paper is to provide an overview of encryption,
including its early forms and history, modern encryption
technologies such as WEP, WPA, and WPA2, and their weaknesses,
improvements, and applications in information technology. In
conclusion, this paper highlights the significance of robust
wireless security protocols and encryption in preserving the
credibility and dependability of digital networks and systems.},
keywords = {Computers;Protocols;Limiting;Wireless
networks;Encryption;Safety;Communication system
security;Evolution of technology;modern encryption
technologies;information technology;robust wireless security
protocols},
doi = {10.1109/AIIoT58121.2023.10174571},
ISSN = {},
month = jun,
}
@article{wired-vs-wireless,
title = {A survey on wired and wireless network},
author = {Khan, Rafaqat Alam and Tariq, Muhammad Arslan},
journal = {Lahore Garrison University Research Journal of Computer Science
and Information Technology},
volume = {2},
number = {3},
pages = {19--28},
year = {2018},
url = {https://core.ac.uk/download/pdf/539592395.pdf},
urldate = {2025-04-19},
}
@online{ring-prices,
author = {{security.org} AND Aliza Vigderman AND Gabe Turner},
title = {Ring Alarm Security System Cost and Pricing},
url = {https://www.security.org/home-security-systems/ring-alarm/},
urldate = {2025-04-19},
}
@online{homey-prices,
title = {Homey Cloud - Choose your Homey.},
url = {https://homey.app/en-us/homey-pro/#compare},
urldate = {2025-04-19},
}
@unpublished{hw-compat,
title = {The effect of compatibility on software supply and hardware demand:
Forward and backward compatibility},
author = {Nahm, Jae},
journal = {Dept. of Economics, Hong Kong University of Science and
Technology},
year = {2000},
url = {
http://idei.fr/sites/default/files/medias/doc/conf/sic/papers_2001/nahm.pdf
},
urldate = {2025-04-19},
}
@online{simplisafe,
title = {SimpiSafe Support - Help Center},
url = {https://support.simplisafe.com/?lang=en},
urldate = {2025-04-21},
}
@inproceedings{iot-usability,
author = {Chanda, Vignay and Hao, Luoyao and Schulzrinne, Henning},
booktitle = {2024 IEEE 21st Consumer Communications \& Networking Conference
(CCNC)},
title = {From Frustration to Function: A Study on Usability Challenges in
Smart Home IoT Devices},
year = {2024},
volume = {},
number = {},
pages = {1-6},
abstract = {IoT devices have significantly altered the methods of
interaction, operation, and functionality within home
environments. However, individuals, particularly those with
limited technical proficiency who stand to gain the most from
these advancements, likely encounter challenges stemming from the
intricate setup processes, a critical stage with the potential to
limit their widespread adoption. Thus, we focus on the user
experience during the setup phase of mainstream smart home
devices and conduct an empirical study of 15 representative smart
home IoT devices. We scrupulously examine their setup processes,
as well as accompanying instructions and user manuals, to assess
multi-faceted usability concerns. Our findings reveal 19
usability issues, indicating notable barriers, inconsistencies,
and a lack of intuitiveness, which may deter consumers from
successfully configuring and using these devices.},
keywords = {Access control;Privacy;Smart homes;Manuals;User
experience;Internet of Things;Usability},
doi = {10.1109/CCNC51664.2024.10454634},
ISSN = {2331-9860},
month = jan,
urldate = {2025-04-21},
}
@article{iot-onboard,
author = {Lee, Byung Moo and Patil, Mayuresh and Hunt, Preston and Khan,
Imran},
journal = {IEEE Access},
title = {An Easy Network Onboarding Scheme for Internet of Things Networks},
year = {2019},
volume = {7},
number = {},
pages = {8763-8772},
abstract = {The network onboarding of the Internet of Things (IoT) devices
is a practically important issue to realize the IoT networks. The
lack of appropriate and easy network onboarding schemes hinders
the spread of the IoT networks and their related cloud services.
To try and address this problem, various IoT network onboarding
schemes have been developed, such as near-field communication,
quick response code, ultrasound, and soft access point. In
addition to these schemes, a network onboarding scheme based on
Wi-Fi neighbor awareness networking (NAN), a recently developed
low-power Wi-Fi technology, has received a lot of attention due
to its low cost and ease-of-use characteristics. However, the
radio frequency characteristics of the NAN-based scheme can cause
various problems, including the unintended connection from
neighboring devices. The development of the supporting
technologies for the NAN-based network onboarding scheme is
critically important. In this paper, we propose a convergence
configurator detection scheme based on the time difference of
arrival, received signal strength indicator, and data rate to
reduce the neighboring issue of the NAN-based setup. Rather than
using one parameter criterion, we use a weighted sum of various
parameters to increase the reliability of the NAN-based
onboarding. The numerical results validate the effectiveness of
the proposed technique.},
keywords = {Wireless fidelity;Security;Internet of Things;Cloud
computing;Radio frequency;Received signal strength
indicator;Distance measurement;IoT network;network onboarding},
doi = {10.1109/ACCESS.2018.2890072},
ISSN = {2169-3536},
month = {},
urldate = {2025-04-21},
}
@inproceedings{iot-userfriendly,
author = {Wang, Chixiang and Cassidy, Liam and He, Weijia and Pierson,
Timothy J. and Kotz, David},
title = {Challenges and opportunities in onboarding smart-home devices},
year = {2024},
isbn = {9798400704970},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3638550.3641137},
urldate = {2025-04-21},
doi = {10.1145/3638550.3641137},
abstract = {Smart-home devices have become integral to daily routines, but
their onboarding procedures - setting up a newly acquired smart
device into operational mode - remain understudied. The
heterogeneity of smart-home devices and their onboarding
procedure can easily overwhelm users when they scale up their
smart-home system. While Matter, the new IoT standard, aims to
unify the smart-home ecosystem, it is still evolving, resulting
in mixed compliance among devices. In this paper, we study the
complexity of device onboarding from users' perspectives. We thus
performed cognitive walkthroughs on 12 commercially available
smart-home devices, documenting the commonality and distinctions
of the onboarding process across these devices. We found that
onboarding smart home devices can often be tedious and confusing.
Users must devote significant time to creating an account,
searching for the target device, and providing Wi-Fi credentials
for each device they install. Matter-compatible devices are
supposedly easier to manage, as they can be registered through
one single hub independent of the vendor. Unfortunately, we found
such a statement is not always true. Some devices still need
their own companion apps and accounts to fully function. Based on
our observations, we give recommendations about how to support a
more user-friendly onboarding process.},
booktitle = {Proceedings of the 25th International Workshop on Mobile
Computing Systems and Applications},
pages = {60–65},
numpages = {6},
keywords = {smart-home, device onboarding, user experience, matter},
location = {San Diego, CA, USA},
series = {HotMobile '24},
}
@article{fiz-vedelem,
author = {Horváth, Tamás},
title = {Mechanikai védelem mint késleltetés a fizikai védelemben},
journal = {Hadmérnök},
volume = {16},
number = {1},
pages = {23--32},
year = {2021},
month = may,
doi = {10.32567/hm.2021.1.2},
}