|
Smart Home System: a comprehensive Review Arindom Chakraborty, monirul Islam, Fahim ShahriyarBog'liq Smart Home System A Comprehensive Review12. Conclusion
Te development process of SHSs has been going on for
decades, and breakthroughs have been achieved by re-
searchers in this feld. In recent years, due to population
blasts and rapid industrialization, the standard of living has
been decreasing rapidly. Smart homes provide a secure,
comfortable, and efcient way of living. In this study, we
have presented a thorough analysis of the recent develop-
ment of SHSs. Tis systematic literature review sheds light
on the various technological approaches taken by re-
searchers in the development of SHSs as well as the types of
microcontrollers and sensors used. We have identifed 11
major technological approaches, 6 most popular micro-
controllers, and 17 diferent types of sensors used by re-
searchers in their work and provided an in-depth
comparison among them to ascertain the popularity and
trend in research. Aside from these, a detailed analysis and
review of the networking technologies adopted, user in-
terfaces provided, computational methods utilized, security
systems established, and several services such as energy
management, gesture recognition, elderly care systems, and
appliance control mechanisms have been presented in this
study. Moreover, a detailed comparison of the data collected
from the various articles has been provided in the discussion
part, where it can be seen that multiple approach-based SHSs
are becoming more popular due to their added functionality
from the utilization of multiple approaches. For that same
reason, multiple microcontroller-based SHSs are also
coming in trend. An IoT-based SHS is becoming a dominant
competitor. For the user interface, smartphone application-
based interfaces will play a key role in the future due to their
ease of access and better functionality. Because the network
and physical vulnerability will remain a major threat in the
SHS, more and more emphasis is being given to networks
and physical security, and this research for a better secured
SHS can be expected to continue.
|
| |