Improving Home Automation Security; Integrating Device Fingerprinting into Smart Home
The device fingerprint along with username/password based security proposed in this paper, enables the verification of user as well as the device used to access the home, which significantly improves home security when they are accessed over the internet. In our work, the device fingerprinting algorithm was able to uniquely identify 97.93% of devices accessing our test website with an entropy of over 22 bits. Unlike any previous approaches to device fingerprinting, we use geolocation data in our algorithm which improves the fingerprint accuracy. The UA verification, screen parameter verification and client‘s date object verification proposed in our work drastically improves the legitimacy of the fingerprints generated. For future works, we plan to improve the identification accuracy of our fingerprints when our website is visited using different web clients from the same machine; Adding more fingerprint parameters such as clock skew and other hardware specific parameters for improving the accuracy of the device fingerprint is also an idea worth pursuing.
 R. Malekian, D. C. Bogatinoska, A. Karadimce, J. Trengoska, W. A. Nyako, “A Novel Smart ECO model for Energy Consumption Optimization”, Elektronika ir Elektrotechnika, Vol. 21, No.6, pp.75-80, 2015.
 J. Shao, L. Wang, W. Zhao, Y. Zhong, R. Malekian, “An improved Synchronous Control Strategy based on Fuzzy controller for PMSM”, Elektronika ir Elektrotechnika, Vol. 20, No. 6, pp. 7-23, 2014.
 C. Karlof, D. Wagner, ―Secure routing in wireless sensor networks: attacks and countermeasures‖, Ad Hoc Networks, vol. 1, pp. 293–315, 2003.
 Y. Hu, A. Perrig, D. Johnson, ―Wormhole attacks in wireless networks‖, IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 370–380, Feb. 2006.
 J. Wright, ―Practical ZigBee Exploitation Framework‖, Toorcon, Oct. 2011.
 T. Gong, H. Huang, P. Chen, R. Malekian , T. Chen, ―Secure Two-party Distance Computation Protocol Based on Privacy Homomorphism and Scalar Product in Wireless Sensor Networks‖, Tsinghua Science and Technology (IEEE), Vol.21, No.4, pp. 385-396, 2016.
 S. Xie, Y. Wang, “Construction of Tree Network with Limited Delivery Latency in Homogeneous Wireless Sensor Networks,” Wireless Personal Communications, vol. 78, no. 1, pp. 231-246, 2014.
 P. Guo, J. Wang, B. Li, S. Lee, “A Variable Threshold-value