Abstract
This plan-based paper defines the application and development of a smart home automation system. This paper tries to highlight the objectives, planning, opportunities and possible method for implementation of the system. This paper also uses different tools and methods, such as the work breakdown structure, Gantt chart, risk register, client constraints and so on to properly and easily define the goals and objectives of the project along with describing the different phases of the project, time management of the project, risk identification and client requirements. This project also indicates the security threat and their mitigations related to IoT.
Introduction
Home automation is the basic automatic solution for daily home tasks such as adjusting temperature, opening and closing garage doors, central locking and other similar functions. Home automation is the combination of electronics and information technology and their application for controlling different tasks in the home (Lobaccaro, Carlucci & Löfström, 2016). For the past few years, the development of new technologies and advancement in artificial intelligence made a simple automated home into a smart one.
The main purpose of the home automation system is to provide energy efficiency, security, and entertainment. Different devices are available in the market that can control the different part of home automation, some can provide entertainment, some can provide security and some can be energy efficient. The main problem with these devices is that they are unable to interact with each other effectually (Spivey, 2015). Thanks for the advent of the Internet of things. Now smart home as the name suggests uses IOT as the basis for connecting with all the devices smartly. The advantage of wireless networking is providing flexibility, simplicity and cost efficiency.
Client Requirements and Constraints
In order to complete a project, meetings between clients and service providers are necessary. These meetings provide an understanding of the requirements and constraints of the client (Sharma, 2013). In order to install the smart home automated system a total of four meetings are required with or without the client.
The first meeting will be with the client in order to understand his or her requirements. Requirements such as how many systems he wants to be automated. Are they want them to be centrally controlled? Or not. Should they be wireless or wire-based and what is their budget.
The second meeting will be with the team members of the project. This meeting will highlight the problem statement need of the client and how it can be achieved. The third meeting will be the final meeting with the client it will revolve around the discussion of risks and threats and negotiation if required. The fourth and the last meeting will be held between team members in order to plan different phase of the project.
In terms of customer requirement, following are some of them that are actually required by clients willing to install smart home automation.
Requirement | Description | Priority | Impact on Work |
Compatibility of Devices | The device must be compatible with each other and other major products available in the market. | Very High | Have to buy products of the same brand and same vendor to ensure the compatibility |
Easily Controllable | The system should be easily controllable, with central remote or with a smartphone app | High | Need to design a custom program while using API of devices used |
Security and Strength | The devices should be strong enough against any damage as well as against any technological breach | Very High | Does not impact so much as the security and strength have already been considered in previous requirements |
Stakeholder Perspectives
Other stakeholders in this project are neighbors, team workers, vendors form the products will be purchased. Their perspective also matters besides the client (Cekic, Surlan & Kosic, 2017). A summary of views of other stakeholders on the requirements of the client are as follows
Client Requirement | Worker View | Vendor View |
Compatibility of Devices | Will feel bad because they have to search and locate devices with compatibility | View this as a revenue generator option, because the same brand devices will be purchased. |
Easily Controllable | Have to develop a system of integration | Need to provide the latest models of devices |
Security and Strength | Have to provide security, double check each thing. Helpful in getting recommendations. | Provide high-quality devices making more profit for them |
Project Scope Statement
This smart home automation project will try to understand the security measures related to the modern smart home automation. Since the use of IoT to smartly control the overall automation system has created different security risks (Barcena & Wueest, 2015). This project is designed to evaluate the application and installation of fully features smart home system with minimum security threats.
The acceptance criteria for this project, or for the successful acceptance of this project will be based on client satisfaction. The client satisfaction is based on the following checks:
- Installation of compatible, cost-effective and energy efficient smart home system.
- Fully secure and enjoyable environment of home after the installation.
- The system can control every home automated device with a single touch.
The project deliverables that are crucial for the success of this project from the view of both client and service provider are:
- Installing modern up to date and compatible devices.
- Delivering cost-effective smart home system within the estimated time.
- Provide early training and after support for the system.
- Provide a centrally controlled wireless system with increased security against any possible breaches.
Following elements will not be the part of the project:
- Any warranty claim, as these devices usually have the company handled the warranty.
- No claim for any type of loss due to breakage or damage to any component of the smart home system.
- After installation training and support
The limitations of this project are:
- No guarantee of external security for the home will be discussed as this project is for home automation.
- Since the service provider is not manufacturing the devices hence their warranty will not be considered in this project too.
The assumption already understood for this project are:
- The client will provide every single detail of his or her home, i.e. proper house plan, utility plans and so on.
- The service provider will not try to save any information related to the installation plan, such as passwords keys and other related stuff.
Work Breakdown Structure (WBS) and WBS Dictionary
The work breakdown structure of the project is as follows:
Start of the Project
Client meeting for asking requirements
Meeting with team members to check the feasibility of the project
Client meeting for discussing risk and threats associated with the project
Planning
Studying the project
Meeting with team members to understand implementations
Developing blueprints
Searching and locating vendors
Developing
Buying compatible devices
Integrating them with each other
Developing a central control system
Testing for any vulnerabilities
Implementation
Installation of devices
Adjusting the system to the real world
Final testing
Training and Handling Over
Training client
Handling over of security information (keys/password)
Describing polices
Finalizing Project
Final report
Closing of project
WBS Component | Description |
Start of Project | This process will majorly consist of meetings with the client in order to understand the basic need and requirements of the client |
Planning | The planning phase is the development of blueprints as well as the selection of devices to be used |
Developing | The developing phase will be revolving around the buying and integrating of home automated devices. This phase also incorporates the development of a central control system, i.e. software for smartphone |
Implementation | Installation of the developed system at the actual location |
Training and Handling Over | Providing training to the client for how to use and handing over of the system |
Finalizing Project | Preparation of the final report for further study |
Time Management
The time span of this project will be for three months. This 90-days long period is required, in order to maintain the quality of the project. A Gantt chart for this project is as follows:
Month 1 | Month 2 | Month 3 | |||||||||
W1 | W2 | W3 | W4 | W1 | W2 | W3 | W4 | W1 | W2 | W3 | W4 |
Start | |||||||||||
Planning | |||||||||||
Developing | |||||||||||
Implementation | |||||||||||
Training | |||||||||||
Finalizing |
Cost Management
Cost management is also an integral part of any project (Bouvrie, 2016). For this project, the total cost depends on the resources used, especially the quality and compatibility of the devices. The cost of the project can be maintained by using open source software and frameworks for establishing the control app or system. The use of electronic devices such as Raspberry Pi and Arduino can also be beneficial in managing the cost of the project. An estimated cost plan for the project is given below:
Id | Item | Description | Estimated Cost |
1 | Devices for Home Automation | Multiple devices such as thermostat, central locking, energy saver, light controller etc. | $1000 |
2 | Devices for Central Control | Arduino, wi-fi controller, wireless modem | $500 |
3 | Central Software Development | Development of application for centrally controlling all the devices | $500 |
4 | Installation Charges | Installation and labor charges | $500 |
Total | $2500 |
Risk Management Plan
Following are some of the key risks and threats found to be associated with the project planning:
Id | Risk | Mitigation | Chances | Severity |
1 | Selecting inappropriate devices, reduce compatibility | Proper research and review before purchasing any item.
Buy established brand |
High | High |
2 | Lack of security consideration may arise security threats | Check everything twice before finalizing.
Follow industry standards |
High | Very High |
3 | Ineffective project management resulting in increased time and cost | Proper planning, with constant meeting and communication with stakeholders | Medium | Medium |
4 | Lack of training and early support | Provide in-depth training and education before finalizing the project | Low | Low |
5 | After project complains and queries regarding warranties | Provide proper policy and terms and condition document before winding up the project | Low | Low |
Discussion/Reflection
The use of IoT in our daily life is a living reality. At the very same time, this is the most fragile part. Developing and planning a project based on IoT especially wireless connectivity and integrating within a centrally controlled system may cause a high level of vulnerabilities. Use of cryptography and other special security measures such as setting up of network firewall are crucial for providing a breach less security in a smart home system (Lin & Bergmann, 2016). The other problem associated with this project is finding out the compatible device. Different companies have started to provide compatible devices but there is still a need for progress.
In order to successfully implement this project, the team members of the service provider are requested to understand the basis of smart home automating. Identifying compatible home automation devices, integrating them side by side and knowing the current trends in the market. Especially in terms of security measures and device selection criteria, understanding of the basis are important for this project. They also need to be well versed in identifying possible risks and threats during a project management. The last but not least, remaining up to date as the IoT moves on so rapidly with the daily upcoming advancement in technologies.
References
Barcena, M., & Wueest, C. (2015). Insecurity in the Internet of Things [Ebook] (1st ed.). Symantec. Retrieved from https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/insecurity-in-the-internet-of-things.pdf
Bouvrie, C. (2016). Cost Management Explained in 4 Steps. Retrieved from http://www.costmanagement.eu/blog-article/198-cost-management-explained-in-4-steps
Cekic, Z., Surlan, N., & Kosic, T. (2017). Value Perspective of Project Stakeholders. IOP Conference Series: Materials Science And Engineering, 262, 012078.
Lin, H., & Bergmann, N. (2016). IoT Privacy and Security Challenges for Smart Home Environments. Information, 7(3), 44.
Lobaccaro, G., Carlucci, S., & Löfström, E. (2016). A Review of Systems and Technologies for Smart Homes and Smart Grids. Energies, 9(5), 348.
Sharma, G. (2013). 7 Best Practices For Building Client Relationships. Retrieved from https://www.forbes.com/sites/gaurisharma/2013/10/04/7-best-practices-for-building-client-relationships
Spivey, D. (2015). Home automation for dummies. Hoboken, NJ: John Wiley & Sons.