[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/2228298.2228332guideproceedingsArticle/Chapter ViewAbstractPublication PagesnsdiConference Proceedingsconference-collections
Article

An operating system for the home

Published: 25 April 2012 Publication History

Abstract

Network devices for the home such as remotely controllable locks, lights, thermostats, cameras, and motion sensors are now readily available and inexpensive. In theory, this enables scenarios like remotely monitoring cameras from a smartphone or customizing climate control based on occupancy patterns. However, in practice today, such smarthome scenarios are limited to expert hobbyists and the rich because of the high overhead of managing and extending current technology.
We present HomeOS, a platform that bridges this gap by presenting users and developers with a PC-like abstraction for technology in the home. It presents network devices as peripherals with abstract interfaces, enables cross-device tasks via applications written against these interfaces, and gives users a management interface designed for the home environment. HomeOS already has tens of applications and supports a wide range of devices. It has been running in 12 real homes for 4-8 months, and 42 students have built new applications and added support for additional devices independent of our efforts.

References

[1]
Home security systems, home security products, home alarm systems - ADT. http://www.adt.com.
[2]
Application Domains. http://msdn.microsoft.com/en-us/ library/2bh4z9hs%28v=vs.100%29.aspx.
[3]
O. Ardakanian, S. Keshav, and C. Rosenberg. Markovian Models for Home Electricity Consumption. In SIGCOMM Workshop on Green Networking, 2011.
[4]
N. Banerjee, S. Rollins, and K. Moran. Automating Energy Management in Green Homes. In SIGCOMM Workshop on Home Networks (HomeNets), 2011.
[5]
L. Bauer, L. Cranor, R. W. Reeder, M. K. Reiter, and K. Vaniea. A user study of policy creation in a flexible access-control system. In CHI, 2008.
[6]
J. Borchers, M. Ringel, J. Tyler, and A. Fox. Stanford Interactive Workspaces: A Framework for Physical and Graphical User Interface Prototyping. IEEE Wireless Communications. Special Issue on Smart Homes, 2002.
[7]
A. J. Brush, B. Lee, R. Mahajan, S. Agarwal, S. Saroiu, and C. Dixon. Home Automation in the Wild: Challenges and Opportunities. In CHI, 2011.
[8]
K. L. Calvert, W. K. Edwards, and R. E. Grinter. Moving Toward the Middle: The Case Against the End-to-End Argument in home networking. In HotNets, 2007.
[9]
S. Ceri, G. Gottlob, and L. Tanca. What you Always Wanted to Know About Datalog (And Never Dared to Ask). IEEE Transactions on Knowledge and Data Engineering, 1, 1989.
[10]
A. Chaudhuri, P. Naldurg, G. Ramalingam, S. Rajamani, and L. Velaga. EON: Modeling and Analyzing Access Control Systems with Logic Programs. In CCS, 2008.
[11]
Control4 Home Automation and Control. http://www.control4.com.
[12]
Crestron Electronic: Home automation, building and campus control. http://www.crestron.com.
[13]
C. Dixon, R. Mahajan, S. Agarwal, A. J. Brush, B. Lee, S. Saroiu, and V. Bahl. The home needs an operating system (and an app store). In Hot-Nets , 2010.
[14]
DLNA. http://www.dlna.org/home.
[15]
W. K. Edwards, R. E. Grinter, R. Mahajan, and D. Wetherall. Advancing the state of home networking. Communications of the ACM, 54, 2011.
[16]
W. K. Edwards, M. W. Newman, J. Z. Sedivy, T. F. Smith, D. Balfanz, D. K. Smetters, H. C. Wong, and S. Izadi. Using SpeakEasy for ad hoc peer-to-peer collaboration. In CSCW, 2002.
[17]
M1 Security & Automation Controls. http://www.elkproducts. com/m1_controls.html.
[18]
Y. Endo, Z. Wang, J. B. Chen, and M. Seltzer. Using latency to evaluate interactive system performance. In OSDI, 1996.
[19]
ENVI whole home energy monitor by powersave. http://www.currentcost.net.
[20]
C. Escoffier, J. Bourcier, P. Lalanda, and J. Yu. Towards a home application server. In Consumer Communication & Networking Conference, 2008.
[21]
FFmpeg. http://ffmpeg.org.
[22]
R. E. Grinter, W. K. Edwards, M. Chetty, E. S. Poole, J.-Y. Sung, J. Yang, A. Crabtree, P. Tolmie, T. Rodden, C. Greenhalgh, and S. Benford. The ins and outs of home networking: The case for useful and usable domestic networking. ToCHI, 16(2), 2009.
[23]
N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker. NOX: towards an operating system for networks. SIGCOMM CCR, 38(3), 2008.
[24]
Y.-G. Ha, J.-C. Sohn, and Y.-J. Cho. ubiHome: An Infrastructure for Ubiquitous Home Network Services. In IEEE International Symposium on Consumer Electronics, 2007.
[25]
M. Hearst, A. Elliott, J. English, R. Sinha, K. Swearingen, and K.-P. Yee. Finding the flow in web site search. Communications of the ACM, 45(9), 2002.
[26]
HomeOS. http://homeos.codeplex.com.
[27]
HomeOS demos. http://research.microsoft.com/en-us/ um/redmond/projects/homeos/homeos-demos.htm.
[28]
Home Automation Systems - HomeSeer. http://www.homeseer.com.
[29]
J. Krumm, S. Harris, B. Meyers, B. Brumitt, M. Hale, and S. Shafer. Multi-Camera Multi-Person Tracking for EasyLiving. In IEEE Workshop on Visual Surveillance, 2000.
[30]
Leviton Online Store - LevitonProducts.com. http://www.levitonproducts.com.
[31]
H. M. Levy. Capability Based Computer Systems. Digital Press, 1984.
[32]
N. Li and J. C. Mitchell. Datalog with constraints: A foundation for trust management languages. In International Symposium on Practical Aspects of Declarative Languages, 2003.
[33]
M. L. Mazurek, J. Arsenault, J. Breese, N. Gupta, I. Ion, C. Johns, D. Lee, Y. Liang, J. Olsen, B. Salmon, R. Shay, K. Vaniea, L. Bauer, L. F. Cranor, G. R. Ganger, and M. K. Reiter. Access Control for Home Data Sharing: Attitudes, Needs and Practices. In CHI, 2010.
[34]
M.W. Newman. Now we're cooking: Recipes for end-user service composition in the digital home. In IT@Home: Workshop associated with CHI, 2006.
[35]
S. R. Ponnekanti, B. Lee, A. Fox, P. Hanrahan, and T. Winograd. ICrafter: A Service Framework for Ubiquitous Computing Environments. In Ubicomp, 2001.
[36]
E. S. Poole, M. Chetty, R. E. Grinter, and W. K. Edwards. More than Meets the Eye: Transforming the User Experience of Home Network Management. Designing Interactive Systems, 2008.
[37]
F. Raja, K. Hawkey, and K. Beznosov. Revealing hidden context: improving mental models of personal firewall users. In Symposium on Usable Privacy and Security (SOUPS), 2009.
[38]
R. W. Reeder, L. Bauer, L. F. Cranor, M. K. Reiter, and K. Vaniea. More than skin deep: measuring effects of the underlying model on accesscontrol system usability. In CHI, 2011.
[39]
N. Rosen, R. Sattar, R. W. Linderman, R. Simha, and B. Narahari. HomeOS: Context-Aware Home Connectivity. In International Conference on Pervasive Computing and Applications, 2004.
[40]
Security Policy Assertion Language implementation for Microsoft .NET. http://research.microsoft.com/secpal.
[41]
Universal Plug-and-Play. http://www.upnp.org.
[42]
S. VanDeBogart, P. Efstathopoulos, E. Kohler, M. Krohn, C. Frey, D. Ziegler, F. Kaashoek, R. Morris, and D. Mazieres. Labels and Event Processes in the Asbestos Operating System. TOCS, 25(4), 2007.
[43]
J. Wu, A. Osuntogun, T. Choudhury, M. Philipose, and J. M. Rehg. A Scalable Approach to Activity Recognition based on Object Use. In International Conference on Computer Vision, 2007.
[44]
N. Zeldovich, S. Boyd-Wickizer, and D. Mazieres. Securing distributed systems with information flow control. In NSDI, 2008.
[45]
ZigBee Alliance. http://www.zigbee.org.
[46]
Z-Wave.com - ZwaveStart. http://www.z-wave.com.

Cited By

View all
  • (2023)But is it exploitable? Exploring how Router Vendors Manage and Patch Security Vulnerabilities in Consumer-Grade RoutersProceedings of the 2023 European Symposium on Usable Security10.1145/3617072.3617110(277-295)Online publication date: 16-Oct-2023
  • (2021)Inconsistency Detection-Based LOD in Smart HomesInternational Journal on Semantic Web & Information Systems10.4018/IJSWIS.202110010417:4(56-75)Online publication date: 1-Oct-2021
  • (2021)Adopting Diffractive Reading to Advance HCI Research: A Case Study on Technology for AgingACM Transactions on Computer-Human Interaction10.1145/346232628:5(1-29)Online publication date: 20-Aug-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
NSDI'12: Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
April 2012
30 pages

Sponsors

  • VMware
  • NSF: National Science Foundation
  • Google Inc.
  • Infosys
  • Microsoft Reasearch: Microsoft Reasearch

Publisher

USENIX Association

United States

Publication History

Published: 25 April 2012

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)But is it exploitable? Exploring how Router Vendors Manage and Patch Security Vulnerabilities in Consumer-Grade RoutersProceedings of the 2023 European Symposium on Usable Security10.1145/3617072.3617110(277-295)Online publication date: 16-Oct-2023
  • (2021)Inconsistency Detection-Based LOD in Smart HomesInternational Journal on Semantic Web & Information Systems10.4018/IJSWIS.202110010417:4(56-75)Online publication date: 1-Oct-2021
  • (2021)Adopting Diffractive Reading to Advance HCI Research: A Case Study on Technology for AgingACM Transactions on Computer-Human Interaction10.1145/346232628:5(1-29)Online publication date: 20-Aug-2021
  • (2020)Smart Home Beyond the Home: A Case for Community-Based Access ControlProceedings of the 2020 CHI Conference on Human Factors in Computing Systems10.1145/3313831.3376255(1-12)Online publication date: 21-Apr-2020
  • (2019)TransactuationsProceedings of the 2019 USENIX Conference on Usenix Annual Technical Conference10.5555/3358807.3358816(91-105)Online publication date: 10-Jul-2019
  • (2019)VideoPipeProceedings of the 20th International Middleware Conference Industrial Track10.1145/3366626.3368131(43-49)Online publication date: 9-Dec-2019
  • (2019)RemedioTProceedings of the 6th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation10.1145/3360322.3360837(101-110)Online publication date: 13-Nov-2019
  • (2019)IA-graph based inter-app conflicts detection in open IoT systemsProceedings of the 20th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems10.1145/3316482.3326350(135-147)Online publication date: 23-Jun-2019
  • (2018)SmartDataInternational Journal of Sensor Networks10.5555/3302797.330280328:3(202-210)Online publication date: 1-Jan-2018
  • (2018)DynaMixProceedings of the 2018 USENIX Conference on Usenix Annual Technical Conference10.5555/3277355.3277363(71-83)Online publication date: 11-Jul-2018
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media