Published on: April 2026
A REVIEW ON IOT-BASED SMART HOME AUTOMATION SYSTEMS
Yash H. Waghe Yash A. Zade Vidhan S. Shende
Article Status
Available Documents
Abstract
Keywords— Internet of Things; smart home automation; Wi-Fi; wireless sensor networks.
How to Cite this Paper
Waghe, Y. H., Zade, Y. A. & Shende, V. S. (2026). A Review on IoT-Based Smart Home Automation Systems. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(04). https://doi.org/10.55041/ijcope.v2i4.340
Waghe, Yash, et al.. "A Review on IoT-Based Smart Home Automation Systems." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i4.340.
Waghe, Yash,Yash Zade, and Vidhan Shende. "A Review on IoT-Based Smart Home Automation Systems." International Journal of Creative and Open Research in Engineering and Management 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i4.340.
References
[1] C. Stolojescu-Crisan, C. Crisan, and B.-P. Butunoi, "An IoT-Based Smart Home Automation System," Sensors, vol. 21, no. 11, Art. 3784, May 2021. DOI: 10.3390/s21113784.[2] I. Froiz-Miguez, T. M. Fernandez-Carames, P. Fraga-Lamas, and L. Castedo, "Design, Implementation and Practical Evaluation of an IoT Home Automation System for Fog Computing Applications Based on MQTT and ZigBee-WiFi Sensor Nodes," Sensors, vol. 18, no. 8, Art. 2660, Aug. 2018. DOI: 10.3390/s18082660.
[3] M. Abu-Tair, S. Djahel, P. Perry, B. Scotney, U. Zia, J. M. Carracedo, and A. Sajjad, "Towards Secure and Privacy-Preserving IoT Enabled Smart Home: Architecture and Experimental Study," Sensors, vol. 20, no. 21, Art. 6131, Oct. 2020. DOI: 10.3390/s20216131.
[4] L. Nemec Zlatolas, N. Feher, and M. Holbl, "Security Perception of IoT Devices in Smart Homes," J. Cybersecur. Priv., vol. 2, no. 1, pp. 65-73, Feb. 2022. DOI: 10.3390/jcp2010005.]
[5] G. Tuna, D. G. Kogias, V. C. Gungor, C. Gezer, E. Taur, and E. Ayday, "A survey on information security threats and solutions for Machine to Machine (M2M) communications," J. Parallel Distrib. Comput., vol. 109, pp. 142-154, 2017. DOI: 10.1016/j.jpdc.2017.05.021
Ethical Compliance & Review Process
- •All submissions are screened under plagiarism detection.
- •Review follows editorial policy.
- •Authors retain copyright.
- •Peer Review Type: Double-Blind Peer Review
- •Published on: Apr 13 2026
This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

