Protection techniques of secret information in non-tamper proof devices of smart home network

Abedelaziz Mohaisen, Youngjae Maeng, Joenil Kang, Daehun Nyang, Kyunghee Lee, Dowon Hong, Jongwook Han

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The problem of revealing secret information in home network becomes critical when a physical capture of single device or more happen where the attacker can statically analyze the entire device's memory. While the trusted platform module that assumes a tamper proof chip in each device is not a choice, we investigate other software-based solutions. This paper introduces several mechanisms and schemes in varying scenarios for secret information protection in non-tamper proof devices of the smart home environment. The mechanisms provided herein utilize the existence of several algorithms and techniques and building blocks that do not require an extra hardware while they are computation efficient on the typical home network devices. To demonstrate the value of contributions, an extensive analysis for different scenarios including security and cost estimations are provided.

Original languageEnglish
Title of host publicationUbiquitous Intelligence and Computing - 5th International Conference, UIC 2008, Proceedings
Pages548-562
Number of pages15
DOIs
StatePublished - 2008
Event5th International Conference on Ubiquitous Intelligence and Computing, UIC 2008 - Oslo, Norway
Duration: 23 Jun 200825 Jun 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5061 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference5th International Conference on Ubiquitous Intelligence and Computing, UIC 2008
Country/TerritoryNorway
CityOslo
Period23/06/0825/06/08

Keywords

  • Authentication
  • Code attestation
  • Home network
  • Secret information
  • Secret sharing
  • Security and system integration

Fingerprint

Dive into the research topics of 'Protection techniques of secret information in non-tamper proof devices of smart home network'. Together they form a unique fingerprint.

Cite this