@inproceedings{85528b738278463aa5c42606acfbc1ad,
title = "Protection techniques of secret information in non-tamper proof devices of smart home network",
abstract = "The problem of revealing secret information in home network becomes critical when a physical capture of single device or more happen where the attacker can statically analyze the entire device's memory. While the trusted platform module that assumes a tamper proof chip in each device is not a choice, we investigate other software-based solutions. This paper introduces several mechanisms and schemes in varying scenarios for secret information protection in non-tamper proof devices of the smart home environment. The mechanisms provided herein utilize the existence of several algorithms and techniques and building blocks that do not require an extra hardware while they are computation efficient on the typical home network devices. To demonstrate the value of contributions, an extensive analysis for different scenarios including security and cost estimations are provided.",
keywords = "Authentication, Code attestation, Home network, Secret information, Secret sharing, Security and system integration",
author = "Abedelaziz Mohaisen and Youngjae Maeng and Joenil Kang and Daehun Nyang and Kyunghee Lee and Dowon Hong and Jongwook Han",
year = "2008",
doi = "10.1007/978-3-540-69293-5_43",
language = "English",
isbn = "3540692924",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "548--562",
booktitle = "Ubiquitous Intelligence and Computing - 5th International Conference, UIC 2008, Proceedings",
note = "5th International Conference on Ubiquitous Intelligence and Computing, UIC 2008 ; Conference date: 23-06-2008 Through 25-06-2008",
}