Contribution to intelligent environment's security

Home automation is vulnerable in terms of security and confidentiality of data, something that must be addressed in a coherent manner. Although traditional security requirements remain the same, this new approach to computing represents additional challenges. In this paper, the goal is to develop an open services home gateway based security architecture for the home network including PKC. This contribution focuses on the security of home network components and the communications between them.

[1]  Yongge Wang,et al.  Public Key Cryptography Standards: PKCS , 2012, ArXiv.

[2]  Robbie Schaefer,et al.  Securing Personal Data in Smart Home Environments , 2006 .

[3]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[4]  Taylor Yu The Kerberos Network Authentication Service (Version 5) , 2007 .

[5]  Abdelkader Belkhir,et al.  Extension of SIP protocol for managing home networks , 2011, 2011 10th International Symposium on Programming and Systems.

[6]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[7]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[8]  S. Kent Evaluating certification authority security , 1998, 1998 IEEE Aerospace Conference Proceedings (Cat. No.98TH8339).

[9]  Donal O'Mahony,et al.  Securing Communications in the Smart Home , 2004, EUC.

[10]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[11]  M. Abliz Internet Denial of Service Attacks and Defense Mechanisms , 2011 .

[12]  Eric Rescorla,et al.  SSL and TLS: Designing and Building Secure Systems , 2000 .

[13]  Christian Callegari,et al.  Advances in Computing, Communications and Informatics (ICACCI) , 2015 .

[14]  K. Takeda,et al.  A Product Based Security Model for Smart Home Appliances , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[15]  Tibor Juhas The use of elliptic curves in cryptography , 2007 .

[16]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[17]  Abdelkader Belkhir,et al.  An Architecture for Policy-Based Home Automation System (PBHAS) , 2010, 2010 IEEE Green Technologies Conference.

[18]  Alan B. Johnston,et al.  SIP: Understanding the Session Initiation Protocol , 2001 .

[19]  Ting-Wei Hou,et al.  Advanced OSGi Security Layer , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[20]  Chris Wysopal,et al.  Static detection of application backdoors , 2010, Datenschutz und Datensicherheit - DuD.