Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.2.479

Group Key Management Method for Secure Device in Smart Home Environment  

Ryu, Ho-Seok (ISAA Lab., Department of Computer Engineering, Ajou University)
Kwak, Jin (Department of Information and Computer Engineering, Ajou University)
Abstract
According to IT development, smart home services is providing remote service, monitoring service and other various services through smart home devices based on network. But, smart home environment exists security threats such as data falsification, illegal authentication and invasion of privacy through a malicious device. Smart home is studying to prevent these security threats, but the studies of smart home environment security are still in early stage of development and the studies of group key management method is lacking in smart home. In this paper, we propose the group key management method for secure device in smart home.
Keywords
Smart Home; Smart Device; Group Key; Internet of Things;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Ho-won Kim and Dong-kyu Kim, "IoT technology and security," Korea Institute of Information Security & Cryptology, 22(1), pp. 7-13, Feb. 2012
2 Hwa-jeong Suh, Dong-gun Lee, Jong-seok Choe, and Ho-won Kim, "IoT security technology trends," The Korea Institute of Electromagnetic Engineering and Science, 24(4), pp. 27-35, July. 2013   DOI
3 Raj, S.V., "Implementation of pervasive computing based high-secure smart home system," Computational Intelligence & Computing Research (ICCIC), 2012 IEEE International Conference on, pp. 1-8, Dec. 2012.
4 Tae-woong Lee, Cheol-su Son, and Won-jung Kim, "The implement of intelligent home network system on smart phone," The Korea Institute of Electronic Communication Sciences, 6(4), pp. 505-509, Aug. 2011
5 A. Wright, "Cyber security for the power grid: cyber security issues & securing control systems," ACMCCS, Nov. 2009.
6 Kuba, M., Klatt, M., Ronge, K. and Weigel, R., "Automatic communication standard recognition in wireless smart home networks," Consumer Communications and Networking Conference (CCNC), 2012 IEEE, pp 270-274, Jan. 2012.
7 Seong-gu Sim, Ho-jin Park, and Jun-hee Park, "Smart home standardization construction and strategy," The Korea Institute of Information Scientists & Engineers, 30(8), pp. 19-25, Aug. 2012
8 Mantoro, T., Adnan, M.A.M., Ayu, and M.A., "Secured communication between mobile devices and smart home appliances," Advanced Computer Science Applications and Technologies (ACSAT), 2013 International Conference on, pp. 429-434, Dec. 2013.
9 Soo-bok Shin, Hong-jin Yeh, and Kang-seok Kim, "A ticket based authentication scheme for group communication," In Proceedings of The 2012 International Conference on Information Security and Assurance, pp. 152-155, Apr. 2012.
10 Jong-hyuk Park, "An authentication protocol offering service anonymity of mobile device in ubiquitous environment," The Journal of Supercomputing, vol 62, no 1, pp. 105-117, Oct. 2012.   DOI
11 Dong-hee Kim, Seok-woong, and Yong-pil Lee, "Security services for IoT," The Korea Institute of Communications and Information Sciences, 30(8), pp. 53-59, July. 2013.