Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2007.14-C.4.341

Secret Information Protection Scheme for Device in Home Network  

Maeng, Young-Jae (인하대학교 정보통신대학원)
Kang, Jeon-Il (인하대학교 정보통신대학원)
Mohaisen, Abedelaziz (인하대학교 정보통신대학원)
Lee, Kyung-Hee (수원대학교 전자공학과)
Nyang, Dae-Hun (인하대학교 정보통신대학원)
Abstract
Even though the secret information stored in home device in home network must be handled very safely and carefully, we have no measure for protecting the secret information without additional hardware support. Since already many home devices without consideration of the security have been used, the security protection method for those devices have to be required. In this paper, we suggest two schemes that protect the security information using networking function without additional hardware support, and those hybrid method to supplement the defects of each scheme. We also consider the our proposals in the aspects of security and cost.
Keywords
Home Network; Secret Sharing; Threshold Cryptography; Code Attestation; Safe Umbrella;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Ron Rivest, Adi Shamir and Len Adleman, 'A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,' Communications of the ACM, Vol. 21 (2), pp. 120-126. 1978   DOI   ScienceOn
2 Arvind Seshadri, Adrian Perrig, Leendert van Doorn, and Pradeep Khosla, 'SWATT: SoftWare-based ATTestation for Embedded Devices,' In Proceedings of the IEEE Symposium on Security and Privacy, pp. 272-281, May 2004   DOI
3 https://www.trustedcomputinggroup.org/groups/tpm/
4 Whitfield Diffie, Martin Hellman, 'New directions in cryptography,' IEEE Transactions on Information Theory, IT-22(6), pp. 644-654, November 1976
5 Gura N., Patel A., Wander A., Eberle A., Shantz S. C, 'Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs', CHES 2004, pp. 119-132, 2004
6 Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, Pradeep Khosla, 'Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems,' In Proceedings of the 20th ACM symposium on Operating Systems Principles, pp. 1-16, 2005
7 Adi Shamir, 'How to share the secret,' Communications of the ACM, Vol 22, Issue 11 (November 1979), pp. 612-613, 1979   DOI   ScienceOn
8 M. Shaneck, K. Mahadevan, V. Kher, and Y. Kim, 'Remote Software-Based Attestation for Wireless Sensors,' In ESAS 2005, LNCS 3813, pp. 27-41, 2005   DOI   ScienceOn
9 Y. Desmedt, Y. Frankel, 'Threshold cryptosystems,' Advances in Cryptology - Crypto '89, LNCS 435, pp. 307-315, 1990   DOI