Browse > Article
http://dx.doi.org/10.7472/jksii.2022.23.2.9

Design and Implementation of a Secure Smart Home with a Residential Gateway  

Kim, Sang-kon (Dept. of Electronics & Information Engineering, Korea University)
Kim, Tae-kon (Dept. of Electronics & Information Engineering, Korea University)
Publication Information
Journal of Internet Computing and Services / v.23, no.2, 2022 , pp. 9-17 More about this Journal
Abstract
In this paper, we propose a secure smart home network model and a novel cryptographic protocol called the Smart Home Security Protocol (SHSP). Authentication, key distribution, and encryption functions are properly supported in order to make a smart home secure, and a residential gateway (RG) plays a central role in performing these functions. According to the characteristics of networks and attached devices, we classify smart homes into three different types of sub-networks and these networks are interconnected with one another by the RG. Depending on a sub-network, we use different types of secure schemes to reduce the burden of the process and the delay in devices while it provides proper security functions. The proposed secure smart home model is implemented and verified by using a variety of embedded system environments.
Keywords
Secure Smart Home; Cryptographic Protocol; Residential Gateway; Home Automation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 X. Wang and Z. Jin, "An Overview of Mobile Cloud Computing for Pervasive Healthcare," in IEEE Access, vol. 7, pp. 66774-66792, May, 2019. https://doi.org/10.1109/ACCESS.2019.2917701   DOI
2 W. Choi, J. Kim, S. Lee, E. Park, "Smart home and internet of things: A bibliometric study," Journal of Cleaner Production, vol. 301, 126908, June, 2021. https://doi.org/10.1016/j.jclepro.2021.126908   DOI
3 R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, M. Yung, "Systematic design of a family of attack-resistant authentication protocols," IEEE Journal on Selected Areas in Communications, Vol. 11, Issue 5, pp. 679-693. 1993. https://doi.org/10.1109/49.223869   DOI
4 R. Needham, M. Schroeder, "Using encryption for authentication in large networks of computers," Comm. of the ACM, Vol, 21, Issue 12, pp. 993-999. Dec., 1978. https://doi.org/10.1145/359657.359659   DOI
5 Wacks, "Home systems standards: achievement and challenges," IEEE Communications Magazine, Vol. 40, Issue 4, pp. 152-159, April 2002. https://doi.org/10.1109/35.995865   DOI
6 T. Zahariadis, K. Pramataris, N. Zervos, "A comparison of competing broadband in-home technologies," Elect. and Comm. Eng. Journal, Vol. 14, Issue 4, pp. 133-142, Aug., 2002. https://doi.org/10.1049/ecej:20020401   DOI
7 R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, M. Yung, "The KryptoKnight family of light-weight protocols for authentication and key distribution," IEEE/ACM Trans. Netw., Vol. 3, Issue 1, pp. 31-41, 1995. https://doi.org/10.1109/90.365435   DOI
8 P. Janson, G. Tsudik, M. Yung, "Scalability and flexibility in authentication services: The kryptoKnight approach," Proceedings of INFOCOM '97, IEEE, April, 1997. https://doi.org/10.1109/INFCOM.1997.644526   DOI
9 R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, M. Yung, "The KryptoKnight family of authentication and key distribution protocols," IEEE/ACM Trans. on Netw., March 1995.
10 P. Janson and G. Tsudik, "Secure and minimal protocols for authenticated key distribution," Computer Communications, vol. 18, Issue 9, pp. 645-653, Sep., 1995. https://doi.org/10.1016/0140-3664(95)99807-O   DOI