• 제목/요약/키워드: Secure Smart Home

검색결과 51건 처리시간 0.026초

Design and Implementation of a Secure Smart Home with a Residential Gateway

  • 김상곤;김태곤
    • 인터넷정보학회논문지
    • /
    • 제23권2호
    • /
    • pp.9-17
    • /
    • 2022
  • In this paper, we propose a secure smart home network model and a novel cryptographic protocol called the Smart Home Security Protocol (SHSP). Authentication, key distribution, and encryption functions are properly supported in order to make a smart home secure, and a residential gateway (RG) plays a central role in performing these functions. According to the characteristics of networks and attached devices, we classify smart homes into three different types of sub-networks and these networks are interconnected with one another by the RG. Depending on a sub-network, we use different types of secure schemes to reduce the burden of the process and the delay in devices while it provides proper security functions. The proposed secure smart home model is implemented and verified by using a variety of embedded system environments.

스마트홈 환경에서의 안전한 디바이스 관리를 위한 그룹키 관리 기법 (Group Key Management Method for Secure Device in Smart Home Environment)

  • 류호석;곽진
    • 정보보호학회논문지
    • /
    • 제25권2호
    • /
    • pp.479-487
    • /
    • 2015
  • IT 발전에 따라 스마트홈 서비스는 네트워크 기반의 스마트 디바이스를 통해 원격 서비스, 모니터링 서비스 등 다양한 서비스를 제공하고 있다. 그러나 스마트홈 환경에서는 악성 디바이스를 통한 데이터 위 변조, 불법 인증, 프라이버시 침해 등과 같은 보안 위협들이 존재한다. 이러한 보안 위협들에 대응하기 위한 스마트홈 환경에서의 보안에 대한 연구가 활발히 진행되고 있으나 디바이스 관리를 위한 연구는 초기 단계에 머물고 있으며, 스마트홈 환경에서의 그룹키 관리에 대한 연구가 부족한 실정이다. 따라서 본 논문에서는 스마트홈 환경에서 안전한 디바이스 관리를 위한 그룹키 관리 기법을 제안한다.

클라우드 서비스 기반 스마트 홈 환경에서 안전한 데이터 통신을 위한 메시지 통신 프로토콜 설계 (A Message Communication for Secure Data Communication in Smart Home Environment Based Cloud Service)

  • 박중오
    • 융합정보논문지
    • /
    • 제11권7호
    • /
    • pp.21-30
    • /
    • 2021
  • 사물인터넷 기술 발전으로 스마트 차, 스마트 헬스케어, 스마트 홈, 스마트 팜 등 다양한 클라우드 컴퓨팅 기반 서비스가 확대되고 있다. 새로운 환경의 등장함에 따라 개인정보 또는 기업 기밀 등 중요 정보에 대한 노출 가능성, 해킹으로 인한 금전적인 피해 사례, 악의적인 공격기법으로 인한 인명피해 등 다양한 문제가 지속하여 발생하고 있다. 본 논문에서는 스마트 홈 기반의 안전한 통신을 수행하고, 사용자 데이터 보호를 위한 메시지 통신프로토콜을 제안한다. 세부 과정으로 스마트 홈 환경에서 안전한 디바이스 등록, 메시지 인증 프로토콜, 갱신프로토콜을 새롭게 설계하였다. 스마트 홈 서비스 관련 보안 요구사항을 참고하여 대표 공격기법에 대한 안정성을 검증하고, 성능을 비교분석을 수행한 결과 통신 측면 약 50%, 서명검증 측면 약 25%의 효율성을 확인했다.

A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments

  • Ra, Gyeong-Jin;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권2호
    • /
    • pp.892-905
    • /
    • 2018
  • In smart home environment, certificate based signature technology is being studied by communication with Internet of Things(IoT) device. However, block - chain technology has attracted much attention because of the problems such as single - point error and management overhead of the trust server. Among them, Keyless Signature Infrastructure(KSI) provides integrity by configuring user authentication and global timestamp of distributed server into block chain by using hash-based one-time key. In this paper, we provide confidentiality by applying group key and key management based on multi - solution chain. In addition, we propose a smart home environment that can reduce the storage space by using Extended Merkle Tree and secure and efficient KSI-based authentication and communication with enhanced security strength.

Security Framework for RFID-based Applications in Smart Home Environment

  • Konidala, Divyan M.;Kim, Dae-Young;Yeun, Chan-Yeob;Lee, Byoung-Cheon
    • Journal of Information Processing Systems
    • /
    • 제7권1호
    • /
    • pp.111-120
    • /
    • 2011
  • The concept of Smart-Homes is becoming more and more popular. It is anticipated that Radio Frequency IDentification (RFID) technology will play a major role in such environments. We can find many previously proposed schemes that focus solely on: authentication between the RFID tags and readers, and user privacy protection from malicious readers. There has also been much talk of a very popular RFID application: a refrigerator/bookshelf that can scan and list out the details of its items on its display screen. Realizing such an application is not as straight forward as it seems to be, especially in securely deploying such RFID-based applications in a smart home environment. Therefore this paper describes some of the RFID-based applications that are applicable to smart home environments. We then identify their related privacy and security threats and security requirements and also propose a secure approach, where RFID-tagged consumer items, RFID-reader enabled appliances (e.g., refrigerators), and RFID-based applications would securely interact among one another. At the moment our approach is just a conceptual idea, but it sheds light on very important security issues related to RFID-based applications that are beneficial for consumers.

Private Blockchain-Based Secure Access Control for Smart Home Systems

  • Xue, Jingting;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.6057-6078
    • /
    • 2018
  • Smart home systems provide a safe, comfortable, and convenient living environment for users, whereby users enjoy featured home services supported by the data collected and generated by smart devices in smart home systems. However, existing smart devices lack sufficient protection in terms of data security and privacy, and challenging security and privacy issues inevitably emerge when using these data. This article aims to address these challenging issues by proposing a private blockchain-based access control (PBAC) scheme. PBAC involves employing a private blockchain to provide an unforgeable and auditable foundation for smart home systems, that can thwart illegal data access, and ensure the accuracy, integrity, and timeliness of access records. A detailed security analysis shows that PBAC could preserve data security against various attacks. In addition, we conduct a comprehensive performance evaluation to demonstrate that PBAC is feasible and efficient.

아두이노 기반의 독거노인을 위한 스마트홈 시스템 (Arduino Based Smart Home System for the Elderly Living Alone)

  • 이인구;조면균
    • 대한임베디드공학회논문지
    • /
    • 제10권5호
    • /
    • pp.307-315
    • /
    • 2015
  • Recently, Smart Home System(SHS) is applied in order to provide comfort, energy efficient and better security to the residence. Thus, by introducing the SHS in the house of elderly people, it is possible to provide a convenient and safe life for old people especially living alone. This paper presents the design and implementation of a low cost but yet flexible and secure smart-phone based SHS. The design is based on inter-working between Arduino board with Bluetooth and Arduino board with Ethernet shield, and the home monitor/appliances are connected to the input/output ports of this board via sensors/relays. In addition, when the old man is put on an emergency, the proposed system will automatically notify it the family. Therefore, we have implemented an inexpensive and efficient SHS for the elderly living alone by inter-working smart phones, internet server and Arduino micro-controller.

스마트홈 환경에서 컴퓨터 포렌식스의 디지털 증거 무결성 보증 메커니즘 (A Mechanism for Securing Digital Evidences of Computer Forensics in Smart Home Environment)

  • 이종섭;박명찬;장은겸;최용락;이범석
    • 정보학연구
    • /
    • 제10권3호
    • /
    • pp.93-120
    • /
    • 2007
  • A Smart Home is a technically expanded from home network that gives us a comfortable life. But still there is a problem such as mal function of devices and intrusions by malicious parties since it is based on home network. The intrusion by malicious parties causes a critical problem to the individual's privacy. Therefore to take legal actions against to the intruders, the intrusion evidence collecting and managing technology are widely researched in the world. The evidence collecting technology uses the system which was damaged by intruders and that system is used as evidence materials in the court of justice. However the collected evidences are easily modified and damaged in the gathering evidence process, the evidence analysis process and in the court. That's why we have to prove the evidence's integrity to be valuably used in the court. In this paper, we propose a mechanism for securing the reliability and the integrity of digital evidence that can properly support the Computer Forensics. The proposed mechanism shares and manages the digital evidence through mutual authenticating the damaged system, evidence collecting system, evidence managing system and the court(TTP: Trusted Third Party) and provides a secure access control model to establish the secure evidence management policy which assures that the collected evidence has the corresponded legal effect.

  • PDF

Vulnerability Analysis Model for IoT Smart Home Camera

  • Aljahdali, Asia Othman;Alsaidi, Nawal;Alsafri, Maram
    • International Journal of Computer Science & Network Security
    • /
    • 제22권7호
    • /
    • pp.229-239
    • /
    • 2022
  • Today's Internet of Things (IoT) has had a dramatic increase in the use of various daily aspects. As a consequence, many homes adopt IoT technology to move towards the smart home. So, the home can be called smart when it has a range of smart devices that are united into one network, such as cameras, sensors, etc. While IoT smart home devices bring numerous benefits to human life, there are many security concerns associated with these devices. These security concerns, such as user privacy, can result in an insecure application. In this research, we focused on analyzing the vulnerabilities of IoT smart home cameras. This will be done by designing a new model that follows the STRIDE approach to identify these threats in order to afford an efficient and secure IoT device. Then, apply a number of test cases on a smart home camera in order to verify the usage of the proposed model. Lastly, we present a scheme for mitigation techniques to prevent any vulnerabilities that might occur in IoT devices.

RFID-based Secure Communication for Smart Device in Future Home Network Environment

  • Li, Nong-Jun;Choi, Kee-Hyun;Jang, Kyung-Soo;Shin, Dong-Ryeol
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제5권1호
    • /
    • pp.18-22
    • /
    • 2013
  • We introduce, in this paper, a novel approach of protection mechanism for data which are transmitted not only between the networked devices but also between the digital media devices. As the devices are getting more powerful and more storage capacity, they can process the encoded/encrypted data autonomously. However, all devices must know the secret key that used to encrypt data, and also use secure method to distribute that key. Moreover, there are no protection mechanisms supporting end-to-end copy protection which result in the fact that the data passed through various devices can be manipulated or captured. Therefore, we propose a RFID-based key distribution and protection mechanism to resolve these problems.