Trusted Domains in home automation. Hjorth, T., S. & Torbensen, R. Computers & Security, Elsevier, 7, 2012.
Trusted Domains in home automation [link]Website  abstract   bibtex   
In the digital age of home automation and with the proliferation of mobile Internet access, the intelligent home and its devices should be accessible at any time from anywhere. There are many challenges such as security, privacy, ease of configuration, incompatible legacy devices, a wealth of wireless standards, limited resources of embedded systems, etc. Taking these challenges into account, we present a Trusted Domain home automation platform, which dynamically and securely connects heterogeneous networks of Short-Range Wireless devices via simple non-expert user interactions, and allows remote access via IP-based devices such as smartphones. The Trusted Domain platform fits existing legacy technologies by managing their interoperability and access controls, and it seeks to avoid the security issues of relying on third-party servers outside the home. It is a distributed system that enables secure end-to-end communication with home automation devices, and it supports device revocations as well as a structure of intersecting sets of nodes for scalability. Devices in the Trusted Domain are registered in a list that is distributed using a robust epidemic protocol optimized for constrained resources and network load sharing. The resource-intensive encrypted operations are reduced to a minimum by sending short signed update queries and only synchronizing when necessary. An experiment on an embedded implementation examines timing, footprint, and behavioral properties of the protocol. The protocol has been formally verified by the UPPAAL model-checking tool.
@article{
 title = {Trusted Domains in home automation},
 type = {article},
 year = {2012},
 identifiers = {[object Object]},
 keywords = {mobile,security,smart-home,trust,wireless},
 volume = {31},
 websites = {http://dx.doi.org/10.1016/j.cose.2012.07.003},
 month = {7},
 publisher = {Elsevier},
 id = {d289d4d0-0e3a-3e94-9362-577d8e4eb42a},
 created = {2018-07-12T21:31:09.061Z},
 file_attached = {false},
 profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
 group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
 last_modified = {2018-07-12T21:31:09.061Z},
 read = {false},
 starred = {false},
 authored = {false},
 confirmed = {true},
 hidden = {false},
 citation_key = {hjorth:trusted-domain},
 source_type = {article},
 private_publication = {false},
 abstract = {In the digital age of home automation and with the proliferation of mobile Internet access, the intelligent home and its devices should be accessible at any time from anywhere. There are many challenges such as security, privacy, ease of configuration, incompatible legacy devices, a wealth of wireless standards, limited resources of embedded systems, etc. Taking these challenges into account, we present a Trusted Domain home automation platform, which dynamically and securely connects heterogeneous networks of Short-Range Wireless devices via simple non-expert user interactions, and allows remote access via IP-based devices such as smartphones. The Trusted Domain platform fits existing legacy technologies by managing their interoperability and access controls, and it seeks to avoid the security issues of relying on third-party servers outside the home. It is a distributed system that enables secure end-to-end communication with home automation devices, and it supports device revocations as well as a structure of intersecting sets of nodes for scalability. Devices in the Trusted Domain are registered in a list that is distributed using a robust epidemic protocol optimized for constrained resources and network load sharing. The resource-intensive encrypted operations are reduced to a minimum by sending short signed update queries and only synchronizing when necessary. An experiment on an embedded implementation examines timing, footprint, and behavioral properties of the protocol. The protocol has been formally verified by the UPPAAL model-checking tool.},
 bibtype = {article},
 author = {Hjorth, Theis S and Torbensen, Rune},
 journal = {Computers & Security},
 number = {8}
}

Downloads: 0