Javascript must be enabled to continue!
Security technologies based on a home gateway for making smart homes secure
View through CrossRef
PurposeThe purpose of this paper is to identify security technologies that are essential in making home network systems secure and to describe specialized security mechanisms for the home network and the relationships among them.Design/methodology/approachThe research model is designed to support three functions: authentication, authorization, and security policy. Authentication is tested in several methodologies such as id/pw, certificate, or bio; authorization is tested using RBAC methodologies; and security policy is specified using newly‐designed script language, such as xHDL.FindingsThe findings for “authentication” suggest that home network users can access services conveniently and securely. In addition, the findings for “security policy” suggest that security policy for home network requires specialized rather than general specification.Practical implicationsThe paper identifies three security functions essential for home network: authentication that supports most existing authentication mechanisms, so as to maximize user accessibility; authorization that is middleware‐independent and beyond the physical transport layer; and security policy optimized for the home network environment.Originality/valueThe paper focuses on an implementation‐based security model for the home network. Though interest and research in home network security are increasing, only limited authentication applications have been adopted in real deployment up to now. This paper introduces an integrated security model and emphasizes safety and convenience so as to promote reliability in home network services.
Title: Security technologies based on a home gateway for making smart homes secure
Description:
PurposeThe purpose of this paper is to identify security technologies that are essential in making home network systems secure and to describe specialized security mechanisms for the home network and the relationships among them.
Design/methodology/approachThe research model is designed to support three functions: authentication, authorization, and security policy.
Authentication is tested in several methodologies such as id/pw, certificate, or bio; authorization is tested using RBAC methodologies; and security policy is specified using newly‐designed script language, such as xHDL.
FindingsThe findings for “authentication” suggest that home network users can access services conveniently and securely.
In addition, the findings for “security policy” suggest that security policy for home network requires specialized rather than general specification.
Practical implicationsThe paper identifies three security functions essential for home network: authentication that supports most existing authentication mechanisms, so as to maximize user accessibility; authorization that is middleware‐independent and beyond the physical transport layer; and security policy optimized for the home network environment.
Originality/valueThe paper focuses on an implementation‐based security model for the home network.
Though interest and research in home network security are increasing, only limited authentication applications have been adopted in real deployment up to now.
This paper introduces an integrated security model and emphasizes safety and convenience so as to promote reliability in home network services.
Related Results
Centaurs transitioning to JFCs: thermal and dynamical evolution
Centaurs transitioning to JFCs: thermal and dynamical evolution
<p>1- Context</p>
<p>Jupiter-family Comets are continuously replenished from their outer solar system reservoirs. Before they enter the in...
On Privacy and Security in Smart Connected Homes
On Privacy and Security in Smart Connected Homes
The growth and presence of heterogeneous sensor-equipped Internet-connected devices inside the home can increase efficiency and quality of life for the residents. Simultaneously, t...
On Privacy and Security in Smart Connected Homes
On Privacy and Security in Smart Connected Homes
The growth and presence of heterogeneous sensor-equipped Internet-connected devices inside the home can increase efficiency and quality of life for the residents. Simultaneously, t...
Prostor doma u hrvatskim igranim filmovima s temom domovinskog rata
Prostor doma u hrvatskim igranim filmovima s temom domovinskog rata
The dissertation explores the formation of domestic space in contemporary Croatian society through its presentations in the medium of feature films. The cinematic domestic spaces a...
Everyday Life in the "Tourist Zone"
Everyday Life in the "Tourist Zone"
This article makes a case for the everyday while on tour and argues that the ability to continue with everyday routines and social relationships, while at the same time moving thro...
Smart home cybersecurity awareness and behavioral incentives
Smart home cybersecurity awareness and behavioral incentives
Purpose
Smart-home security involves multilayered security challenges related to smart-home devices, networks, mobile applications, cloud servers and users. However, very few studi...
Generative AI-Driven Smart Contract Optimization for Secure and Scalable Smart City Services
Generative AI-Driven Smart Contract Optimization for Secure and Scalable Smart City Services
Smart cities use advanced infrastructure and technology to improve the quality of life for their citizens. Collaborative services in smart cities are making the smart city ecosyste...
Reinventing Smart Water Management System through ICT and IoT Driven Solution for Smart Cities
Reinventing Smart Water Management System through ICT and IoT Driven Solution for Smart Cities
Purpose: Worldwide water scarcity is one of the major problems to deal with. Smart Cities also faces this challenging problem due to its ever-increasing population and limited sour...

