2012 35th International Conference on Telecommunications and Signal Processing (TSP) 2012
DOI: 10.1109/tsp.2012.6256188
|View full text |Cite
|
Sign up to set email alerts
|

Secure and QoS-aware communications for smart home services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(18 citation statements)
references
References 6 publications
0
18
0
Order By: Relevance
“…As mentioned in section "Conclusion and Future Work" of our previous work [19] there was an ongoing NIST (National Institute for Standardization and Technology) competition for the next secure hash algorithm. Just a few weeks ago, on Oktober 3rd, the NIST pronounced the hash algorithm KECCAK (see [20]) to be the next secure hash algorithm, called SHA-3 (see [21]).…”
Section: B Encryption Featuresmentioning
confidence: 99%
“…As mentioned in section "Conclusion and Future Work" of our previous work [19] there was an ongoing NIST (National Institute for Standardization and Technology) competition for the next secure hash algorithm. Just a few weeks ago, on Oktober 3rd, the NIST pronounced the hash algorithm KECCAK (see [20]) to be the next secure hash algorithm, called SHA-3 (see [21]).…”
Section: B Encryption Featuresmentioning
confidence: 99%
“…The security requirements of different smart home components are explained in (Han, Jeon and Kim, 2015). Similarly, a new quality of service (QoS) concept and a new integrated concept for smart home security systems are proposed in (Hager et al, 2012). In the proposed approach in (Hager et al, 2012), all communication channels, all system and user-data, and all kinds of access to the smart home system are secured by a state-of-the art security framework.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, a new quality of service (QoS) concept and a new integrated concept for smart home security systems are proposed in (Hager et al, 2012). In the proposed approach in (Hager et al, 2012), all communication channels, all system and user-data, and all kinds of access to the smart home system are secured by a state-of-the art security framework. In addition, based on the classification of each specific smart home service, the authors also present a solution to prevent congestion situations inside the smart home network.…”
Section: Related Workmentioning
confidence: 99%
“…We propose a solution that exploits the flexibility of recursive layers with a novel solution for the implementation of each layer. In particular, we propose employing "Forwarding on Gates" (FoG) [8,9] for the Internet layer and the "Traffic Engineering Middleware for Ethernet" (TEME) [5,6] at the intra-network layer. Figure 1 shows the logical node architecture with both layers.…”
Section: Recursive Architecturementioning
confidence: 99%
“…The TEME system [5,6] consists of a middleware installed on each end node of the Ethernet network and a centralized control server. Although this server is designed to manage one complete Ethernet sub-network, it is also possible to virtually split the Ethernet network into several regions and apply this control server to each of these regions to address the scaling problem in large networks.…”
Section: Intra-network Layer Temementioning
confidence: 99%