Emerging Directions in Embedded and Ubiquitous Computing
DOI: 10.1007/978-3-540-77090-9_12
|View full text |Cite
|
Sign up to set email alerts
|

Security Technologies Based on Home Gateway for Making Smart Home Secure

Abstract: As home network is expanding into ubiquitous computing environment and lots of private information is accessible, it is required to protect home network system from illegal accesses and security threats in open network. In general deployment of home network, a secure home gateway is located at the boarder of each home and regarded to be a core entity providing services and controlling traffic. So in this paper, we propose a security system guaranteeing security, availability, and reliability based on the secur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(27 citation statements)
references
References 2 publications
0
27
0
Order By: Relevance
“…Malicious codes are applied to alter, demolish or obtain information and in addition to permit unauthorized access. 5,10,12 The security threats of malicious codes have the most risks in a smart home environment contrasted with commercial networks because of home user's lack of unawareness about data and network security.…”
Section: Malicious Codesmentioning
confidence: 98%
See 4 more Smart Citations
“…Malicious codes are applied to alter, demolish or obtain information and in addition to permit unauthorized access. 5,10,12 The security threats of malicious codes have the most risks in a smart home environment contrasted with commercial networks because of home user's lack of unawareness about data and network security.…”
Section: Malicious Codesmentioning
confidence: 98%
“…The attacker may imitate an unauthorized home user and access to the smart home internal network system remotely keeping in mind the end goal is to get secret data or acquire services. 5,10,12 This attack is frequently done together with others attacks, for example, replay attack.…”
Section: Masqueradingmentioning
confidence: 99%
See 3 more Smart Citations