Zero-knowledge proofs of identity
Journal of Cryptology
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Extensible security architectures for Java
Proceedings of the sixteenth ACM symposium on Operating systems principles
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
SPINS: security protocols for sensor networks
Wireless Networks
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems
Proceedings of the twentieth ACM symposium on Operating systems principles
Adapting Legacy Home Appliances to Home Network Systems UsingWeb Services
ICWS '06 Proceedings of the IEEE International Conference on Web Services
Remote software-based attestation for wireless sensors
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Hi-index | 0.00 |
The problem of revealing secret information in home network becomes critical when a physical capture of single device or more happen where the attacker can statically analyze the entire device's memory. While the trusted platform module that assumes a tamper proof chip in each device is not a choice, we investigate other software-based solutions. This paper introduces several mechanisms and schemes in varying scenarios for secret information protection in non-tamper proof devices of the smart home environment. The mechanisms provided herein utilize the existence of several algorithms and techniques and building blocks that do not require an extra hardware while they are computation efficient on the typical home network devices. To demonstrate the value of contributions, an extensive analysis for different scenarios including security and cost estimations are provided.