Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network

  • Authors:
  • Abedelaziz Mohaisen;Youngjae Maeng;Joenil Kang;Daehun Nyang;Kyunghee Lee;Dowon Hong;Jongwook Han

  • Affiliations:
  • Electronics and Telecommunication Research Institute, Daejeon, Korea 305-700;Information Security Research Laboratory, INHA University, Incheon, Korea;Information Security Research Laboratory, INHA University, Incheon, Korea;Information Security Research Laboratory, INHA University, Incheon, Korea;Electrical and Computer Engineering Department, Suwon University, Suwon, Korea;Electronics and Telecommunication Research Institute, Daejeon, Korea 305-700;Electronics and Telecommunication Research Institute, Daejeon, Korea 305-700

  • Venue:
  • UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

The problem of revealing secret information in home network becomes critical when a physical capture of single device or more happen where the attacker can statically analyze the entire device's memory. While the trusted platform module that assumes a tamper proof chip in each device is not a choice, we investigate other software-based solutions. This paper introduces several mechanisms and schemes in varying scenarios for secret information protection in non-tamper proof devices of the smart home environment. The mechanisms provided herein utilize the existence of several algorithms and techniques and building blocks that do not require an extra hardware while they are computation efficient on the typical home network devices. To demonstrate the value of contributions, an extensive analysis for different scenarios including security and cost estimations are provided.