Diffie-Hellman key distribution extended to group communication
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Simple and fault-tolerant key agreement for dynamic collaborative groups
Proceedings of the 7th ACM conference on Computer and communications security
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Secure smart homes using Jini and UIUC SESAME
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Cerberus: A Context-Aware Security Scheme for Smart Spaces
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
CLIQUES: A New Approach to Group Key Agreement
ICDCS '98 Proceedings of the The 18th International Conference on Distributed Computing Systems
Key Infection: Smart Trust for Smart Dust
ICNP '04 Proceedings of the 12th IEEE International Conference on Network Protocols
Information revelation and privacy in online social networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Hi-index | 0.00 |
With the rapid emergence of new home networking technologies and proliferation of devices that use them, innovation has focused on rich functionality and largely ignored the associated security threats. The heterogeneous set of home appliances, their varied communication mediums, the lack of any ubiquitous standard to manage the communication across these devices, and the lack of a skilled security administrator all pose significant new challenges in securing these networks. In this work, we identify security challenges and considerations that are unique to home networking and take a first step toward solving one of the key security issues--key establishment. We describe a simple, secure and user-friendly solution to handle the special case of a device rejoining its home network after a brief absence. Our approach serves as a basic building block to ensure security and privacy in a home network.