Noninvasive Methods for Host Certification
ACM Transactions on Information and System Security (TISSEC)
A remote monitoring and control of home appliances on ubiquitous smart homes
Proceedings of the 1st international conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications
A User Interface for Controlling Information Appliances in Smart Homes
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Remote Control of Smart Homes Using Korean Natural Language Processing
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
A user interface for a Jini-based appliances in ubiquitous smart homes
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
A secure user authentication protocol based on one-time-password for home network
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
A security model for home networks with authority delegation
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Design of a video door phone service providing personal mobility based on home gateway system
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
Hi-index | 0.43 |
With the advent of home networks and the proliferation of broadband connectivity to homes, there is an increasing demand for a secure end-to-end mechanism to remotely access home networks and control home appliance from remote sites on the other side of the Internet. We propose an architecture for secure access to home or an organization's networks and control of networked appliances inside a home or within an organization from a remote location. We use biometrics features and a one-time password mechanism on top of secure socket layer (SSL) for authentication. We also provide three layers of security levels for network communication, and also a mechanism for secure file accesses based on the security privileges assigned to various users is proposed The files to be accessed from the server are categorized depending on their access privileges and encrypted using a key assigned to each category.