Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Special Issue on Advanced Cryptographic Techniques for Cloud and Big Data Computation
Guest editors: Fatos Xhafa and Zhenfu Cao
Article type: Research Article
Authors: Zhang, Miaoa; * | Wang, Chenyua | Wang, Jitenga | Tian, Sia; † | Li, Yanweib
Affiliations: [a] Beijing University of Posts and Telecommunications, Beijing 100876, China. Zhangmiao@bupt.edu.cn | [b] National Computer Network Emergency, Response Technical Team/Coordination Center of China, Beijing 100029, China. 18810543581@163.com
Correspondence: [*] Address for correspondence: Beijing University of Posts and Telecommunications, Beijing 100876, China
Note: [†] Thanks for the anonymous reviewers for their very helpful suggestions. This work was supported by the National High Technology Research and Development Program(“863”Program) of China (No. 2015AA017202).
Abstract: ZigBee networks, with their characteristics of high availability, low power consumption and cost-effective devices, are perfectly appropriate to construct Wireless Sensor Networks (WSNs). Also, the natures of WSN listed above bring significant benefits over traditional communication networks used in smart home systems. A smart home system is meant to improve the quality of life through offering various automated, interactive and comfortable services, such as sensing and communicating the family member’s health information with their doctors, or remotely controlling the appliances via cellular phones, emails etc. These critical services make the security of personal privacy and the authority of control commands vital issues in Smart Home environments. While the smart home system suffer from many attacks, the security of the smart home system become an important and hard problem. And the authentication is the first parclose to the security of the system. However, according to our analysis, most system fail to achieve the authentication between the user and the device, Which leading to the compromise of the whole system. In this paper, we analyze the authentication challenges between the user the device in WSNs and in smart home Systems. To thoroughly detect, defense and foresee the authentication vulnerabilities existing in smart home networks, we proposed a security evaluation technique based on attack graph generation. We discuss the distinction between the attack graphs deployed in traditional networks and in smart home networks. Furthermore, we apply this technique into an experiment, and the results prove its practicality. And we then suggest a widely used protocol to the smart home authentication system.
Keywords: Smart Home, Wireless Sensor Networks, security, attack graph
DOI: 10.3233/FI-2018-1623
Journal: Fundamenta Informaticae, vol. 157, no. 1-2, pp. 153-165, 2018
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl