메뉴 건너뛰기




Volumn 16, Issue 1, 2016, Pages 254-264

Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments

Author keywords

access control; Authentication; security; smart homes; wireless sensor networks

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; AUTOMATION; DENIAL-OF-SERVICE ATTACK; EFFICIENCY; INTELLIGENT BUILDINGS; WIRELESS SENSOR NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84961967582     PISSN: 1530437X     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSEN.2015.2475298     Document Type: Article
Times cited : (167)

References (48)
  • 1
    • 77953085540 scopus 로고    scopus 로고
    • Wireless home automation networks: A survey of architectures and technologies
    • Jun.
    • C. Gomez and J. Paradells, "Wireless home automation networks: A survey of architectures and technologies," IEEE Commun. Mag., vol. 48, no. 6, pp. 92-101, Jun. 2010.
    • (2010) IEEE Commun. Mag. , vol.48 , Issue.6 , pp. 92-101
    • Gomez, C.1    Paradells, J.2
  • 5
    • 84887020581 scopus 로고    scopus 로고
    • Forecasting the behavior of an elderly using wireless sensors data in a smart home
    • Nov.
    • N. K. Suryadevara, S. C. Mukhopadhyay, R. Wang, and R. K. Rayudu, "Forecasting the behavior of an elderly using wireless sensors data in a smart home," Eng. Appl. Artif. Intell., vol. 26, no. 10, pp. 2641-2652, Nov. 2013.
    • (2013) Eng. Appl. Artif. Intell. , vol.26 , Issue.10 , pp. 2641-2652
    • Suryadevara, N.K.1    Mukhopadhyay, S.C.2    Wang, R.3    Rayudu, R.K.4
  • 6
    • 84961912480 scopus 로고    scopus 로고
    • [Online]. accessed Jul. 15
    • HOPE-Smart Home For Elderly People. [Online]. Available: http://www.hope-project.eu/, accessed Jul. 15, 2015.
    • (2015) HOPE-Smart Home for Elderly People
  • 7
    • 84961912488 scopus 로고    scopus 로고
    • [Online]. accessed Jul. 16
    • SM4ALL-Smart Homes for All. [Online]. Available: http://www.sm4allproject.eu/, accessed Jul. 16, 2015.
    • (2015) SM4ALL-Smart Homes for All
  • 8
    • 84961926739 scopus 로고    scopus 로고
    • [Online]. accessed Jul. 15
    • GENIO-Next Generation Home. [Online]. Available: http://projects.celtic-initiative.org/genio/, accessed Jul. 15, 2015.
    • (2015) GENIO-Next Generation Home
  • 9
    • 84863738127 scopus 로고    scopus 로고
    • Resource and service management architecture of a low capacity network for smart spaces
    • May
    • S. Bhardwaj, T. Ozcelebi, J. Lukkien, and C. Uysal, "Resource and service management architecture of a low capacity network for smart spaces," IEEE Trans. Consum. Electron., vol. 58, no. 2, pp. 389-396, May 2012.
    • (2012) IEEE Trans. Consum. Electron. , vol.58 , Issue.2 , pp. 389-396
    • Bhardwaj, S.1    Ozcelebi, T.2    Lukkien, J.3    Uysal, C.4
  • 14
    • 84883438554 scopus 로고    scopus 로고
    • Design of a key establishment protocol for smart home energy management system
    • Jun.
    • Y. Li, "Design of a key establishment protocol for smart home energy management system," in Proc. 5th Int. Conf. Comput. Intell., Commun. Syst. Netw. (CICSyN), Jun. 2013, pp. 88-93.
    • (2013) Proc. 5th Int. Conf. Comput. Intell., Commun. Syst. Netw. (CICSyN) , pp. 88-93
    • Li, Y.1
  • 16
    • 84883453070 scopus 로고    scopus 로고
    • A novel secure key paring protocol for RF4CE ubiquitous smart home systems
    • Jun.
    • K. Han, J. Kim, T. Shon, and D. Ko, "A novel secure key paring protocol for RF4CE ubiquitous smart home systems," Pers. Ubiquitous Comput., vol. 17, no. 5, pp. 945-949, Jun. 2013.
    • (2013) Pers. Ubiquitous Comput. , vol.17 , Issue.5 , pp. 945-949
    • Han, K.1    Kim, J.2    Shon, T.3    Ko, D.4
  • 17
    • 84896953511 scopus 로고    scopus 로고
    • Correct by construction security approach to design fault tolerant smart homes for disabled people
    • S. Guillet, B. Bouchard, and A. Bouzouane, "Correct by construction security approach to design fault tolerant smart homes for disabled people," Proc. Comput. Sci., vol. 21, pp. 257-264, 2013.
    • (2013) Proc. Comput. Sci. , vol.21 , pp. 257-264
    • Guillet, S.1    Bouchard, B.2    Bouzouane, A.3
  • 18
    • 84906788294 scopus 로고    scopus 로고
    • Privacy-preserving data infrastructure for smart home appliances based on the octopus DHT
    • Oct.
    • B. Fabian and T. Feldhaus, "Privacy-preserving data infrastructure for smart home appliances based on the octopus DHT," Comput. Ind., vol. 65, no. 8, pp. 1147-1160, Oct. 2014.
    • (2014) Comput. Ind. , vol.65 , Issue.8 , pp. 1147-1160
    • Fabian, B.1    Feldhaus, T.2
  • 20
    • 84961901183 scopus 로고    scopus 로고
    • Hackers expose how connected toilets, heaters and light bulbs are at risk
    • Jul.
    • D. Yadron, "Hackers expose how connected toilets, heaters and light bulbs are at risk," Wall Street J., Jul. 2013.
    • (2013) Wall Street J.
    • Yadron, D.1
  • 21
    • 79955594692 scopus 로고    scopus 로고
    • SAKE: Software attestation for key establishment in sensor networks
    • Aug.
    • A. Seshadri, M. Luk, and A. Perrig, "SAKE: Software attestation for key establishment in sensor networks," Ad Hoc Netw., vol. 9, no. 6, pp. 1059-1067, Aug. 2011.
    • (2011) Ad Hoc Netw. , vol.9 , Issue.6 , pp. 1059-1067
    • Seshadri, A.1    Luk, M.2    Perrig, A.3
  • 23
    • 33646227667 scopus 로고    scopus 로고
    • Automated security protocol analysis with the AVISPA tool
    • May
    • L. Viganò, "Automated security protocol analysis with the AVISPA tool," Electron. Notes Theoretical Comput. Sci., vol. 155, pp. 61-86, May 2006.
    • (2006) Electron. Notes Theoretical Comput. Sci. , vol.155 , pp. 61-86
    • Viganò, L.1
  • 26
    • 0036691221 scopus 로고    scopus 로고
    • Home networking with IEEE 802.15.4: A developing standard for low-rate wireless personal area networks
    • Aug.
    • E. Callaway et al., "Home networking with IEEE 802.15.4: A developing standard for low-rate wireless personal area networks," IEEE Commun. Mag., vol. 40, no. 8, pp. 70-77, Aug. 2002.
    • (2002) IEEE Commun. Mag. , vol.40 , Issue.8 , pp. 70-77
    • Callaway, E.1
  • 28
    • 58149175440 scopus 로고    scopus 로고
    • Design and implementation of wireless smart-home sensor network based on ZigBee protocol
    • May
    • L. Liang, L. Huang, X. Jiang, and Y. Yao, "Design and implementation of wireless smart-home sensor network based on ZigBee protocol," in Proc. Int. Conf. Commun., Circuits Syst. (ICCCAS), May 2008, pp. 434-438.
    • (2008) Proc. Int. Conf. Commun., Circuits Syst. (ICCCAS) , pp. 434-438
    • Liang, L.1    Huang, L.2    Jiang, X.3    Yao, Y.4
  • 31
  • 32
    • 84877743568 scopus 로고    scopus 로고
    • A time synchronization mechanism for heterogeneous wireless sensor networks
    • Mar.
    • Y. Li, Y. Huang, and H. Sun, "A time synchronization mechanism for heterogeneous wireless sensor networks," in Proc. Int. Conf. Autom. Control Artif. Intell. (ACAI), Mar. 2012, pp. 317-320.
    • (2012) Proc. Int. Conf. Autom. Control Artif. Intell. (ACAI) , pp. 317-320
    • Li, Y.1    Huang, Y.2    Sun, H.3
  • 34
    • 79952059658 scopus 로고    scopus 로고
    • Lightweight and provably secure user authentication with anonymity for the global mobility network
    • Mar.
    • C. Chen, D. He, S. Chan, J. Bu, Y. Gao, and R. Fan, "Lightweight and provably secure user authentication with anonymity for the global mobility network," Int. J. Commun. Syst., vol. 24, no. 3, pp. 347-362, Mar. 2011.
    • (2011) Int. J. Commun. Syst. , vol.24 , Issue.3 , pp. 347-362
    • Chen, C.1    He, D.2    Chan, S.3    Bu, J.4    Gao, Y.5    Fan, R.6
  • 35
    • 84902282428 scopus 로고    scopus 로고
    • Efficient authentication and key management mechanisms for smart grid communications
    • Jun.
    • H. Nicanfar, P. Jokar, K. Beznosov, and V. C. M. Leung, "Efficient authentication and key management mechanisms for smart grid communications," IEEE Syst. J., vol. 8, no. 2, pp. 629-640, Jun. 2014.
    • (2014) IEEE Syst. J. , vol.8 , Issue.2 , pp. 629-640
    • Nicanfar, H.1    Jokar, P.2    Beznosov, K.3    Leung, V.C.M.4
  • 37
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • Mar.
    • M. L. Das, "Two-factor user authentication in wireless sensor networks," IEEE Trans. Wireless Commun., vol. 8, no. 3, pp. 1086-1090, Mar. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 38
    • 33750111807 scopus 로고    scopus 로고
    • An improved key distribution mechanism for large-scale hierarchical wireless sensor networks
    • Jan.
    • Y. Cheng and D. P. Agrawal, "An improved key distribution mechanism for large-scale hierarchical wireless sensor networks," Ad Hoc Netw., vol. 5, no. 1, pp. 35-48, Jan. 2007.
    • (2007) Ad Hoc Netw. , vol.5 , Issue.1 , pp. 35-48
    • Cheng, Y.1    Agrawal, D.P.2
  • 39
    • 79955281664 scopus 로고    scopus 로고
    • AIS for misbehavior detection in wireless sensor networks: Performance and design principles
    • Sep.
    • M. Drozda, S. Schaust, and H. Szczerbicka, "AIS for misbehavior detection in wireless sensor networks: Performance and design principles," in Proc. IEEE Congr. Evol. Comput. (CEC), Sep. 2007, pp. 3719-3726.
    • (2007) Proc. IEEE Congr. Evol. Comput. (CEC) , pp. 3719-3726
    • Drozda, M.1    Schaust, S.2    Szczerbicka, H.3
  • 40
    • 84923588929 scopus 로고    scopus 로고
    • Cambridge, U.K.: Cambridge Univ. Press, Mar.
    • P. Levis, TinyOS Programming. Cambridge, U.K.: Cambridge Univ. Press, Mar. 2009.
    • (2009) TinyOS Programming
    • Levis, P.1
  • 41
    • 78049298573 scopus 로고    scopus 로고
    • The price of security in wireless sensor networks
    • Dec.
    • J. Lee, K. Kapitanova, and S. H. Son, "The price of security in wireless sensor networks," Comput. Netw., vol. 54, no. 17, pp. 2967-2978, Dec. 2010.
    • (2010) Comput. Netw. , vol.54 , Issue.17 , pp. 2967-2978
    • Lee, J.1    Kapitanova, K.2    Son, S.H.3
  • 44
    • 1442357062 scopus 로고    scopus 로고
    • Internet Engineering Task Force, Fremont, CA, USA, Tech. Rep., Sep.
    • D. Eastlake and P. Jones, "US secure hash alrorithm," Internet Engineering Task Force, Fremont, CA, USA, Tech. Rep. RFC 3174, Sep. 2001.
    • (2001) US Secure Hash Alrorithm
    • Eastlake, D.1    Jones, P.2
  • 46
    • 84884905327 scopus 로고    scopus 로고
    • Secure data discovery and dissemination based on hash tree for wireless sensor networks
    • Sep.
    • D. He, S. Chan, S. Tang, and M. Guizani, "Secure data discovery and dissemination based on hash tree for wireless sensor networks," IEEE Trans. Wireless Commun., vol. 12, no. 9, pp. 4638-4646, Sep. 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.9 , pp. 4638-4646
    • He, D.1    Chan, S.2    Tang, S.3    Guizani, M.4
  • 47
    • 84961866802 scopus 로고    scopus 로고
    • Low-cost standard signatures in wireless sensor networks: A case for reviving pre-computation techniques?
    • San Diego, CA, USA, Feb.
    • G. Ateniese, G. Bianchi, A. Capossele, and C. Petrioli, "Low-cost standard signatures in wireless sensor networks: A case for reviving pre-computation techniques?" in Proc. NDSS, San Diego, CA, USA, Feb. 2013.
    • (2013) Proc. NDSS
    • Ateniese, G.1    Bianchi, G.2    Capossele, A.3    Petrioli, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.