Abstract
Since the end of 2000, smartphones have explosively spread and have made people’s lives plentiful. With the start of smartphones, new smart devices, including tablet PCs, smart TVs, smart refrigerators, and smart air conditioners, have emerged, expanding their areas from individuals to business and home. These days, smart home service has drawn a lot of attention as a human-centric service. It is the environment where home appliances and other smart devices are connected to internet in order for user service and experience. The current smart home service is simply based on wireless home network to execute the function of connected home. The service has no smart home security so that it is possible for users to suffer a financial loss caused by information leakage or home appliance hacking. Therefore, to apply smart home service to surroundings, it is necessary to take into account security of smart devices. In this paper, we propose an enhanced security framework for smart devices in a smart home environment. The security framework provides the integrity system using the self-signing and access control techniques for preventing the security threats such as data modification, leakage and code fabrication.
Highlights
With the development of internet of things (IoT), smart home appliances have been released
The smart home service is like a personal household based on automation
This paper proposes the internal security framework for smart devices, which can be applied to smart home appliances as well as smartphones
Summary
With the development of internet of things (IoT), smart home appliances have been released. To ensure the integrity of smart devices, it is essential to use a hash function and a digital signature for critical data or module codes [16,17,18]. The study proposed a security framework applicable to a smart home environment, which includes encryption, access control, digital signature, authentication, and logging. Appliance integrity protection framework plays a role to examine actual self-signing It has a list of signed modules and hash values saved. Mandatory access control framework To execute a newly added module in a smart device, it is required to define module authentication and proper execution rights and roles of modules. Call_Appliance Integrity Protection Framework: SubFunction( ) End If END Sub Fig. 2 Pseudo code of check for signature flag function including a hash value of module ID, device name, device version, manufacturer’s public key ID, issuer, and issuing time. It is possible to make the secondary integrity verification
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.