IoT based smart home: Security challenges, security requirements and solutions

W Ali, G Dustgeer, M Awais… - 2017 23rd International …, 2017 - ieeexplore.ieee.org
Internet of Thing (IoT) is going to make such a world where physical things (smart home
appliances, and smart watches etc.) revolutionized the information networks and services …

Integrated OTP-based user authentication scheme using smart cards in home networks

J Jeong, MY Chung, H Choo - Proceedings of the 41st Annual …, 2008 - ieeexplore.ieee.org
In this paper, we propose a new user authentication (UA) scheme based on one-time
password (OTP) protocol using smart cards for home networks. The proposed scheme is to …

Security in smart home environment

G Mantas, D Lymberopoulos… - Wireless Technologies for …, 2011 - igi-global.com
This chapter presents the concept of Smart Home, describes the Smart Home networking
technologies and discusses the main issues for ensuring security in a Smart Home …

Design and implementation of a contextual-based continuous authentication framework for smart homes

Y Ashibani, D Kauling, QH Mahmoud - Applied System Innovation, 2019 - mdpi.com
There has been a rapid increase in the number of Internet of Things (IoT) devices in the last
few years, providing a wide range of services such as camera feeds, light controls, and door …

AUTHHOTP - HOTP Based Authentication Scheme over Home Network Environment

HJ Kim, HS Kim - … Conference on Computational Science and Its …, 2011 - Springer
With the rapid growth of Internet users and wireless applications, interests on home
networks have been enormously increased in recent years. For digital home networks …

[图书][B] Wireless technologies for ambient assisted living and healthcare: systems and applications: Systems and applications

A Lazakidou, K Siassiakos, K Ioannou - 2010 - books.google.com
Improving the quality of life for the disabled and elderly is a pressing issue for today? s
European societies, as Europe, and industrialized countries worldwide, are confronted with …

A new fingerprint authentication scheme based on secret-splitting for enhanced cloud security

P Wang, CC Ku, TC Wang - Recent Application in Bio-metrics, 2011 - books.google.com
The number of commercially-available web-based services is growing rapidly nowadays. In
particular, cloud computing provides an efficient and economic means of delivering …

Integrated OTP-based user authentication and access control scheme in home networks

J Jeong, MY Chung, H Choo - … Networks and Services: 10th Asia-Pacific …, 2007 - Springer
In this paper, we propose a new user authentication (UA) scheme based on one-time
password (OTP) protocol for home networks. The proposed scheme is to authenticate home …

[PDF][PDF] A new fingerprint authentication scheme based on secret-splitting for cloud computing security

P Wang, CC Ku, TC Wang - Recent Application in Biometrics, 2011 - scholar.archive.org
The number of commercially-available web-based services is growing rapidly nowadays. In
particular, cloud computing provides an efficient and economic means of delivering …

Smartcard-Based User Authentication Protocol over Home Network

H Kim, H Jung - … , Application, and Service: FutureTech 2012 Volume 1, 2012 - Springer
Recently, as home network service is popularized, the security concerns are growing up for
the home network. User authentication is the first step in any cryptographic solutions. There …