2013
DOI: 10.1049/iet-ifs.2011.0303
|View full text |Cite
|
Sign up to set email alerts
|

Secure remote access to home automation networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 11 publications
(15 reference statements)
0
4
0
Order By: Relevance
“…One of the challenges of the remote monitoring is to consider the security issues due to the nature of exchanged data and their consequences. It is thus important to address the 5 generic security subcategories: (i) confidentiality , (ii) integrity , (iii) authentication , (iv) access control , and (v) availability and fairness to ensure that the inhabitants' safety is not affected by the HEMS …”
Section: Related Workmentioning
confidence: 99%
“…One of the challenges of the remote monitoring is to consider the security issues due to the nature of exchanged data and their consequences. It is thus important to address the 5 generic security subcategories: (i) confidentiality , (ii) integrity , (iii) authentication , (iv) access control , and (v) availability and fairness to ensure that the inhabitants' safety is not affected by the HEMS …”
Section: Related Workmentioning
confidence: 99%
“…The smart home has several issues: smart home sensors of low power and low computing resources; the heterogeneity of devices that have to communicate in a multiplatform environment; and, as mentioned above, possible breaches of privacy by malicious attacks or unauthorized access from users’ reckless management. To provide secure remote access to home automation networks ‘anywhere and anytime’, Khusvinder et al [ 32 ] proposed a remote access framework based on a Remote Home Server (RHS) provided by a trusted third party. The proposed framework is a hybrid scheme of direct and third party-based remote communication approaches.…”
Section: Related Workmentioning
confidence: 99%
“…Access control regulates what a user/device can do and what the programs are allowed to execute on behalf of the user/device [27] . At this layer, access control is composed of identification and authentication control, operations and function block control.…”
Section: Active Protectionmentioning
confidence: 99%