Third International Conference on Natural Computation (ICNC 2007) Vol V 2007
DOI: 10.1109/icnc.2007.723
|View full text |Cite
|
Sign up to set email alerts
|

The Efficient Security Architecture for Authentication and Authorization in the Home Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2008
2008
2016
2016

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…A home network that connects many home appliances, sensors, and monitoring equipments using wire or wireless methods is also an important and promising application domain for M2M technology. However, together with the convenient services of a home network, such as home automation, home security, e‐learning, healthcare, and so on , comes a security concern that too much private information is exposed to the public channel. Malicious attacks on home network may violate users' privacy and even threaten their property and life.…”
Section: Introductionmentioning
confidence: 99%
“…A home network that connects many home appliances, sensors, and monitoring equipments using wire or wireless methods is also an important and promising application domain for M2M technology. However, together with the convenient services of a home network, such as home automation, home security, e‐learning, healthcare, and so on , comes a security concern that too much private information is exposed to the public channel. Malicious attacks on home network may violate users' privacy and even threaten their property and life.…”
Section: Introductionmentioning
confidence: 99%