User-friendly Establishment of Trust in Distributed Home Automation Networks

Theis Solberg Hjorth, Rune Torbensen, Per Printz Madsen

Publikation: Bidrag til tidsskriftTidsskriftartikelForskningpeer review

Resumé

Current wireless technologies use a variety of methods to locally exchange and verify credentials between devices to establish trusted relationships. Scenarios in home automation networks also require this capability over the Internet, but the necessary involvement of non-expert users to setup these relationships can lead to misconfiguration or breaches of security. We outline a security system for Home Automation called Trusted Domain that can establish and maintain cryptographically secure relationships between devices connected via IP-based networks and the Internet. Trust establishment is presented in a simple and meaningful way that allows non-expert users to make the correct security decisions when enrolling new devices. We propose a social remote mutual authentication method called the PictogramDB Hash designed to easily and accurately verify certificate hash values by visualizing them with sequences of pre-defined pictograms. This method is designed to scale from smartphones and tablets down to low-resource embedded systems. The presented approach is supported by an extensive literature study, and the ease of use and feasibility of the method has been investigated via user study and implementation.
OriginalsprogEngelsk
TidsskriftJournal of Internet Technology
Vol/bind15
Udgave nummer2
Sider (fra-til)249-260
ISSN1607-9264
DOI
StatusUdgivet - 2014

Fingerprint

Automation
Internet
Smartphones
Security systems
Embedded systems
Authentication

Citer dette

@article{0cae2f5344b3402aa33f0f599154587c,
title = "User-friendly Establishment of Trust in Distributed Home Automation Networks",
abstract = "Current wireless technologies use a variety of methods to locally exchange and verify credentials between devices to establish trusted relationships. Scenarios in home automation networks also require this capability over the Internet, but the necessary involvement of non-expert users to setup these relationships can lead to misconfiguration or breaches of security. We outline a security system for Home Automation called Trusted Domain that can establish and maintain cryptographically secure relationships between devices connected via IP-based networks and the Internet. Trust establishment is presented in a simple and meaningful way that allows non-expert users to make the correct security decisions when enrolling new devices. We propose a social remote mutual authentication method called the PictogramDB Hash designed to easily and accurately verify certificate hash values by visualizing them with sequences of pre-defined pictograms. This method is designed to scale from smartphones and tablets down to low-resource embedded systems. The presented approach is supported by an extensive literature study, and the ease of use and feasibility of the method has been investigated via user study and implementation.",
author = "{Solberg Hjorth}, Theis and Rune Torbensen and Madsen, {Per Printz}",
year = "2014",
doi = "10.6138/JIT.2014.15.2.11",
language = "English",
volume = "15",
pages = "249--260",
journal = "Journal of Internet Technology",
issn = "1607-9264",
publisher = "National Dong Hwa University Computer Center",
number = "2",

}

User-friendly Establishment of Trust in Distributed Home Automation Networks. / Solberg Hjorth, Theis ; Torbensen, Rune; Madsen, Per Printz.

I: Journal of Internet Technology, Bind 15, Nr. 2, 2014, s. 249-260.

Publikation: Bidrag til tidsskriftTidsskriftartikelForskningpeer review

TY - JOUR

T1 - User-friendly Establishment of Trust in Distributed Home Automation Networks

AU - Solberg Hjorth, Theis

AU - Torbensen, Rune

AU - Madsen, Per Printz

PY - 2014

Y1 - 2014

N2 - Current wireless technologies use a variety of methods to locally exchange and verify credentials between devices to establish trusted relationships. Scenarios in home automation networks also require this capability over the Internet, but the necessary involvement of non-expert users to setup these relationships can lead to misconfiguration or breaches of security. We outline a security system for Home Automation called Trusted Domain that can establish and maintain cryptographically secure relationships between devices connected via IP-based networks and the Internet. Trust establishment is presented in a simple and meaningful way that allows non-expert users to make the correct security decisions when enrolling new devices. We propose a social remote mutual authentication method called the PictogramDB Hash designed to easily and accurately verify certificate hash values by visualizing them with sequences of pre-defined pictograms. This method is designed to scale from smartphones and tablets down to low-resource embedded systems. The presented approach is supported by an extensive literature study, and the ease of use and feasibility of the method has been investigated via user study and implementation.

AB - Current wireless technologies use a variety of methods to locally exchange and verify credentials between devices to establish trusted relationships. Scenarios in home automation networks also require this capability over the Internet, but the necessary involvement of non-expert users to setup these relationships can lead to misconfiguration or breaches of security. We outline a security system for Home Automation called Trusted Domain that can establish and maintain cryptographically secure relationships between devices connected via IP-based networks and the Internet. Trust establishment is presented in a simple and meaningful way that allows non-expert users to make the correct security decisions when enrolling new devices. We propose a social remote mutual authentication method called the PictogramDB Hash designed to easily and accurately verify certificate hash values by visualizing them with sequences of pre-defined pictograms. This method is designed to scale from smartphones and tablets down to low-resource embedded systems. The presented approach is supported by an extensive literature study, and the ease of use and feasibility of the method has been investigated via user study and implementation.

U2 - 10.6138/JIT.2014.15.2.11

DO - 10.6138/JIT.2014.15.2.11

M3 - Journal article

VL - 15

SP - 249

EP - 260

JO - Journal of Internet Technology

JF - Journal of Internet Technology

SN - 1607-9264

IS - 2

ER -