PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment
نویسندگان
چکیده
منابع مشابه
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملPrivacy Preserving Three-party Authenticated Key Agreement Protocol using Smart Cards
How to make people keep both security and privacy in communication networks has been a hot topic in recent years. Researchers proposed three party authenticated key agreement (3PAKA) protocols to answer this question, which allows two parties to agree a new secure session key with the help of a trusted server. Recently, Yang et al. proposed a provably secure 3PAKA protocol. However, this paper ...
متن کاملPrivacy-preserving Communication Protocols for Authenticated Location-based Services in Mobile Networks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 CHAPTER
متن کاملSecurity in Smart Home Environment
Over the last decades the Smart Home development is a continuously evolving field that faces exceptional challenges. However, the recent advances in information and communications technologies have led the Smart Home development in a good level of maturity. A Smart Home is a living environment that incorporates the appropriate technology, called Smart Home technology, to meet the resident goals...
متن کاملCommunication-Efficient Privacy-Preserving Clustering
The ability to store vast quantities of data and the emergence of high speed networking have led to intense interest in distributed data mining. However, privacy concerns, as well as regulations, often prevent the sharing of data between multiple parties. Privacy-preserving distributed data mining allows the cooperative computation of data mining algorithms without requiring the participating o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2019
ISSN: 1545-5971,1941-0018,2160-9209
DOI: 10.1109/tdsc.2019.2914911