Current wireless technologies use a variety of methods to locally exchange and verify credentials between devices to establish trusted relationships. Scenarios in home automation networks also require this capability over the Internet, but the necessary involvement of non-expert users to setup these relationships can lead to misconfiguration or breaches of security. We outline a security system for Home Automation called Trusted Domain that can establish and maintain cryptographically secure relationships between devices connected via IP-based networks and the Internet. Trust establishment is presented in a simple and meaningful way that allows non-expert users to make the correct security decisions when enrolling new devices. We propose a social remote mutual authentication method called the PictogramDB Hash designed to easily and accurately verify certificate hash values by visualizing them with sequences of predefined pictograms. This method is designed to scale from smart-phones and tablets down to low-resource embedded systems. The presented approach is supported by an extensive literature study, and the ease of use and feasibility of the method has been indicated through a preliminary user study and implementation.
9781467325691, 9781467325684, 9781467325660
2012 Ieee 23rd International Symposium on Personal, Indoor and Mobile Radio Communications, Pimrc 2012, 2012, p. 7-12
authentication; data visualization; home automation; mobile computing; security; usability; wireless networks
Main Research Area:
I E E E International Symposium Personal, Indoor and Mobile Radio Communications
2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2012