Mostrar el registro sencillo del ítem

dc.contributor.editorSolano A.
dc.contributor.editorOrdonez H.
dc.creatorMagre Colorado, Luz Alejandra
dc.creatorMartínez-Santos, Juan Carlos
dc.date.accessioned2020-03-26T16:32:39Z
dc.date.available2020-03-26T16:32:39Z
dc.date.issued2017
dc.identifier.citationCommunications in Computer and Information Science; Vol. 735, pp. 759-771
dc.identifier.isbn9783319665610
dc.identifier.issn18650929
dc.identifier.urihttps://hdl.handle.net/20.500.12585/8949
dc.description.abstractHome automation is a rising technology that is available to anyone thanks to the reduce cost of the embedded systems. Since the appearance of different products to create your own domotic system, and the recent popularity around the Internet of Things (IoT) technology, the domotics industry has changed. The ability to control devices through the Internet creates numerous vulnerabilities to the system, allowing an attacker to control or see everything. In this work, we present a domotic system which uses a leveraged 1-wire as its communication channel. The original system lacks of any kind of security. Our objective is to implement information security through the encryption of the system’s commands, so we can assure the CIA triad (Confidentiality, Integrity and Availability). The results show that we achieve a secure communication without affecting the user experience due to the low overhead our approach provides. © Springer International Publishing AG 2017.eng
dc.format.mediumRecurso electrónico
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherSpringer Verlag
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/
dc.sourcehttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85028646233&doi=10.1007%2f978-3-319-66562-7_54&partnerID=40&md5=a1007cd21bf178b00440c7c8464c2719
dc.titleLeveraging 1-wire communication bus system for secure home automation
dcterms.bibliographicCitationBrush, A., Lee, B., Mahajan, R., Agarwal, S., Saroiu, S., Dixon, C., Home automation in the wild: Challenges and opportunities (2011) Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2115-2124
dcterms.bibliographicCitationLucero, S., Burden, K., Home automation and control (2010) ABI Research
dcterms.bibliographicCitationGoodwin, S., (2013) Smart Home Automation with Linux and Raspberry Pi
dcterms.bibliographicCitationJima Masache, M.E., Zambrano Espinosa, J.H., (2015) Diseño E implementación De Un Prototipo De Sistema domótico Para Permitir El Control Centralizado De Dispositivos Dentro Del Hogar Controlado Por FPGA Utilizando El Protocolo, 10. , Ph.D. thesis, EPN, Quito
dcterms.bibliographicCitationSabalza, M.M., Santos, J.C.M., Design and construction of a power meter to optimize usage of the electric power (2014) 2014 III International Congress of Engineering Mechatronics and Automation (CIIMA), pp. 1-5
dcterms.bibliographicCitation(2016) Digital Market Outlook: Smart Home (2015), 7. , Maxim Integrated: Dallas semiconductor
dcterms.bibliographicCitation(2016) Maxim Integrated: Dallas semiconductor, , Maxim Integrated: Dallas semiconductor
dcterms.bibliographicCitationHagras, H., Callaghan, V., Colley, M., Clarke, G., Pounds-Cornish, A., Duman, H., Creating an ambient-intelligence environment using embedded agents (2004) IEEE Intell. Syst, 19 (6), pp. 12-20
dcterms.bibliographicCitationDebono, C.J., Abela, K., Implementation of a home automation system through a central FPGA controller (2012) 2012 16Th IEEE Mediterranean Electrotechnical Conference (MELECON), pp. 641-644
dcterms.bibliographicCitationHill, K., (2013) When ‘smart homes’ Get Hacked: I Haunted a Complete stranger’s House via the Internet
dcterms.bibliographicCitationOluwafemi, T., Kohno, T., Gupta, S., Patel, S., Experimental security analyses of non-networked compact fluorescent lamps: A case study of home automation security (2013) Proceedings of the LASER 2013 (LASER 2013, pp. 13-24
dcterms.bibliographicCitationMoore, N.C., (2016) Hacking into Homes: ‘smart home’ Security Flaws Found in Popular System, May
dcterms.bibliographicCitationHiggins, K.J., (2015) Popular Home Automation System Backdoored via Unpatched Flaw, April
dcterms.bibliographicCitationMaceková, L., 1-wire-the technology for sensor networks (2012) Acta Electrotechnica Et Informatica, 12 (4), p. 52
dcterms.bibliographicCitationJayakody, J., Wijesundara, M., (2014) An Automated Monitoring and Alert System for a Typical Server Room
dcterms.bibliographicCitationAnoprienko, A., Varzar, R., Anoprienko, A.Y., Varzar, R.L., Anoprnko, O.Y., (2012) Intelligent Supersensory Computer Network for Measurement and Analysis of Environmental Hazards
dcterms.bibliographicCitationWu, Q., Zhang, G., Yan, L., (2016) Temperature and Humidity Sensor Research Based on Monobus Technology
dcterms.bibliographicCitationAkpan, V.A., Osakwe, R.A., (2015) Real-Time Embedded System for Online Temperature and Pressure Measurements for Automated Fluid Flow Monitoring and Control
dcterms.bibliographicCitation(2006) Maxim Integrated: Determining the Recovery Time for Multiple-Slave 1-Wire Networks, June
dcterms.bibliographicCitation(2013) Maxim Integrated: Ibutton RTC
dcterms.bibliographicCitation(2002) Dallas Semiconductor Ibutton: A Practical Introduction to the Dallas Semiconductor Ibutton
dcterms.bibliographicCitationGrand, J., (2001) Ds1991 Multikey Ibutton Dictionary Attack Vulnerability
dcterms.bibliographicCitationOswald, D., Side-channel attacks on SHA-1-based product authentication ICs (2016) CARDIS 2015. LNCS, 9514, pp. 3-14. , Homma, N., Medwed, M. (eds.), Springer, Cham
dcterms.bibliographicCitationBrandt, C., Kasper, M., Don’t push it: Breaking iButton security (2014) FPS 2013. LNCS, 8352, pp. 369-387. , Danger, J.-L., Debbabi, M., Marion, J.-Y., Garcia-Alfaro, J., Zincir Heywood, N. (eds.), Springer, Cham
dcterms.bibliographicCitationGong, Z., Nikova, S., Law, Y.W., KLEIN: A new family of lightweight block ciphers (2012) Rfidsec 2011. LNCS, 7055, pp. 1-18. , Juels, A., Paar, C. (eds.), Springer, Heidelberg
dcterms.bibliographicCitationCannière, C., Dunkelman, O., Knežević, M., KATAN and KTANTAN — a family of small and efficient hardware-oriented block ciphers (2009) CHES 2009. LNCS, 5747, pp. 272-288. , Clavier, C., Gaj, K. (eds.), Springer, Heidelberg
dcterms.bibliographicCitationHong, D., HIGHT: A New Block Cipher Suitable for Low-Resource Device, 4249, pp. 46-59. , Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS
dcterms.bibliographicCitationWheeler, D.J., Needham, R.M., (1995) TEA, a Tiny Encryption Algorithm, 1008, pp. 363-366. , Preneel, B. (ed.) FSE 1994. LNCS, Springer, Heidelberg
dcterms.bibliographicCitationBogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C., PRESENT: An ultra-lightweight block cipher (2007) CHES 2007. LNCS, 4727, pp. 450-466. , Paillier, P., Verbauwhede, I. (eds.), Springer, Heidelberg
dcterms.bibliographicCitationEngels, D., Fan, X., Gong, G., Hu, H., Smith, E.M., Hummingbird: Ultra-lightweight cryptography for resource-constrained devices (2010) FC 2010. LNCS, 6054, pp. 3-18. , Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.), Springer, Heidelberg
dcterms.bibliographicCitationBarreto, P., Simplicio, M., CURUPIRA, a block cipher for constrained platforms (2007) Simpósio Brasileiro De Redes De Computadores E Sistemas Distribuídos-SBRC, 2007
dcterms.bibliographicCitationPoschmann, A., Leander, G., Schramm, K., Paar, C., New light-weight crypto algorithms for RFID (2007) IEEE, pp. 1843-1846
dcterms.bibliographicCitationBeaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L., The Simon and Speck lightweight block ciphers (2015) Proceedings of the 52Nd Annual Design Automation Conference, 175p
dcterms.bibliographicCitationPanasenko, S., Smagin, S., Lightweight cryptography: Underlying principles and approaches (2011) Int. J. Comput. Theor. Eng, 3 (4), p. 516
dcterms.bibliographicCitationAlizadeh, M., Salleh, M., Zamani, M., Shayan, J., Karamizadeh, S., Security and Performance Evaluation of Lightweight Cryptographic Algorithms in RFID
dcterms.bibliographicCitationStamp, M., (2011) Information Security: Principles and Practice
dcterms.bibliographicCitationMcCoy, C., (2015) Implementations of the Simon and Speck Block Ciphers, March
dcterms.bibliographicCitationMiller, R.B., Response time in man-computer conversational transactions (1968) Proceedings of the Fall Joint Computer Conference, Part I, December, pp. 267-277
dcterms.bibliographicCitationVoss, W., (2008) A Comprehensible Guide to Controller Area Network, , Copperhill Media, New York
dcterms.bibliographicCitationMankar, J., Darode, C., Trivedi, K., Kanoje, M., Shahare, P., (2014) Review of I2C Protocol. Int. J, 2 (1), pp. 474-479
dcterms.bibliographicCitation(1988) SDI-12 Support Group-Serial Digital Interface at 1200 Baud
dcterms.bibliographicCitationBoyer, S.A., SCADA: Supervisory control and data acquisition (2009) International Society of Automation
datacite.rightshttp://purl.org/coar/access_right/c_16ec
oaire.resourceTypehttp://purl.org/coar/resource_type/c_c94f
oaire.versionhttp://purl.org/coar/version/c_970fb48d4fbd8a85
dc.source.event12th Colombian Conference on Computing, CCC 2017
dc.type.driverinfo:eu-repo/semantics/conferenceObject
dc.type.hasversioninfo:eu-repo/semantics/publishedVersion
dc.identifier.doi10.1007/978-3-319-66562-7_54
dc.subject.keywords1-wire
dc.subject.keywordsHome automation
dc.subject.keywordsSecure communication
dc.subject.keywordsCryptography
dc.subject.keywordsEmbedded systems
dc.subject.keywordsInternet of things
dc.subject.keywordsSecure communication
dc.subject.keywordsSecurity of data
dc.subject.keywords1-wire
dc.subject.keywordsCommunication bus
dc.subject.keywordsControl device
dc.subject.keywordsHome automation
dc.subject.keywordsInternet of thing (IOT)
dc.subject.keywordsLow overhead
dc.subject.keywordsOriginal systems
dc.subject.keywordsUser experience
dc.subject.keywordsAutomation
dc.rights.accessrightsinfo:eu-repo/semantics/restrictedAccess
dc.rights.ccAtribución-NoComercial 4.0 Internacional
dc.identifier.instnameUniversidad Tecnológica de Bolívar
dc.identifier.reponameRepositorio UTB
dc.relation.conferencedate19 September 2017 through 22 September 2017
dc.type.spaConferencia
dc.identifier.orcid56682785300
dc.identifier.orcid26325154200


Ficheros en el ítem

FicherosTamañoFormatoVer

No hay ficheros asociados a este ítem.

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

http://creativecommons.org/licenses/by-nc-nd/4.0/
http://creativecommons.org/licenses/by-nc-nd/4.0/

Universidad Tecnológica de Bolívar - 2017 Institución de Educación Superior sujeta a inspección y vigilancia por el Ministerio de Educación Nacional. Resolución No 961 del 26 de octubre de 1970 a través de la cual la Gobernación de Bolívar otorga la Personería Jurídica a la Universidad Tecnológica de Bolívar.