Hits:
Indexed by:会议论文
Date of Publication:2011-12-30
Included Journals:EI、CPCI-S、CPCI-SSH、Scopus
Volume:143
Page Number:755-+
Key Words:Trustworthy Environment; TPM; Smart Home; Trusted Computing
Abstract:Nowadays, trusted computing plays an important role in improving information security and building trusted environment for network related applications. In this paper, an effective implementation of smart home based on existing trusted hardware components and software stacks is studied. We investigate the digital certificate generation and its use, key hierarchy and its establishment, software integrity measurement, firmware upgrading and default recovery processes, and related key steps. We present a practical establishment for a high trustworthy environment over smart home applications by using TPM. The case study aims to act as a useful supplement and practical solution reference for trusted system deployment.