Open AccessThis article is
- freely available
On Using TPM for Secure Identities in Future Home Networks
Faculty of Informatics, Technische Universität, München, Boltzmannstraße 3, 85748 Garching, Germany
* Author to whom correspondence should be addressed.
Received: 28 October 2010; Accepted: 28 December 2010 / Published: 7 January 2011
Abstract: Security should be integrated into future networks from the beginning, not as an extension. Secure identities and authentication schemes are an important step to fulfill this quest. In this article, we argue that home networks are a natural trust anchor for such schemes. We describe our concept of home networks as a universal point of reference for authentication, trust and access control, and show that our scheme can be applied to any next generation network. As home networks are no safe place, we apply Trusted Computing technology to prevent the abuse of identities, i.e., identity theft.
Keywords: next generation networks; future home networks; identity management; trusted computing; authentication; trust
Article StatisticsClick here to load and display the download statistics.
Notes: Multiple requests from the same IP address are counted as one view.
Cite This Article
MDPI and ACS Style
Kinkelin, H.; Holz, R.; Niedermayer, H.; Mittelberger, S.; Carle, G. On Using TPM for Secure Identities in Future Home Networks. Future Internet 2011, 3, 1-13.
Kinkelin H, Holz R, Niedermayer H, Mittelberger S, Carle G. On Using TPM for Secure Identities in Future Home Networks. Future Internet. 2011; 3(1):1-13.
Kinkelin, Holger; Holz, Ralph; Niedermayer, Heiko; Mittelberger, Simon; Carle, Georg. 2011. "On Using TPM for Secure Identities in Future Home Networks." Future Internet 3, no. 1: 1-13.