Future Internet 2011, 3(1), 1-13; doi:10.3390/fi3010001

On Using TPM for Secure Identities in Future Home Networks

* email, email, email, email and email
Received: 28 October 2010; Accepted: 28 December 2010 / Published: 7 January 2011
(This article belongs to the Special Issue Semantics in the Future Internet)
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract: Security should be integrated into future networks from the beginning, not as an extension. Secure identities and authentication schemes are an important step to fulfill this quest. In this article, we argue that home networks are a natural trust anchor for such schemes. We describe our concept of home networks as a universal point of reference for authentication, trust and access control, and show that our scheme can be applied to any next generation network. As home networks are no safe place, we apply Trusted Computing technology to prevent the abuse of identities, i.e., identity theft.
Keywords: next generation networks; future home networks; identity management; trusted computing; authentication; trust
PDF Full-text Download PDF Full-Text [196 KB, uploaded 7 January 2011 15:58 CET]

Export to BibTeX |

MDPI and ACS Style

Kinkelin, H.; Holz, R.; Niedermayer, H.; Mittelberger, S.; Carle, G. On Using TPM for Secure Identities in Future Home Networks. Future Internet 2011, 3, 1-13.

AMA Style

Kinkelin H, Holz R, Niedermayer H, Mittelberger S, Carle G. On Using TPM for Secure Identities in Future Home Networks. Future Internet. 2011; 3(1):1-13.

Chicago/Turabian Style

Kinkelin, Holger; Holz, Ralph; Niedermayer, Heiko; Mittelberger, Simon; Carle, Georg. 2011. "On Using TPM for Secure Identities in Future Home Networks." Future Internet 3, no. 1: 1-13.

Future Internet EISSN 1999-5903 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert