{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T03:10:03Z","timestamp":1717038603720},"reference-count":17,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T00:00:00Z","timestamp":1294358400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"Security should be integrated into future networks from the beginning, not as an extension. Secure identities and authentication schemes are an important step to fulfill this quest. In this article, we argue that home networks are a natural trust anchor for such schemes. We describe our concept of home networks as a universal point of reference for authentication, trust and access control, and show that our scheme can be applied to any next generation network. As home networks are no safe place, we apply Trusted Computing technology to prevent the abuse of identities, i.e., identity theft.<\/jats:p>","DOI":"10.3390\/fi3010001","type":"journal-article","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T15:54:14Z","timestamp":1294415654000},"page":"1-13","source":"Crossref","is-referenced-by-count":6,"title":["On Using TPM for Secure Identities in Future Home Networks"],"prefix":"10.3390","volume":"3","author":[{"given":"Holger","family":"Kinkelin","sequence":"first","affiliation":[{"name":"Faculty of Informatics, Technische Universit\u00e4t, M\u00fcnchen, Boltzmannstra\u00dfe 3, 85748 Garching, Germany"}]},{"given":"Ralph","family":"Holz","sequence":"additional","affiliation":[{"name":"Faculty of Informatics, Technische Universit\u00e4t, M\u00fcnchen, Boltzmannstra\u00dfe 3, 85748 Garching, Germany"}]},{"given":"Heiko","family":"Niedermayer","sequence":"additional","affiliation":[{"name":"Faculty of Informatics, Technische Universit\u00e4t, M\u00fcnchen, Boltzmannstra\u00dfe 3, 85748 Garching, Germany"}]},{"given":"Simon","family":"Mittelberger","sequence":"additional","affiliation":[{"name":"Faculty of Informatics, Technische Universit\u00e4t, M\u00fcnchen, Boltzmannstra\u00dfe 3, 85748 Garching, Germany"}]},{"given":"Georg","family":"Carle","sequence":"additional","affiliation":[{"name":"Faculty of Informatics, Technische Universit\u00e4t, M\u00fcnchen, Boltzmannstra\u00dfe 3, 85748 Garching, Germany"}]}],"member":"1968","published-online":{"date-parts":[[2011,1,7]]},"reference":[{"key":"ref_1","unstructured":"V\u00f6lker, L., Martin, D., Khayat, I.E., Werle, C., and Zitterbart, M. (, January June). A Node Architecture for 1000 Future Networks. Dresden, Germany."},{"key":"ref_2","unstructured":"Fouquet, M., Niedermayer, H., and Carle, G. (, January December). Cloud Computing for the Masses. Rome, Italy."},{"key":"ref_3","unstructured":"AutHoNe is funded by the German Federal Ministry of Education and Research."},{"key":"ref_4","unstructured":"Carle, G., Kinkelin, H., M\u00fcller, A., Niedermayer, H., Pahl, M.O., K\u00f6nig, A., Luckenbach, T., Scholl, K., Schuster, M., Thiem, L., Petrak, L., Steinmetz, M., Niedermeier, C., and Reichmann, J. (, January July). Autonomic Home Networks in the BMBF project AutHoNe. W\u00fcrzburg, Germany."},{"key":"ref_5","unstructured":"M\u00fcller, A., Kinkelin, H., Ghai, S., and Carle, G. An Assisted Device Registration and Service Access System for Future Home Networks."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MC.2002.1012427","article-title":"The Resurrecting Duckling: Security issues for ubiquitous computing","volume":"35","author":"Stajano","year":"2002","journal-title":"IEEE Comput."},{"key":"ref_7","unstructured":"M\u00fcller, A., Kinkelin, H., Ghai, S.K., and Carle, G. (, January September). A secure service infrastructure for interconnecting future home networks based on DPWS and XACML. New Delhi, India."},{"key":"ref_8","unstructured":"Eckersley, P., and Burns, J. (, January July). An observatory for the SSLiverse. Las Vegas, NV, USA."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MC.2002.1023787","article-title":"PKI: It's not dead, just resting","volume":"35","author":"Gutmann","year":"2002","journal-title":"IEEE Comput."},{"key":"ref_10","first-page":"1","article-title":"Ten Risks of PKI: What You're not Being Told about Public Key Infrastructure","volume":"16","author":"Ellison","year":"2000","journal-title":"Comput. Security J."},{"key":"ref_11","unstructured":"Holz, R., Niedermayer, H., Hauck, P., and Carle, G. (, January June). Trust-Rated Authentication for Domain-Structured Distributed Systems. Trondheim, Norway."},{"key":"ref_12","unstructured":"Trusted Computing Group (2004). TCG Specification\u2014Architecture Overview, Revision 1.2."},{"key":"ref_13","unstructured":"Trusted Computing Group (2007). TPM Main Specification Level 2 Version 1.2, Revision 103, Part 1: Design Principles."},{"key":"ref_14","unstructured":"Trusted Computing Group (2006). TPM Main Specification Level 2 Version 1.2, Revision 103, Part 2: Structures of the TPM."},{"key":"ref_15","unstructured":"Trusted Computing Group (2006). TPM Main Specification Level 2 Version 1.2, Revision 103, Part 3: Commands."},{"key":"ref_16","unstructured":"Sailer, R., Zhang, X., Jaeger, T., and van Doorn, L. (, January August). Design and Implementation of a TCG-based Integrity Measurement Architecture. San Diego, CA, USA."},{"key":"ref_17","unstructured":"Berger, S., Ceres, R., Goldman, K., Perez, R., Sailer, R., and van Doorn, L. (2006). vTPM: Virtualizing the Trusted Platform Module, IBM Research. Technical Report."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/3\/1\/1\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T02:41:06Z","timestamp":1717036866000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/3\/1\/1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1,7]]},"references-count":17,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2011,3]]}},"alternative-id":["fi3010001"],"URL":"https:\/\/doi.org\/10.3390\/fi3010001","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1,7]]}}}