Abstract: The integration of computer and data processing within the habitat constitutes the engine of development of ’home automation’. The number of homes which use these new technologies are increasing. For example, in the USA, one of the most developed countries in this domain, with a regular user growth rate of 32%, more than 95% of homes are linked to Internet. The connection of the home to the outside world, in particular to Internet, improves services delivered by a domestic network. Communications must be strongly secured because hackers or pirates are more and more interested in this kind of network. The domestic network is divided into several sub-networks. In this paper, we are interesting in the FAN (Field Area Network) sub-network. The paper will deal with the security of the domestic network. We propose a modular approach, based on the IPsec protocol, to secure the FAN sub-network. This module receives unsecured messages from a domestic device, transforms them into secured messages then sends them to the server or to another device.
Abstract: Today, Home Automation is much developed; the domestic networks too. Sometimes, this kind of network becomes more complex than those used in companies. It makes it possible to connect the data-processing devices used by the inhabitants of a domotized house and to manage all the other electronic devices such as the electrical-goods and home-automation devices. Linking the habitat to the outside (by using wiring communications or wireless communications like satellite communications) enables it to extend all the functionalities which it offers. This opening of the network to the outside creates at the same time problems of security. In fact, the data which circulate within the domestic network become more and more important. We can find information about the private life of the residents, their credit card codes, etc., which arouses the interest of the pirates. This paper deals with domestic network security. This kind of network has a particular structure. It consists of a gateway and many sub-networks that use different protocols. Every component has its own security flaws. We highlight, in this paper, the different security flaws of each one of these areas. We also propose the security tools which are necessary to apply to these areas in order to secure them. And, in order to achieve a most powerful security, we take care of ensuring an effective and total security.
Abstract: The integration of micro-computing and information technology (IT) within the habitat has changed the ways of life of its inhabitants. It has improved the management and comfort of the habitat. The expansion of habit towards the outside via Internet opens the way to a new information society where human relations are progressing and the e-commerce is popularizing. This expansion by Internet has not only benefits but also generates network security problems. For example, in United-States of America, the domotized habitat is more developed, the problem of home networks attacks starts to take an extent [Londr_03]. In the potential goal to get profits, the pirates are more and more attracted by the information circulating in domestic computer network. They can have for example an access to the resident’s bank credit card codes or any other information about their private life like. Currently, there are several security flaws in the domestic networks. This network has a particular structure and each part constituting it, has its own security flaws. Our goal, in this paper, is to highlight all these weak points and specify the places where it is necessary to implement some suitable security measures in order to make the domestic network security the most perfect possible. It is a difficult problem because it is necessary to consider a best solution as a whole to ensure a total security of the domestic network and at the same time to guarantee that each technical solution, on its level, is the most efficient with the available network elements.
Abstract: Domestic networks such as they are currently conceived are more vulnerable than ordinary computer networks. This is due to the intrinsic characteristics of these networks and their users. To secure them, traditional security tools are not always adapted. Either they cannot be applied to such networks, or they are too constraining for their users. So, we have proposed solutions which complemente traditional and old security solutions. In addition to the existing solutions applicable to domestic networks, we have proposed new ones in order to secure remote and internal communications.