Share This Article:

The Analysis of the Structure and Security of Home Control Subnet

Abstract Full-Text HTML Download Download as PDF (Size:288KB) PP. 56-60
DOI: 10.4236/wsn.2009.11009    5,365 Downloads   9,629 Views   Citations

ABSTRACT

A lot of technologies can be used in home control subnet, but the hardware and software resources available for the home control subnet are limited. There are security problems easily seen. The paper gives the system-atic analysis of the structure and function of home control subnet based on the general model of home net-work. The paper has also analyzed two types of major equipment, namely sub-gateways and terminal equip-ment. The major networking technology used in home control subnet is summarized and concluded. In com-bination with relationship among home control subnet, home network, as well as the outside main network, the paper has systematically studied various safety problems related to home control gateways and the possi-ble solutions to those problems have been made.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

C. WANG and Y. ZHANG, "The Analysis of the Structure and Security of Home Control Subnet," Wireless Sensor Network, Vol. 1 No. 1, 2009, pp. 56-60. doi: 10.4236/wsn.2009.11009.

References

[1] SJ/T 11316-2005, “Home network system architecture and reference model,” People’s Republic of China Electronic Industry Standard, September 2005.
[2] SJ/T 11314-2005, “Specification for home subnet communication protocol,” People’s Republic of China Electronic Industry Standard, September 2005.
[3] SJ/T 11317-2005, “Home network device description file specification,” People’s Republic of China Electronic Industry Standard, September 2005.
[4] F. Q. Wu, J. Li, and D. S. Hu, “Application of LON works field bus technology in home network system,” Journal of Chengde Petroleum College, Chengde, No. 4, pp. 31-56, 2008.
[5] Bosch, “CAN specification Version 2.0,” September 1991.
[6] Y. Zhu, “Design and realization of an improved HTTP digest authentication scheme,” Study on optical communication, Wuhan, No. 4, pp. 59-62, 2008.
[7] Y. Y. Zeng and Z. H. Zuo, “Design and implementation of SSL protocol on embedded devices,” Journal of Chengdu University of Information Technology, Chengdu, No. 4, pp. 389-392, 2008.
[8] UPnP Forum, “UPnP device architecture 1.0,” April 2008.
[9] SJ/T 11310-2005, “Information device intelligent grouping and resource sharing Part1: Core protocol,” People’s Republic of China Electronic Industry Standard, September 2005.

  
comments powered by Disqus

Copyright © 2018 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.