A Framework for Smart Home Services with Secure and QoS-aware Communications

Markus Hager, Sebastian Schellenberg, Jochen Seitz, Sebastian Mann, Gunar Schorcht


The scenario of smart home services will be discussed with regard to two important aspects: the quality of service problem for the in-house communication and the need for a security scheme for the whole system. We focus on an installation with smart computers in each flat interconnected using a switched Ethernet network. These smart devices are responsible for performing local services, user control and operate as a gateway for the different types of sensor and actor networks installed at each flat. We propose a QoS scheme to prevent congestion situation for the Ethernet network which is applicable to currently available cost-sensitive hardware. Furthermore, the whole system, all communication channels, user data and the access to the framework are secured by our proposed security architecture. Finally, we will present the latest improvements on Ethernet network standards, the ongoing work on this topics and our next steps for future work.

Full Text:



Smart Home Services Research Project. (2011). [Online]. Available:


ACX GmbH. (2011) ViciOne Home and Building

Automation. [Online]. Available: http://www.acx-gmbh.de/de/


M. A. Zamora-Izquierdo, J. Santa, and A. F. Gomez-Skarmeta, “An

Integral and Networked Home Automation Solution for Indoor Ambient

Intelligence,” IEEE Pervasive Computing, vol. 9, pp. 66–77, October

[Online]. Available: http://dx.doi.org/10.1109/MPRV.2010.20

Smart Home der Bundeswehr Universitaet Muenchen. (2011). [Online].

Available: http://www.unibw.de/eit8 2/forschung/projekte/shfilm/

Smarter Wohnen

R NRW, Fraunhofer IMS, Fraunhofer ISST, HGW.

(2011). [Online]. Available: http://www.smarterwohnennrw.de

Service Centric Home. (2011). [Online]. Available: http://www.sercho.de

IEEE 802.1 Audio/Video Bridging Task Group Home Page. (2011).

[Online]. Available: http://www.ieee802.org/1/pages/avbridges.html

Bannazadeh H. and Leon-Garcia A., “A Distributed Ethernet Traffic

Shaping System,” Local and Metropolitan Area Networks (LANMAN),

17th IEEE Workshop on, May 2010.

Y. Zhang, R. Yu, S. Xie, W. Yao, Y. Xiao, and M. Guizani, “Home

M2M Networks: Architectures, Standards, and QoS Improvement,”

Communications Magazine, IEEE, vol. 49, no. 4, April 2011.

G. McAlpine, “Congestion Control for Switched Ethernet,” High Performance

Interconnects for Distributed Computing, 2005.

N. Ferguson and B. Schneier, “Practical Cryptography,” Wiley Publishing,

Indianapolis, ISBN 0-471-22357-3, 2003.

N. W. Group, “A Stream Cipher Encryption Algorithm ’Arcfour’,”

Internet Engineering Task Force, 1997.

W. Diffie and M. E. Hellman, “New Directions in Cryptography,” In

IEEE Transactions on Information Theory. 22, Nr. 6, 1976.

RSA Security. (1991) Public Key Cryptography Standards Number

: Diffie Hellman Key Agreement Standard. [Online]. Available:


N. W. Group, “RFC 2631: Diffie-Hellman Key Agreement Method,”

Internet Engineering Task Force, 1999.

B. Kaliski, RSA Security. (2003) TWIRL and RSA Key Size. [Online].

Available: http://www.rsa.com/rsalabs/node.asp?id=2004

W. Diffie, P. C. V. Oorschot, and M. J. Wiener, “Authentication and

Authenticated Key Exchanges,” Designs, Codes and Cryptography,

vol. 2, no. 2, pp. 107 – 125, 1992.

H. D. B. Preneel, A. Bosselaers, “The Cryptographic Hash Function

RIPEMD-160,” CryptoBytes, Vol. 3, Nr. 2, 1997.

M. Hager, S. Schellenberg, J. Seitz, S. Mann, and G. Schorcht, “Secure

and QoS-aware Communications for Smart Home Services,” in Telecommunications

and Signal Processing (TSP), 2012 35th International

Conference on, july 2012.

G. Bertoni, J. Daemen, M. Peeters, and G. V. Assche, “The keccak

reference,” Submission to NIST (Round 3), 2011. [Online]. Available:


N. I. for Standards and Technology, “Winner of the cryptographic

hash algorithm competition for sha-3,” 2012. [Online]. Available:


Jayadeva, S. Shah, R. Kothari, and S. Chandra, “Debugging ants: How

ants find the shortest route,” in Information, Communications and Signal

Processing (ICICS) 2011 8th International Conference on, dec. 2011.

S. Reinemo, T. Skeie, and M. Wadekar, “Ethernet for high-performance

data centers: On the new ieee datacenter bridging standards,” Micro,

IEEE, vol. 30, no. 4, pp. 42 –51, july-aug. 2010.

W. Noureddine, F. Tobagi, W. Noureddine, and F. Tobagi, “Selective

back-pressure in switched ethernet lans,” in Proceedings of IEEE

GLOBECOM, 1999, pp. 1256–1263.

M. e. a. Alizadeh, “Data center transport mechanisms: Congestion

control theory and ieee standardization,” in Communication, Control,

and Computing, 2008 46th Annual Allerton Conference on, sept. 2008.

W. Jiang, F. Ren, C. Lin, and I. Stojmenovic, “Analysis of backward

congestion notification with delay for enhanced ethernet networks,” in

INFOCOM, 2012 Proceedings IEEE, march 2012, pp. 2961 –2965.

M. Hagen and R. Zarick, “Performance evaluation of dcb’s prioritybased

flow control,” in Network Computing and Applications (NCA),

10th IEEE International Symposium on, aug. 2011, pp. 328 –333.

R. Sofia, “A survey of advanced ethernet forwarding approaches,”

Communications Surveys Tutorials, IEEE, vol. 11, no. 1, quarter 2009.

R. Perlman, “Challenges and Opportunities in the Design of TRILL: A

Routed Layer 2 Technology,” in GLOBECOM Workshops, IEEE, 2009.

K. Miyazaki, K. Nishimura, J. Tanaka, and S. Kotabe, “First-Come First-

Served Routing for the Data Center Network: Low Latency Loop-Free

Routing,” in World Telecommunications Congress (WTC),, march 2012.

D. Allan, J. Farkas, and S. Mansfield, “Intelligent load balancing for

shortest path bridging,” Communications Magazine, IEEE, july 2012.

DOI: http://dx.doi.org/10.11601/ijates.v2i1.14


  • There are currently no refbacks.