Abstract
The home network is a new IT technology environment for making an offer of convenient, safe, pleasant, and blessed lives to people, making it possible to be provided with various home network services by constructing home network infrastructure regardless of devices, time, and places. This can be done by connecting home devices based on wire and wireless communication networks, such as mobile communication, Internet, and sensor network. However, there are many risks involved, for example user privacy violations and service interference. Therefore, security service is required to block these risk elements, and user authentication is an essential component for secure home network service. It enables non-authorized persons not to use home network. In this paper, an authentication protocol for secure communications is proposed for secure home network environments. The proposed authentication protocol is designed to accept existing home networks based on public key infrastructure (PKI) and Authentication, Authorization, and Accounting (AAA), which both use Kerberos.
This research was supported by the Ministry of Information and Communication (MIC), Korea, under the Information Technology Research Center (ITRC) support program supervised by the Institute of Information Technology Assessment (IITA), IITA-2005-(C1090-0501-0019).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Choi, K., et al.: Trends of Home Networking Standardization in Korea. KETI Journal (2003)
Park, Y., et al.: Home Station Architecture based on Digital Convergence toward U-Home age. ETRI Journal (2003)
OSGi Service Platform, Release 4 Specification (October 2005), http://www.osgi.org
Lim, S., et al.: Home Network Protocol Architecture for Ubiquitous Communication. Journal of KIPSÂ 10 (2003)
Clifford Neuman, B., Stubblebie, S.G.: A Note on the Use of Timestamps as Nonces Operating Systems Review (1993)
Clifford Neuman, B., Is’o, T.: Kerberos: An Authentication Service for computer Network. Computer Magazine (September 1994)
OSGi: RFC 18 - Security Architecture. Specification, Draft (2001)
Jeon, K., et al.: User Authentication Mechanism in OSGi Service Framework Enviroments. Journal of KISSÂ 9 (2003)
CCITT Recommendation X.509. The Directory Authentication Framework, CCITT (December 1998)
IEEE P802.11i/D9.0 Medium Access Control(MAC) Security (2004)
Gu, J., et al.: Security Clustering: A Network-wide Secure Computing Mechanism in Pervasive Computing. In: Mitrou, N.M., Kontovasilis, K., Rouskas, G.N., Iliadis, I., Merakos, L. (eds.) NETWORKING 2004. LNCS, vol. 3042, pp. 1326–1331. Springer, Heidelberg (2004)
Jo, H., Youn, H.: A Secure User Authentication Protocol Based on One-Time-Password for Home Network. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3480, p. 519. Springer, Heidelberg (2005)
MIT Media Lab: Things That Think Consortium, http://ttt.media.mit.edu
Microsoft Research: Easy Living, http://research.microsoft.com/easyliving
Chen, Y., Yeh, L.: An Efficient Authentication and Access Control Scheme Using Smart Cards. In: Parallel and Distributed Systems, Proceedings. 11th International Conference (ICPADS 2005), vol. 2(20-22), pp. 78–82 (July 2005)
Aboba, B., et al.: Extensible Authentication Protocol (EAP), RFC 3748 (June 2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jeong, J., Chung, M.Y., Choo, H. (2006). Secure User Authentication Mechanism in Digital Home Network Environments. In: Sha, E., Han, SK., Xu, CZ., Kim, MH., Yang, L.T., Xiao, B. (eds) Embedded and Ubiquitous Computing. EUC 2006. Lecture Notes in Computer Science, vol 4096. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11802167_36
Download citation
DOI: https://doi.org/10.1007/11802167_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-36679-9
Online ISBN: 978-3-540-36681-2
eBook Packages: Computer ScienceComputer Science (R0)