Skip to main content

Secure User Authentication Mechanism in Digital Home Network Environments

  • Conference paper
Embedded and Ubiquitous Computing (EUC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 4096))

Included in the following conference series:

Abstract

The home network is a new IT technology environment for making an offer of convenient, safe, pleasant, and blessed lives to people, making it possible to be provided with various home network services by constructing home network infrastructure regardless of devices, time, and places. This can be done by connecting home devices based on wire and wireless communication networks, such as mobile communication, Internet, and sensor network. However, there are many risks involved, for example user privacy violations and service interference. Therefore, security service is required to block these risk elements, and user authentication is an essential component for secure home network service. It enables non-authorized persons not to use home network. In this paper, an authentication protocol for secure communications is proposed for secure home network environments. The proposed authentication protocol is designed to accept existing home networks based on public key infrastructure (PKI) and Authentication, Authorization, and Accounting (AAA), which both use Kerberos.

This research was supported by the Ministry of Information and Communication (MIC), Korea, under the Information Technology Research Center (ITRC) support program supervised by the Institute of Information Technology Assessment (IITA), IITA-2005-(C1090-0501-0019).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Choi, K., et al.: Trends of Home Networking Standardization in Korea. KETI Journal (2003)

    Google Scholar 

  2. Park, Y., et al.: Home Station Architecture based on Digital Convergence toward U-Home age. ETRI Journal (2003)

    Google Scholar 

  3. OSGi Service Platform, Release 4 Specification (October 2005), http://www.osgi.org

  4. Lim, S., et al.: Home Network Protocol Architecture for Ubiquitous Communication. Journal of KIPS 10 (2003)

    Google Scholar 

  5. Clifford Neuman, B., Stubblebie, S.G.: A Note on the Use of Timestamps as Nonces Operating Systems Review (1993)

    Google Scholar 

  6. Clifford Neuman, B., Is’o, T.: Kerberos: An Authentication Service for computer Network. Computer Magazine (September 1994)

    Google Scholar 

  7. OSGi: RFC 18 - Security Architecture. Specification, Draft (2001)

    Google Scholar 

  8. Jeon, K., et al.: User Authentication Mechanism in OSGi Service Framework Enviroments. Journal of KISS 9 (2003)

    Google Scholar 

  9. CCITT Recommendation X.509. The Directory Authentication Framework, CCITT (December 1998)

    Google Scholar 

  10. IEEE P802.11i/D9.0 Medium Access Control(MAC) Security (2004)

    Google Scholar 

  11. Gu, J., et al.: Security Clustering: A Network-wide Secure Computing Mechanism in Pervasive Computing. In: Mitrou, N.M., Kontovasilis, K., Rouskas, G.N., Iliadis, I., Merakos, L. (eds.) NETWORKING 2004. LNCS, vol. 3042, pp. 1326–1331. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  12. Jo, H., Youn, H.: A Secure User Authentication Protocol Based on One-Time-Password for Home Network. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3480, p. 519. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  13. MIT Media Lab: Things That Think Consortium, http://ttt.media.mit.edu

  14. Microsoft Research: Easy Living, http://research.microsoft.com/easyliving

  15. Chen, Y., Yeh, L.: An Efficient Authentication and Access Control Scheme Using Smart Cards. In: Parallel and Distributed Systems, Proceedings. 11th International Conference (ICPADS 2005), vol. 2(20-22), pp. 78–82 (July 2005)

    Google Scholar 

  16. Aboba, B., et al.: Extensible Authentication Protocol (EAP), RFC 3748 (June 2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jeong, J., Chung, M.Y., Choo, H. (2006). Secure User Authentication Mechanism in Digital Home Network Environments. In: Sha, E., Han, SK., Xu, CZ., Kim, MH., Yang, L.T., Xiao, B. (eds) Embedded and Ubiquitous Computing. EUC 2006. Lecture Notes in Computer Science, vol 4096. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11802167_36

Download citation

  • DOI: https://doi.org/10.1007/11802167_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-36679-9

  • Online ISBN: 978-3-540-36681-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics