A Light Weight Authentication Protocol for Digital Home Networks

  • Ilsun You
  • Eun-Sun Jung
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3983)

Abstract

We study user authentication protocols that allow user to remotely access and control home appliances through home gateway. In particular, we explore the S/Key user authentication scheme, a widely known one-time password system. Earlier studies show that S/Key is vulnerable to server spoofing, replay, and off-line dictionary attacks. Several researchers have proposed various solutions to prevent such attacks. However, we show that these enhancements are still vulnerable to another security attacks and propose a scheme that defends such attacks.

Keywords

Smart Card Authentication Scheme Authentication Protocol Home Network Security Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Sun, H.: Home Networking, Mitsubishi Electric Research Laboratories (2004), http://www.merl.com/projects/hmnt/
  2. 2.
    Haller, N.: The S/KEY One-time Password, RFC 1760 (February 1995)Google Scholar
  3. 3.
    Haller, N., Metz, C., Nesser, P., Straw, M.: A One-time Password System, RFC 2289 (February 1998)Google Scholar
  4. 4.
    Mitchell, C.J., Chen, L.: Comments on the S/KEY User Authentication Scheme. ACM Operating Systems Review 30(4), 12–16 (1996)CrossRefGoogle Scholar
  5. 5.
    Yeh, T.C., Shen, H.Y., Hwang, J.J.: A Secure One-Time Password Authentication Scheme Using Smart Cards. IEICE Transaction on Communication E85-B(11), 2515–2518 (2002)Google Scholar
  6. 6.
    Lee, N.Y., Chen, J.C.: Improvement of One-Time Password Authentication Scheme Using Smart Cards. IEICE Transaction on Communication E88-B(9), 3765–3767 (2005)CrossRefGoogle Scholar
  7. 7.
    Yen, S.M., Liao, K.H.: Shared Authentication Token Secure against Replay and Weak Key Attacks. Information Processing Letters 62, 77–80 (1997)CrossRefMathSciNetGoogle Scholar
  8. 8.
    You, I., Cho, K.: A S/KEY Based Secure Authentication Protocol Using Public Key Cryptography. The KIPS Transactions: Part C 10-C(6) (February 2003)Google Scholar
  9. 9.
    You, I., Cho, K.: Comments on YEH-SHEN-HWANG’s One-Time Password Authentication Scheme. IEICE Transaction on Communication E88-B(2), 751–753 (2005)CrossRefGoogle Scholar
  10. 10.
    Denning, D., Sacco, G.: Timestamps in Key Distribution Systems. Communications of the ACM 24(8), 533–536 (1981)CrossRefGoogle Scholar
  11. 11.
    Kim, S., Kim, B., Park, S., Yen, S.: Comments on Password-Based Private Key Download Protocol of NDSS 1999. Electronics Letters 35(22), 1937–1938 (1999)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Ilsun You
    • 1
  • Eun-Sun Jung
    • 2
  1. 1.Department of Information ScienceKorean Bible UniversitySeoulSouth Korea
  2. 2.Communication LABSamsung Advanced Institute of TechnologyKyunggi-DoKorea

Personalised recommendations