Analysis and Extension of S/Key-Based Authentication Schemes for Digital Home Networks

  • Ilsun You
Part of the Lecture Notes in Control and Information Sciences book series (LNCIS, volume 344)


Recently, we have proposed two S/Key based authentication schemes for secure remote access in digital home networks. However, because they, like other S/Key based schemes, focus on only authentication, they don’t provide authorization, which is one of the important security services at home network. In this paper, we analyze and extend the schemes to support the authorization service. For this goal, we propose a Lightweight Attribute Certificate (LAC) and Lightweight Authorization Protocol (LAP). Through the LAC, LAP allows clients to be seamlessly authenticated and authorized regardless of their location. Especially, this protocol where the involved parties needs only lightweight cryptographic operations can reduce computational cost with single sign-on.


Smart Card Authentication Scheme Home Network User Authentication Scheme Cryptographic Operation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Sun, H.: Home Networking. Mitsubishi Electric Research Laboratories (2004) Scholar
  2. 2.
    Haller, N.: The S/KEY One-time Password. RFC 1760 (1995)Google Scholar
  3. 3.
    Haller, N., Metz, C., Nesser, P., Straw, M.: A One-time Password System. RFC 2289 (1998)Google Scholar
  4. 4.
    You, I., Cho, K.: A S/KEY Based Secure Authentication Protocol Using Public Key Cryptography. The KIPS Transactions: Part C, 10-C(6) (2003)Google Scholar
  5. 5.
    You, I., Jung, E.: A Light Weight Authentication Protocol for Digital Home Networks. ICCSA 2006, Springer-Verlag LNCS. 3938 (2006) 416–423Google Scholar
  6. 6.
    You, I.: One-Time Password Authentication Scheme for Secure Remote Access in Intelligent Home Networks. Accepted to KES 2006 (2006)Google Scholar
  7. 7.
    Mitchell, C. J., Chen, L.: Comments on the S/KEY User Authentication Scheme. ACM Operating Systems Review, 30(4) (1996) 12–16CrossRefGoogle Scholar
  8. 8.
    Yeh, T. C., Shen, H. Y., Hwang, J. J.: A Secure One-Time Password Authentication Scheme Using Smart Cards. IEICE Transaction on Communication, E85-B(11) (2002) 2515–2518Google Scholar
  9. 9.
    Lee, N. Y., Chen, J. C.: Improvement of One-Time Password Authentication Scheme Using Smart Cards. IEICE Transaction on Communication, E88-B(9) (2005) 3765–3767CrossRefGoogle Scholar
  10. 10.
    Yen, S. M., Liao, K. H.: Shared Authentication Token Secure against Replay and Weak Key Attacks. Information Processing Letters, 62 (1997) 77–80MathSciNetCrossRefGoogle Scholar
  11. 11.
    You I., Cho, K.: Comments on YEH-SHEN-HWANG’s One-Time Password Authentication Scheme. IEICE Transaction on Communication, E88-B(2) (2005) 751–753CrossRefGoogle Scholar
  12. 12.
    Denning, D., Sacco, G.: Timestamps in Key Distribution Systems. Communications of the ACM, 24(8) (1981) 533–536CrossRefGoogle Scholar
  13. 13.
    Kim, S., Kim, B., Park, S., Yen, S.: Comments on Password-Based Private Key Download Protocol of NDSS’99. Electronics Letters, 35(22) (1999) 1937–1938CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Ilsun You
    • 1
  1. 1.Department of Information ScienceKorean Bible UniversitySeoulSouth Korea

Personalised recommendations