Intelligent Home Network Authentication: S/Key-Based Home Device Authentication

  • Deok-Gyu Lee
  • Ilsun You
  • Sang-Choon Kim
  • Yun-kyung Lee
  • Jong-wook Han
  • Kyo-il Chung
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4743)

Abstract

The intelligent home network environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. As home network service is popularized, the interest in home network security is going up. Many people interested in home network security usually consider user authentication and authorization. But the consideration about home device authentication almost doesn’t exist. In this paper, we describes home device authentication which is the basic and essential element in the home network security. We proposed S/Key based authentication, scheme for secure remote access in smart home networks. And our device authentication concept can offer home network service users convenience and security.

Keywords

Smart Card Authentication Scheme Authentication Protocol Home Device Base Authentication Scheme 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Lee, J., et al.: A DRM Framework for Distributing Digital Contents through the Internet. ETRI Journal 25(6), 423–436 (2003)Google Scholar
  2. 2.
    Jeong, Y., Yoon, K., Ryou, J.: A Trusted Key Management Scheme for Digital Right Management. ETRI Journal 27(1), 114–117 (2005)Google Scholar
  3. 3.
    Gehrmann, C., Nyberg, K., Mitchell, C.J.: The personal CA-PKI for a personal area network. In: IST Mobile and Wireless Telecommunications, pp. 31–35 (summit 2002)Google Scholar
  4. 4.
    Intermediate specification of PKI for heterogeneous roaming and distributed terminals, IST-2000-25350-SHAMAN (March 2003)Google Scholar
  5. 5.
    Hwang, J.-b., Lee, H.-k., Han, J.-w.: Efficient and User Friendly Inter-domain Device Authentication/Access control in Home Networks. In: Sha, E., Han, S.-K., Xu, C.-Z., Kim, M.H., Yang, L.T., Xiao, B. (eds.) EUC 2006. LNCS, vol. 4096, Springer, Heidelberg (2006)Google Scholar
  6. 6.
    O’Gorman, L.: Comparing Passwords, Tokens, and Biometrics for User Authentication. Proceedings of the IEEE 91(12) (December 2003)Google Scholar
  7. 7.
    Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.D.: A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments. In: ICDCSW 2002, pp. 771–776 (2002)Google Scholar
  8. 8.
    Roman, M., Campbell, R.: GAIA: Enabling Active Spaces. 9th ACM SIGOPS European Workshop, Kolding, Denmark (September 17-20, 2000)Google Scholar
  9. 9.
    Lee, G.-H.: Information Security for Ubiquitous Computing Environment. In: Symposium on Information Security 2003, KOREA, pp. 629–651 (2003)Google Scholar
  10. 10.
    Lee, S.-Y., Jung, H.-S.: Ubiquitous Research Trend & Future Works. Wolrdwide IT 3(7), 1–12 (2002)Google Scholar
  11. 11.
    Lee, Y.-C.: Home Networks Technology & Market Trend. ITFIND Weeks Technology Trend(TIS-03-20) 1098, 22–33 (2003)Google Scholar
  12. 12.
    Lee, D.G., Kang, S.-I., Seo, D.-H., Lee, I.-Y.: Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification. In: Gavrilova, M., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganà, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3983, pp. 326–335. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  13. 13.
    Lee, Y.-k., Lee, D.-G., Han, J.-w., Chung, K.-i.: Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile. The international workshop on Application and Security Service in Web and pervAsive eNvironments (ASWAN 2007) (2007)Google Scholar
  14. 14.
    Sun, H.: Home Networking. Mitsubishi Electric Research Laboratories (2004), http://www.merl.com/projects/hmnt/
  15. 15.
    Haller, N.: The S/KEY One-time Password. RFC 1760 (1995)Google Scholar
  16. 16.
    Haller, N., Metz, C., Nesser, P., Straw, M.: A One-time Password System (1998)Google Scholar
  17. 17.
    You, I., Cho, K.: A S/KEY Based Secure Authentication Protocol Using Public Key Cryptography. The KIPS Transactions: Part C 10-C(6) (2003)Google Scholar
  18. 18.
    Mitchell, C.J., Chen, L.: Comments on the S/KEY User Authentication Scheme. ACM Operating Systems Review 30(4), 12–16 (1996)CrossRefGoogle Scholar
  19. 19.
    Yeh, T.C., Shen, H.Y., Hwang, J.J.: A Secure One-Time Password Authentication Scheme Using Smart Cards. IEICE Transaction on Communication E85-B(11), 2515–2518 (2002)Google Scholar
  20. 20.
    Lee, N.Y., Chen, J.C.: Improvement of One-Time Password Authentication Scheme Using Smart Cards. IEICE Transaction on Communication E88-B(9), 3765–3767 (2005)CrossRefGoogle Scholar
  21. 21.
    Yen, S.M., Liao, K.H.: Shared Authentication Token Secure against Replay and Weak Key Attacks. Information Processing Letters 62, 77–80 (1997)CrossRefMathSciNetGoogle Scholar
  22. 22.
    You, I., Cho, K.: Comments on YEH-SHEN-HWANG’s One-Time Password Authentication Scheme. IEICE Transaction on Communication E88-B(2), 751–753 (2005)CrossRefGoogle Scholar
  23. 23.
    Denning, D., Sacco, G.: Timestamps in Key Distribution Systems. Communications of the ACM 24(8), 533–536 (1981)CrossRefGoogle Scholar
  24. 24.
    Kim, S., Kim, B., Park, S., Yen, S.: Comments on Password-Based Private Key Download Protocol of NDSS 1999. Electronics Letters 35(22), 1937–1938 (1999)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Deok-Gyu Lee
    • 1
  • Ilsun You
    • 2
  • Sang-Choon Kim
    • 3
  • Yun-kyung Lee
    • 1
  • Jong-wook Han
    • 1
  • Kyo-il Chung
    • 1
  1. 1.Electronics and Telecommunications Research Institute, 161 Gajeong-dong, Yuseoung-gu, DaejeonKorea
  2. 2.Department of Infomation Science, Korean Bible University, 205 Sanggye-7 Dong, Nowon-ku, Seoul, 139-791South Korea
  3. 3.Information & Communication Engineering, Kangwon National University, 1 Joongang-ro, Samcheok, Gangwon-doSouth Korea

Personalised recommendations