Advertisement

A Security Model for Home Networks with Authority Delegation

  • Jin-Bum Hwang
  • Jong-Wook Han
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3983)

Abstract

In this paper, we propose a security model that deal with the authentication and authorization problems for home networks. First, we examine existing researches for home network security and summarize their shortcomings, such as bottleneck, single point of failure, and inconvenience of configuration. Then, we introduce a new security model making up the previous works’ defects. In the proposed model, we classify the services into three groups based on their security sensitivity level, and provide different security mechanism to each security level service to make a difference among the protection levels of each service (i.e. to provide more secure mechanisms to more important services.) In addition to this, we distribute the computational cost for security function to each service device while centralize the policy configuration function to central device by using authority delegation scheme. Finally, we describe how the security and convenience are enforced by using our security model. Proposed security protocols in our model are based on the SPKI/SDSI (Simple Public Key Infrastructure / Simple Distributed Security Infrastructure.) and a lightweight protocol similar to SPKI.

Keywords

Access Control Security Policy Request Message Security Model Client Request 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Kaleshi, D., Barton, M.H.: Ensuring Interoperability in a Home Networking System: A Case Study. IEEE Trans. Consumer Electronics 45(4) (November 1999)Google Scholar
  2. 2.
    Eilley, E.S.: In-Home Digital Networks and Cordless Options. IEE Colloq. On ATM in professional and consumer applications (1997)Google Scholar
  3. 3.
    Krishnamurthy, P., Kabara, J., Anusas-amornkul, T.: Security in Wireless Residential Networks. IEEE Trans on Consumer Electronics 48(1) (February 2002)Google Scholar
  4. 4.
    Nakakita, H., Yamaguchi, K., Hashimoto, M., Saito, T., Sakurai, M.: A Study on Secure Wireless Networks Consisting of Home Appliances. IEEE Trans. Consumer Electronics 49(2) (May 2003)Google Scholar
  5. 5.
    Wacker, A., Heiber, T., Cermann, H.: A Key-Distribution Scheme for Wireless Home Automation Networks. IEEE Consumer Communications and Networking Conference (January 2004)Google Scholar
  6. 6.
    Ellison, C.: Interoperable Home Infrastructure – Home Network Security. Intel Technology Journal 06 (November 2002)Google Scholar
  7. 7.
    Ellison, C.: UPnP Security Ceremonies Version 1.0. UPnP Forum (2003)Google Scholar
  8. 8.
    Echonet Specification, http://www.echonet.gr.jp
  9. 9.
    Rahman, M., Bhattacharya, P.: Remote access and networked appliance control using biometrics features. IEEE Trans. Consumer Electronics 49(2) (May 2003)Google Scholar
  10. 10.
    Rose, B.: Home networks, a standards perspective. IEEE Communication Magazine (2001)Google Scholar
  11. 11.
    Teger, S., Waks, D.J.: End-user perspectives on home networking. IEEE Communication Magazine (2002)Google Scholar
  12. 12.
    Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-Based Access Control. ACM Trans. Information and System Security (August 2001)Google Scholar
  13. 13.
    Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate Theory. RFC 2693 (September 1999)Google Scholar
  14. 14.
    Jha, S., Reps, T.: Analysis of SPKI/SDSI Certificates Using Model Checking. In: IEEE Computer Security Foundations Workshop (June 2002)Google Scholar
  15. 15.
    Burrows, M., Abadi, M.: A Logic of Authentication. ACM trans. Computer Systems 8(1) (February 1990)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Jin-Bum Hwang
    • 1
  • Jong-Wook Han
    • 1
  1. 1.Electronics and Telecommunications Research Institute, KoreaUniversity of Science & Technology, KoreaYuseong-guKorea

Personalised recommendations