Secure User Authentication Mechanism in Digital Home Network Environments

  • Jongpil Jeong
  • Min Young Chung
  • Hyunseung Choo
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4096)


The home network is a new IT technology environment for making an offer of convenient, safe, pleasant, and blessed lives to people, making it possible to be provided with various home network services by constructing home network infrastructure regardless of devices, time, and places. This can be done by connecting home devices based on wire and wireless communication networks, such as mobile communication, Internet, and sensor network. However, there are many risks involved, for example user privacy violations and service interference. Therefore, security service is required to block these risk elements, and user authentication is an essential component for secure home network service. It enables non-authorized persons not to use home network. In this paper, an authentication protocol for secure communications is proposed for secure home network environments. The proposed authentication protocol is designed to accept existing home networks based on public key infrastructure (PKI) and Authentication, Authorization, and Accounting (AAA), which both use Kerberos.


Authentication Protocol Mutual Authentication Trusted Third Party Home Network Message Authentication Code 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Choi, K., et al.: Trends of Home Networking Standardization in Korea. KETI Journal (2003)Google Scholar
  2. 2.
    Park, Y., et al.: Home Station Architecture based on Digital Convergence toward U-Home age. ETRI Journal (2003)Google Scholar
  3. 3.
    OSGi Service Platform, Release 4 Specification (October 2005),
  4. 4.
    Lim, S., et al.: Home Network Protocol Architecture for Ubiquitous Communication. Journal of KIPS 10 (2003)Google Scholar
  5. 5.
    Clifford Neuman, B., Stubblebie, S.G.: A Note on the Use of Timestamps as Nonces Operating Systems Review (1993)Google Scholar
  6. 6.
    Clifford Neuman, B., Is’o, T.: Kerberos: An Authentication Service for computer Network. Computer Magazine (September 1994)Google Scholar
  7. 7.
    OSGi: RFC 18 - Security Architecture. Specification, Draft (2001)Google Scholar
  8. 8.
    Jeon, K., et al.: User Authentication Mechanism in OSGi Service Framework Enviroments. Journal of KISS 9 (2003)Google Scholar
  9. 9.
    CCITT Recommendation X.509. The Directory Authentication Framework, CCITT (December 1998)Google Scholar
  10. 10.
    IEEE P802.11i/D9.0 Medium Access Control(MAC) Security (2004)Google Scholar
  11. 11.
    Gu, J., et al.: Security Clustering: A Network-wide Secure Computing Mechanism in Pervasive Computing. In: Mitrou, N.M., Kontovasilis, K., Rouskas, G.N., Iliadis, I., Merakos, L. (eds.) NETWORKING 2004. LNCS, vol. 3042, pp. 1326–1331. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  12. 12.
    Jo, H., Youn, H.: A Secure User Authentication Protocol Based on One-Time-Password for Home Network. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3480, p. 519. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  13. 13.
    MIT Media Lab: Things That Think Consortium,
  14. 14.
    Microsoft Research: Easy Living,
  15. 15.
    Chen, Y., Yeh, L.: An Efficient Authentication and Access Control Scheme Using Smart Cards. In: Parallel and Distributed Systems, Proceedings. 11th International Conference (ICPADS 2005), vol. 2(20-22), pp. 78–82 (July 2005)Google Scholar
  16. 16.
    Aboba, B., et al.: Extensible Authentication Protocol (EAP), RFC 3748 (June 2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Jongpil Jeong
    • 1
  • Min Young Chung
    • 1
  • Hyunseung Choo
    • 1
  1. 1.Intelligent HCI Convergence Research CenterSungkyunkwan UniversitySuwonKorea

Personalised recommendations