Skip to main content

Verifier-Based Home Network Security Mechanism

  • Conference paper
Computational Science and Its Applications - ICCSA 2006 (ICCSA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3981))

Included in the following conference series:

  • 482 Accesses

Abstract

The home network is expected to experience significant growth over next few years, as wireless and ubiquitous networking becomes more common and accessible. However, the broadcast nature of this technology creates new security issues. To ensure the effective deployment in home environments, network security must reach a certain level which is reasonably acceptable to the research community. The security mechanism for home networks must not require heavy computations, since usually consist of low CPUs capable, limited memory and storage, and mobility concerns. This paper presents a secure authentication and session key establishment mechanism suitable for home networks. The proposed scheme is based on the Secure Remote Password (SRP) protocol. The performance evaluation demonstrates that our proposed mechanism is more secure than previous ones while maintaining the similar level of security overhead including processing time.

This research was supported by the Ministry of Information and Communication, Korea under the Information Technology Research Center support program supervised by the Institute of Information Technology Assessment, IITA-2005-(C1090-0501-0019).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Zhuge, J., Yao, R.: Security Mechanism for Wireless Home Network. In: Proc. of IEEE Global Telecommunications Conference 2003 (GLOBECOM 2003), vol. 3, pp. 1527–1531 (December 2003)

    Google Scholar 

  2. Wacker, A., et al.: A Key-Distribution Scheme for Wireless Home Automation Networks. In: Consumer Communication and Networking Conference (CCNC 2004), pp. 47–52. IEEE, Los Alamitos (2004)

    Google Scholar 

  3. Krishnamurthy, P., et al.: Security in Wireless Residential Networks. IEEE Transactions on Consumer Electronics 48, 157–166 (2002)

    Article  MathSciNet  Google Scholar 

  4. Nakakita, H., et al.: A Study on Secure Wireless Networks Consisting of Home Appliances. IEEE Transactions on Consumer Electronics 48, 375–381 (2003)

    Article  Google Scholar 

  5. Zhu, J., Ma, J.: A New Authentication Scheme with Anonymity for Wireless Environments. IEEE Transactions on Consumer Electronics 50, 231–235 (2003)

    Google Scholar 

  6. Ellison, C.M.: Home Network Security. Intel Technology Journal 6(4) (November 2002)

    Google Scholar 

  7. Taesombut, N., et al.: A Secure Registration Protocol for Multimedia Appliances in Wireless Home Networks. In: Proceedings of the IEEE Int. Conf. on Multimedia and Expo. (ICME 2003), vol. 3, pp. 6–9 (July 2003)

    Google Scholar 

  8. Taesombut, N., et al.: A Secure Multimedia System in Emerging Wireless Home Networks. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol. 2828, pp. 76–88. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  9. Wu, T.: The Secure Remote Password Protocol. In: Proceedings of the Internet Society Network and Distributed System Security Symposium, pp. 97–111 (March 1998)

    Google Scholar 

  10. Wu, T.: The SRP Authentication and Key Exchange System, IETF RFC 2945

    Google Scholar 

  11. National Institute of Standards and Technology (NIST), Announcing the Secure Hash Standard, FIPS 180-1, U.S. Department of Commerce (April 1995)

    Google Scholar 

  12. Dai, W.: Crypto++ Library 5.0, At http://www.eskimo.com/~weidai/cryptlib.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jeon, H., Chung, M.Y., Kim, J., Choo, H. (2006). Verifier-Based Home Network Security Mechanism. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3981. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751588_97

Download citation

  • DOI: https://doi.org/10.1007/11751588_97

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34072-0

  • Online ISBN: 978-3-540-34074-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics