Skip to main content

A Security Model for Home Networks with Authority Delegation

  • Conference paper
Computational Science and Its Applications - ICCSA 2006 (ICCSA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3983))

Included in the following conference series:

Abstract

In this paper, we propose a security model that deal with the authentication and authorization problems for home networks. First, we examine existing researches for home network security and summarize their shortcomings, such as bottleneck, single point of failure, and inconvenience of configuration. Then, we introduce a new security model making up the previous works’ defects. In the proposed model, we classify the services into three groups based on their security sensitivity level, and provide different security mechanism to each security level service to make a difference among the protection levels of each service (i.e. to provide more secure mechanisms to more important services.) In addition to this, we distribute the computational cost for security function to each service device while centralize the policy configuration function to central device by using authority delegation scheme. Finally, we describe how the security and convenience are enforced by using our security model. Proposed security protocols in our model are based on the SPKI/SDSI (Simple Public Key Infrastructure / Simple Distributed Security Infrastructure.) and a lightweight protocol similar to SPKI.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kaleshi, D., Barton, M.H.: Ensuring Interoperability in a Home Networking System: A Case Study. IEEE Trans. Consumer Electronics 45(4) (November 1999)

    Google Scholar 

  2. Eilley, E.S.: In-Home Digital Networks and Cordless Options. IEE Colloq. On ATM in professional and consumer applications (1997)

    Google Scholar 

  3. Krishnamurthy, P., Kabara, J., Anusas-amornkul, T.: Security in Wireless Residential Networks. IEEE Trans on Consumer Electronics 48(1) (February 2002)

    Google Scholar 

  4. Nakakita, H., Yamaguchi, K., Hashimoto, M., Saito, T., Sakurai, M.: A Study on Secure Wireless Networks Consisting of Home Appliances. IEEE Trans. Consumer Electronics 49(2) (May 2003)

    Google Scholar 

  5. Wacker, A., Heiber, T., Cermann, H.: A Key-Distribution Scheme for Wireless Home Automation Networks. IEEE Consumer Communications and Networking Conference (January 2004)

    Google Scholar 

  6. Ellison, C.: Interoperable Home Infrastructure – Home Network Security. Intel Technology Journal 06 (November 2002)

    Google Scholar 

  7. Ellison, C.: UPnP Security Ceremonies Version 1.0. UPnP Forum (2003)

    Google Scholar 

  8. Echonet Specification, http://www.echonet.gr.jp

  9. Rahman, M., Bhattacharya, P.: Remote access and networked appliance control using biometrics features. IEEE Trans. Consumer Electronics 49(2) (May 2003)

    Google Scholar 

  10. Rose, B.: Home networks, a standards perspective. IEEE Communication Magazine (2001)

    Google Scholar 

  11. Teger, S., Waks, D.J.: End-user perspectives on home networking. IEEE Communication Magazine (2002)

    Google Scholar 

  12. Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-Based Access Control. ACM Trans. Information and System Security (August 2001)

    Google Scholar 

  13. Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate Theory. RFC 2693 (September 1999)

    Google Scholar 

  14. Jha, S., Reps, T.: Analysis of SPKI/SDSI Certificates Using Model Checking. In: IEEE Computer Security Foundations Workshop (June 2002)

    Google Scholar 

  15. Burrows, M., Abadi, M.: A Logic of Authentication. ACM trans. Computer Systems 8(1) (February 1990)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hwang, JB., Han, JW. (2006). A Security Model for Home Networks with Authority Delegation. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751632_39

Download citation

  • DOI: https://doi.org/10.1007/11751632_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34077-5

  • Online ISBN: 978-3-540-34078-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics