Abstract
In this paper, we propose a security model that deal with the authentication and authorization problems for home networks. First, we examine existing researches for home network security and summarize their shortcomings, such as bottleneck, single point of failure, and inconvenience of configuration. Then, we introduce a new security model making up the previous works’ defects. In the proposed model, we classify the services into three groups based on their security sensitivity level, and provide different security mechanism to each security level service to make a difference among the protection levels of each service (i.e. to provide more secure mechanisms to more important services.) In addition to this, we distribute the computational cost for security function to each service device while centralize the policy configuration function to central device by using authority delegation scheme. Finally, we describe how the security and convenience are enforced by using our security model. Proposed security protocols in our model are based on the SPKI/SDSI (Simple Public Key Infrastructure / Simple Distributed Security Infrastructure.) and a lightweight protocol similar to SPKI.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Kaleshi, D., Barton, M.H.: Ensuring Interoperability in a Home Networking System: A Case Study. IEEE Trans. Consumer Electronics 45(4) (November 1999)
Eilley, E.S.: In-Home Digital Networks and Cordless Options. IEE Colloq. On ATM in professional and consumer applications (1997)
Krishnamurthy, P., Kabara, J., Anusas-amornkul, T.: Security in Wireless Residential Networks. IEEE Trans on Consumer Electronics 48(1) (February 2002)
Nakakita, H., Yamaguchi, K., Hashimoto, M., Saito, T., Sakurai, M.: A Study on Secure Wireless Networks Consisting of Home Appliances. IEEE Trans. Consumer Electronics 49(2) (May 2003)
Wacker, A., Heiber, T., Cermann, H.: A Key-Distribution Scheme for Wireless Home Automation Networks. IEEE Consumer Communications and Networking Conference (January 2004)
Ellison, C.: Interoperable Home Infrastructure – Home Network Security. Intel Technology Journal 06 (November 2002)
Ellison, C.: UPnP Security Ceremonies Version 1.0. UPnP Forum (2003)
Echonet Specification, http://www.echonet.gr.jp
Rahman, M., Bhattacharya, P.: Remote access and networked appliance control using biometrics features. IEEE Trans. Consumer Electronics 49(2) (May 2003)
Rose, B.: Home networks, a standards perspective. IEEE Communication Magazine (2001)
Teger, S., Waks, D.J.: End-user perspectives on home networking. IEEE Communication Magazine (2002)
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-Based Access Control. ACM Trans. Information and System Security (August 2001)
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate Theory. RFC 2693 (September 1999)
Jha, S., Reps, T.: Analysis of SPKI/SDSI Certificates Using Model Checking. In: IEEE Computer Security Foundations Workshop (June 2002)
Burrows, M., Abadi, M.: A Logic of Authentication. ACM trans. Computer Systems 8(1) (February 1990)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hwang, JB., Han, JW. (2006). A Security Model for Home Networks with Authority Delegation. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751632_39
Download citation
DOI: https://doi.org/10.1007/11751632_39
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34077-5
Online ISBN: 978-3-540-34078-2
eBook Packages: Computer ScienceComputer Science (R0)