A design of Key Exchange Protocol for User Centered Home Network

사용자 중심의 홈네트워크를 위한 키 교환 프로토콜 설계

  • 정민아 (전남대학교 전자통신기술연구소)
  • Published : 2004.06.01

Abstract

In this paper, we define that pervasive home network, which provides necessary services for user properties and removes distractions to improve the quality of human life. So, user can enjoy home network technology including devices and softwares at any place with no knowledge of networked home, devices, and softwares. In this home network, a mobile agent, called LAFA, can migrate to unfamiliar home network and control the necessary devices. For this environment, we design security management module for authenticating user and home server that access some other home networks, and for protecting text, multimedia data, and mobile agent that are transferred between home networks. The security management module is composed of a key exchange management module and an access control management module, for key exchange management module, we propose a key exchange protocol, which provides multimode of authentication mode and key exchange mode. One of these two modes is selected according to the data type.

본 논문에서는 편재형 컴퓨팅(pervasive computing)환경을 제공하는 홈네트워크으로서 보다 향상된 사용자 중심의 홈네트워크를 편재형 홈 네트워크라 정의한다. 이를 위해 사용자가 다른 홈네트워크의 장치를 사용하고자 할 경우 이를 직접 제어하고 설정할 필요가 없도록 이동에이전트 개념을 도입하였고, 이러한 홈네트워크 환경에서 이동 에이전트는 다른 홈네트워크로 이동하여 필요한 장치들을 제어할 수 있다. 또한, 이와 같이 제안한 홈네트워크 환경에서 사용자와 원격 흠 네트워크를 접근하는 상대방 홈 서버를 인증하고, 홈 네트워크 사이에 전송되는 텍스트 및 멀티미디어 데이터와 이동 에이전트를 보호하기 위하여 키 교환 프로토콜을 설계하였다. 키 교환 프로토콜은 데이터 종류에 따라 인증 및 데이터 암호화를 수행하기 위하여 본 논문에서 제안한 프로토콜과 IPSec을 선택적으로 사용하는 다중모드를 제공한다.

Keywords

References

  1. R. Gupta, S. Talwar, and D. Agrawal, 'Jini home networking: a step toward pervasive computing,' IEEE Computer, Vol. 35, Issue 8, pp. 34-40, Aug. 2002 https://doi.org/10.1109/MC.2002.1023786
  2. R. Lea, S. Gibbs, A. Dara-Abrams, and E. Eytchison, 'Networking home entertainment devices with HAVi,' IEEE Computer, Vol. 33, Issue 7, pp. 35-43, Sep. 2000 https://doi.org/10.1109/2.868695
  3. B. Miller, T. Nixon, C. Tai, and M. Wood, 'Home networking with Universal Plug and Play,' IEEE Communications magazine, Vol. 39, Issue 12, pp. 104-109, Dec. 2001 https://doi.org/10.1109/35.968819
  4. J. Yoo, D. Lee, 'Pervasive Home Network for User Centered environment,' Technical Report of KJIST, KJIST-DIC-TR-2002-OO1 2002
  5. L. Kagal, T. Finin, and A. Joshi, 'Trust-bas-ed security in pervasive computing environ-merits,' IEEE Computer, Vol. 34 Issue 12, pp. 154-157, Dec. 2001 https://doi.org/10.1109/2.970591
  6. F. Stajano and R. Anderson, 'The Resurrec-ting Duckling: security issues for ubiquitous computing,' IEEE Computer, Vol. 35 Issue 4, pp. 122-126, Apr. 2002 https://doi.org/10.1109/MC.2002.1106186
  7. S. Ungar, 'Home network security,' In Proc. IEEE 4th Int. Workshop on Networked Appliances, pp. 41-48, 2002
  8. D. Harkins, D. Carrel, 'The Internet Key Exchange,' RFC 2409, Nov. 1998
  9. H. X. Mel, D. Baker, Cryptography Decrypted, Addison-Wesley, 2001
  10. C. R. Davis, IPSec: Securing VPNs, McGraw-Hill, 2001
  11. H. Krawczyk, 'SKEME: a versatile secure key exchange mechanism for Internet,' IEEE Proc. of the Symposium on Network and Distributed System Security, 1996
  12. W. Stallings, Cryptography and Network Security, 2nd Edition, Prentice-Hall, 1999
  13. G. Caronni, H. Lubich, A. Aziz, T. mark-son, R. Skrenta, 'SKIP-Securing the Internet,' Proc. of the Fifth Workshop on Enabling Technologies, (WET ICE '96), IEEE Computer Society Press, 1996
  14. B. Schneier, Applied Cryptography Decrypted, Wiley, 1996
  15. A. Aziz, T. markson, H. Prafullchandra, 'Simple Key-management for Internet Protocols,' http://www.skip-vpn.org/spec/SKIP.html, Apr. 1997