DOI QR코드

DOI QR Code

Ticket-Based Authentication Protocol Using Attribute Information over Home Network

홈네트워크 상에서 속성정보를 이용한 티켓기반의 인증 프로토콜

  • Received : 2011.09.08
  • Accepted : 2011.11.02
  • Published : 2012.02.28

Abstract

Recently, LEE et al. proposed an attribute-based authenticated key agreement protocol over home network, which aimed to support authentication and key agreement between user and home server. However, if the home server is attacked in the protocol, the effects are influenced to the overall home network components severly. Thereby, this paper proposes a new ticket-based authentication protocol using user attributes between user and home devices to solve the problem. The proposed protocol supports the various levels of security to user by diversifying the network accessibility depending on user attribute. Thereby, the protocol could support more secure home network services.

Keywords

References

  1. 오연주, 범민준, 김동희, 백희현, "사설IP기반 홈네트워크에서 세션이동성 지원의 적응적인 SIP응용서버 시스템 구조설계," 대한임베디드공학회논문지, Vol. 1, No. 2, pp.73-81, 2006.
  2. D. G. Lee, J. W. Han, J. H. Park, "User Authentication for Multi Domain in Home Network Environments," Proceedings on 2007 International Conference on Multimedia and Ubiquitous Engineering(MUE'07), pp.89-96, 2007.
  3. G. W. Kim, D. G. Lee, J. W. Han, S. C. Kim, S. W. Kim, "Secueity Framework for Home Network:Authentication, Authorization, and Security Policy," Lecture Notes in Artificial Intelligent, Vol. 4819, pp. 621-628, 2007.
  4. 서화정, 김호원, "속성기반 재 암호화를 이용한 스마트카드 인증권한 분배스킴," 대한임베디드공학회논문지, Vol. 5, No. 3, pp.168-174, 2010.
  5. ITU-T, http://www.itu.int/ITU-T
  6. 이덕규, 김도우, 한종욱, "홈네트워크 보안 기술 및 표준화 동향," ETRI 전자통신동향 분석, Vol. 23, No. 4, pp.89-101, 2008.
  7. P. Funk, "The EAP MD5-Tunneled Authentication Protocol," draft-funk-eap-md5-tunneled- 01, 2004.
  8. "홈서버 중심의 홈네트워크 사용자 인증 메커니즘," TTAS.KO-12.0030.
  9. 이원진, 전일수, "홈네트워크 상에서 속성기반의 인증된 키교환 프로토콜," 한국정보보호학회논문지, Vol. 18, No. 5, pp.49-57, 2008.
  10. L. Lamport, "Password authentication with insecure communication," Communication of ACM, Vol. 24, No. 11, pp.24-30, 1981. https://doi.org/10.1145/358527.358543
  11. A. Kehne, J. Schonwalder, H. Langenorfer, "A nonce-based protocol for multiple authentication," ACM Operating Systems Review, Vol. 26, No. 4, pp.84-89, 1992. https://doi.org/10.1145/142854.142872
  12. K. Mangipudi, R. Katti, "A Secure identification and key agreement protocol with user Anonymity(SIKA)," Computers and Security Vol. 25, pp. 420-425, 2006. https://doi.org/10.1016/j.cose.2006.05.002
  13. A. Sahai, B. Waters, "Fuzzy identity based encryption," In Eurocypt 2005, pp. 457-473, 2005.
  14. M. Pirretti, P. Traynor, P. McDaniel, B. Waters, "Secure attribute-based systems," Proceedings on ACM Conference on Computer and Communications Security (CCS'06), pp.99-112, 2006.