Browse > Article

A design of Key Exchange Protocol for User Centered Home Network  

정민아 (전남대학교 전자통신기술연구소)
Abstract
In this paper, we define that pervasive home network, which provides necessary services for user properties and removes distractions to improve the quality of human life. So, user can enjoy home network technology including devices and softwares at any place with no knowledge of networked home, devices, and softwares. In this home network, a mobile agent, called LAFA, can migrate to unfamiliar home network and control the necessary devices. For this environment, we design security management module for authenticating user and home server that access some other home networks, and for protecting text, multimedia data, and mobile agent that are transferred between home networks. The security management module is composed of a key exchange management module and an access control management module, for key exchange management module, we propose a key exchange protocol, which provides multimode of authentication mode and key exchange mode. One of these two modes is selected according to the data type.
Keywords
IPSec;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. Kagal, T. Finin, and A. Joshi, 'Trust-bas-ed security in pervasive computing environ-merits,' IEEE Computer, Vol. 34 Issue 12, pp. 154-157, Dec. 2001   DOI   ScienceOn
2 C. R. Davis, IPSec: Securing VPNs, McGraw-Hill, 2001
3 B. Miller, T. Nixon, C. Tai, and M. Wood, 'Home networking with Universal Plug and Play,' IEEE Communications magazine, Vol. 39, Issue 12, pp. 104-109, Dec. 2001   DOI   ScienceOn
4 D. Harkins, D. Carrel, 'The Internet Key Exchange,' RFC 2409, Nov. 1998
5 R. Lea, S. Gibbs, A. Dara-Abrams, and E. Eytchison, 'Networking home entertainment devices with HAVi,' IEEE Computer, Vol. 33, Issue 7, pp. 35-43, Sep. 2000   DOI   ScienceOn
6 R. Gupta, S. Talwar, and D. Agrawal, 'Jini home networking: a step toward pervasive computing,' IEEE Computer, Vol. 35, Issue 8, pp. 34-40, Aug. 2002   DOI   ScienceOn
7 H. Krawczyk, 'SKEME: a versatile secure key exchange mechanism for Internet,' IEEE Proc. of the Symposium on Network and Distributed System Security, 1996
8 W. Stallings, Cryptography and Network Security, 2nd Edition, Prentice-Hall, 1999
9 G. Caronni, H. Lubich, A. Aziz, T. mark-son, R. Skrenta, 'SKIP-Securing the Internet,' Proc. of the Fifth Workshop on Enabling Technologies, (WET ICE '96), IEEE Computer Society Press, 1996
10 H. X. Mel, D. Baker, Cryptography Decrypted, Addison-Wesley, 2001
11 A. Aziz, T. markson, H. Prafullchandra, 'Simple Key-management for Internet Protocols,' http://www.skip-vpn.org/spec/SKIP.html, Apr. 1997
12 F. Stajano and R. Anderson, 'The Resurrec-ting Duckling: security issues for ubiquitous computing,' IEEE Computer, Vol. 35 Issue 4, pp. 122-126, Apr. 2002   DOI
13 B. Schneier, Applied Cryptography Decrypted, Wiley, 1996
14 S. Ungar, 'Home network security,' In Proc. IEEE 4th Int. Workshop on Networked Appliances, pp. 41-48, 2002
15 J. Yoo, D. Lee, 'Pervasive Home Network for User Centered environment,' Technical Report of KJIST, KJIST-DIC-TR-2002-OO1 2002