Browse > Article
http://dx.doi.org/10.13089/JKIISC.2009.19.5.105

Main/Sub Device Authentication and Authorization Protocol in Ubiquitous Office Network  

Moon, Jong-Sik (Division of Computer Science and Engineering, Soonchunhyang University)
Lee, Im-Yeong (Division of Computer Science and Engineering, Soonchunhyang University)
Abstract
In modern society, as the rapid development of IT technology combined with the computer-based high-speed communication networks makes it possible to provide a wide spectrum of services and devices, we have been confronting a new cultural transformation era, referred to as the information society. However, the requirements to be considered in security aspect have became more complicated and diversified, and there remains the same security weaknesses as in the existing media or protocol. Particularly, the office network device with roaming is susceptible to the different kinds of attacks such as terminal hacking, virus attacks, and information leakage because the computing capacity is relatively low and the loading of already developed security functions is difficult. Although developed as one solution to this problems, PKI security authentication technology isn't suitable for multi-domain environments providing uonments proffice network service, and so the development of a novel authentication system is needed. Therefore, in this paper researched the roaming and device authentication/auth for multitechnology using an ID-based public key, authorization ticket, and Sub-device ticket with a purpose to contribute to the development of the secured and efficient technology.
Keywords
Authentication; Authorization; Device; Office Network;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 홈네트워크에 적용 가능한 홈 디바이스 인증서 프로파일,' TTAS.KO-12.0052, 2007년 12월
2 이원진, 전일수, '홈네트워크 상에서 속성기반의 인증된 키교환 프로토콜,' 정보보호학회논문지, 18(5), pp. 49-57, 2008년 10월
3 P.S.L.M. Barreto, B. Libert, N. McCullagh, and J.J. Quisquater, 'Efficient and Provably-Secure ldentity-Based Signatures and Signcryption from Bilinear Maps,' ASIACRYPrr 2005, LNCS 3788, pp. 515-532, 2005
4 J.B. Hwang and J.W. Han, 'A Security Model for Home Networks with Authority Delegation,' lCCSA 2006, LNCS 3983, pp. 360-369, 2006
5 Y.K. Lee, D.G. Lee, and J.W. Han, 'Home Device Authentication Method based on PKI,' Proceedings of the Future Generation Communication and Networking (FGCN 2007), vol. 2, pp. 7-11, 2007   DOI
6 J.B. Hwang, H.K. Lee, and J.W. Han, 'Efficient and User Friendly lnterDomain Device Authentication/Access Control for Home Networks,' EUC 2006, LNCS 4096, pp. 131-140, 2006
7 지진웅, 김지홍, 김창규, '권한인증서를 이용한 도메인간의 사용자 인중방안,' 정보보호학회논문지, 18(6A), pp. 75-83, 2008년 12월
8 홍승필, 이철수, '유비쿼터스 컴퓨팅 환경내 개인정보보호 프레임워크 적용 방안,' 정보보호학회논문지, 16(3). pp. 157-164, 2006년 6월
9 이선영, 임강빈, 배광진, 정태영, 한종욱, '다바이스 인증 및 인가에 기반한 유비쿼터스 홈네트워크 프라이버시 대책,' 정보보호학회논문지, 18(5), pp. 125-131, 2008년 10월
10 T. Goriparthi, M.L. Das, and A. Saxena, 'An improved bilinear pairing based remote user authentication scheme,' Computer Standards & Interfaces, vol. 31, no. 1, pp. 181-185, Jan. 2009   DOI   ScienceOn
11 A. Sharnir, 'ldentity-based crypto systems and signature schemes,' CRYPTO '84, LNCS 196, pp. 47-53, 1985
12 김도우, 한종욱, 정교일, '홈디바이스 인증/인가 기술 동향,' 주간기술동향, 통권 1329호. pp. 1-11, 2008년 1월
13 김재곤, 김구수, 엄영익, '홈 네트워크 환경에서 다중 도메인을 지원하는 공유키 및 공개키 기반의 이동 에이전트 인증 기법,' 정보보호학회논문지, 14(5), pp. 109-119, 2004년 10월
14 D.G. Lee, I.S. You, S.C. Kim, Y.K. Lee, J.W. Han, and K.I. Chung, 'Intelligent Home Network Authentication SKeyBased Home Device Authentication,' lSPA 2007 Workshops, LNCS 4743, pp. 214-223, 2007
15 이윤경, 한종욱, 정교일, '홈네트워크 보안 표준화 동향,' 전자통신동향분석, 22(1), pp. 73-82, 2007년 2월