Browse > Article

An User Authentication Mechanism in the OSGi Service Platform Environment  

전경석 (고려대학교 컴퓨터학과)
문창주 (고려대학교 컴퓨터학과)
박대하 (시큐리티테크놀로지스)
백두권 (고려대학교 컴퓨터학과)
Abstract
In the home gateway environment, several characteristics for the user authentication mechanism should be reflected separately from the existing distributed service environment. First, the platform of a home gateway is a component based system that its services are installed dynamically. Second, the convenience that user can use several services by authentication of once should be offered. Finally, the system resources of a home gateway are restricted. However, a user authentication mechanism that reflected these characteristics is not shown at the user admin service specification of the OSGi service platform.(OSGi is the representative standardization organization of hone gateway.) Also, there is no existing authentication protocol that satisfies these qualities at the same time. In this paper, we propose a new user authentication mechanism considering those characteristics for the home gateway environment. We also design and implement an independent authentication service bundle based on the OSGi service platform so that it can perform user authentication operations for each bundle service. We supplement and extend the Kerberos Protocol that can apply.
Keywords
OSGi(Open Service Gateway initiative); Single Sign-On;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Java Embedded Server 2.0, http://wwws.sun.com/software/embeddedserver/index.html
2 Ericsson's e-box system-An electronic services enabler, http://www.ericsson.com/about/publications/review/1999_01/files/1999015.pdf
3 128비트 블록 암호화알고리즘(SEED) 개발 및 분석 보고서, http://www.kisa.or.kr/technology/sub1/report.pdf
4 Java Cryptography Library, J/LOCK, http://www.stitec.com/product/ejlock.html
5 OSGi Service Platform Release 2 Specification, http://www.osgi.org/resources/docs/spr2book.pdf, October 2001
6 John Clark, Jeremy Jacob, 'A Survey of Authentication Protocol Literature: Version 1.0,' University of York, Department of Computer Science, November, 1997
7 Steven M. Bellovin and Michael Merritt, 'Limitations of the kerberos Authentication System,' Proceedings of the Winter 1991 USENIX Conference, Januuary 1991
8 B.Clifford Neuman and Theodore Ts'o, 'Kerberos : An Authentication Service for Computer network,' IEEE, Computer Magazine, 32:9:33-38, September 1994   DOI   ScienceOn
9 S. M. Bellovin and M. Merritt, 'Encrypted Key Exchange: Password based protocols secure against dictionary attacks,' Proceedings 1992 IEEE Symposium on Research in Security and Privacy, 72-84, IEEE Computer Society, May 1992   DOI
10 Marc Branchaud, 'A Survey of Public Key Infrastructures,' Department of Computer Science, McGill University, Montreal, 1997
11 전경석, 문창주, 박대하, 백두권, 'OSGi Service Framework 환경에서 사용자 인증 방법,' 정보과학회지, 제29권, 제1호, page 865-867, 2002
12 Mayank Upadhyay and Ram Marti, 'Single Sign-On Using Kerberos in Java,' http://java.sun.com/j2ec/1.4/docs/guide/security/jgss/single-signon.html
13 ISO/IEC. Information Technology - Security techniques - Entity Authentication Mechanisms part 2: Entity authentication using symmetic techniques, 1993
14 B. Clifford Neuman and Stuart G. Stubblebine, 'A Note on the Use of Timestamps on Nonces,' Operating System Review, 27(2):10-4, April 1993   DOI
15 CCITT Recommendation X.509,The Directory-Authentication Framework, December, 1988
16 Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein and Charles E. Youman, 'Role-Based Access Control Models,' IEEE Computer, volume 29, number 2, February19896, page 38-47   DOI   ScienceOn
17 Charlie Lai and Li Gong, 'User Authentication and Authorization in the Java Platform,' Computer Security Applications Conference, December 1999   DOI
18 김영갑, 문창주, 박대하, 백두권, 'OSGi 서비스 프레임워크 환경에서의 서비스 번들 인증 메커니즘,' 정보과학회지, 제29권, 제1호, page 868-870, 2002   과학기술학회마을
19 V. Samar and C. Lai, 'Making Login Services Independent from Authentication Technologies,' Proceedings of the SunSoft Developer's Conference, March 1996
20 Default Policy Implementation and Policy File Syntax, http://java.sun.com/products/jdk/1.2/docs/guide/security/PolicyFiles.html
21 Li Gong,'Variations on the Themes of Message Freshness and Replay or the Difficulty in Devising Formal Methods to Analyze Cryptographic Protocols,' the Computer Security Foundations Workshop VI, 1993   DOI
22 Fowler, M., UML distilled: Applying the standard object modeling language, Addison Wesley, May, 1997