ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper A Security Model for Home Networks with Authority Delegation
Cited 6 time in scopus Download 0 time Share share facebook twitter linkedin kakaostory
Authors
Jin Bum Hwang, Jong Wook Han
Issue Date
2006-05
Citation
International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3983), v.3983, pp.360-369
Language
English
Type
Conference Paper
DOI
https://dx.doi.org/10.1007/11751632_39
Project Code
06MK2600, The Development of SecurityTechnology based on Device Authentication for Ubiquitous Home Network, Han Jong-Wook
Abstract
In this paper, we propose a security model that deal with the authentication and authorization problems for home networks. First, we examine existing researches for home network security and summarize their shortcomings, such as bottleneck, single point of failure, and inconvenience of configuration. Then, we introduce a new security model making up the previous works' defects. In the proposed model, we classify the services into three groups based on their security sensitivity level, and provide different security mechanism to each security level service to make a difference among the protection levels of each service (i.e. to provide more secure mechanisms to more important services.) In addition to this, we distribute the computational cost for security function to each service device while centralize the policy configuration function to central device by using authority delegation scheme. Finally, we describe how the security and convenience are enforced by using our security model. Proposed security protocols in our model are based on the SPKI/SDSI (Simple Public Key Infrastructure / Simple Distributed Security Infrastructure.) and a lightweight protocol similar to SPKI. © Springer-Verlag Berlin Heidelberg 2006.
KSP Keywords
Distributed Security, Home Network Security, Proposed model, Public Key Infrastructure, Security function, Security level, Security model, Single Point of Failure, authentication and authorization, computational cost, lightweight protocol