Abstract
This paper describes the key management method which allows secure communication channels between devices in home networks. Home network technologies have developed to enable various kinds of home devices to access the digital information between the devices. Without security framework, however, the digital information including a user’s private data may be exposed to a malicious attacker. Although conventional public key cryptosystems generally provide security features such as confidentiality and integrity, the distribution of the keys is vulnerable to man-in-the-middle attack without a trusted third party. In general home networks are dynamically set up without relying on any pre-existing infrastructure or central administration. Therefore, we must implement key distribution schemes without the assumption of a trusted third party. In this paper, we present self-authorized public key management for home networks. Our idea is to bind the device owner’s authorization information to the public key of a device. Our protocol enables the distribution of the authenticated public key using an identity-based encryption scheme. We also provide heuristic analysis of various security properties.
Chapter PDF
Similar content being viewed by others
References
DLNA: DLNA Overview and Vision (2006), http://www.dlna.org/en/industry/about/dlna_white_paper_2006.pdf
HAVi: HAVi, the A/V digital network revolution (1999), http://www.havi.org/pdf/white.pdf
Marples, D., Kriens, P.: The Open Services Gateway Initiative: An Introductory Overview. IEEE Communications Magazine, 110–114 (2001)
Miller, B.A., Nixon, T., Tai, C., Wood, M.D.: Home Networking with Universal Plug and Play. IEEE Communications Magazine, 104–109 (2001)
Dierks, T., Allen, C.: The TLS Protocol ver. 1.0. RFC 2246 (January 1999), http://www.ietf.org/rfc/rfc2246.txt
Tsang, P.: APEC TEL wireless (802.11) security, workshop: Nextsteps. In: APEC TEL Conference (2004)
Shamir, A.: Identity-based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Boneh, D., Franklin, M.: Identity-based Encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Gorantla, M.C., Gangishetti, R., Saxena, A.: A survey on id-based cryptographic primitives. Cryptology ePrint Archive, Report 2005/094 (2005), http://eprint.iacr.org/
Dutta, R., Barua, R., Sarkar, P.: Pairing-based cryptographic protocols: A survey. Cryptology ePrint Archive, Report 2004/064 (2004), http://eprint.iacr.org/
Jablon, D.P.: Strong Password-Only Authenticated Key Exchange. In: ICM SIGCOMM Computer Communication Review, vol. 26, ACM Press, New York (1996)
Ellison, C.M.: Home Network Security. Intel Technology Journal 6 (November 2002), http://developer.intel.com/technology/itj/index.htm
Moyer, S., Marples, D., Tsang, S.: A Protocol for Wide-Area Secure Networked Appliance Communication. IEEE Communications Magazine 6, 52–59 (2002)
Karygiannis, T., Owens, L.: Draft: Wireless Network Security - 802.11, Bluetooth and Hondheld Devices. USA. National InstiNle of Standards and Tcchnalagy (2002)
Gehrmann, C., Mitchell, C.J., Nyberg, K.: Manual authentication for wireless devices. RSA Cryptobytes 7(1), 29–37 (2004)
Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 309–326. Springer, Heidelberg (2005)
Hoepman, J.-H.: Ephemeral paring on anonymous networks. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 101–116. Springer, Heidelberg (2005)
Rivest, R.L., Shamir, A., Adleman, L.M.: A Method for Obtaining Digital Signatures and Public-key Cryptosystem. Communications of the ACM 21, 120–126 (1978)
Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory IT-22, 644–654 (1976)
Housley, R., Ford, W., Polk, W., Solo, D.: Internet X.509 Public Key Infrastructure Certificate and CRL Profile. Internet Standard. RFC 2459, The Internet Society (1999)
Bellare, M., Rogaway, P.: Random Oracles are Practical: a Paradigm for Designing Efficient Protocols. In: Proceedings of ACM CCS 1993 (1993)
Canetti, R., Goldreich, O., Halevi, S.: The Random Oracle Methodology, Revisited. In: Proceedings of Symposium on the Theory of Computing, ACM, New York (1998)
Kim, Y., Perrig, A., Tsudik, G.: Simple and fault-tolerant key agreement for dynamic collaborative groups. In: Proceedings of ACM CCS 2000 (November 2000)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, H., Oh, S.J. (2007). Self-authorized Public Key Management for Home Networks. In: Denko, M.K., et al. Emerging Directions in Embedded and Ubiquitous Computing. EUC 2007. Lecture Notes in Computer Science, vol 4809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77090-9_38
Download citation
DOI: https://doi.org/10.1007/978-3-540-77090-9_38
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77089-3
Online ISBN: 978-3-540-77090-9
eBook Packages: Computer ScienceComputer Science (R0)