1 / 7

Security Mechanism for Home Base Station in Wireless Residential Networks

Security Mechanism for Home Base Station in Wireless Residential Networks. Han Sang Kim Su Jin Kim. Security Categorization Mechanism. 1. [ Dev || Dc || SL || Alg | | MAC k ( Dev || D c || SL)]. Access Point. 2. [E k ( Dc || SL || Rn || TS)]. MP3 Player. 3.

annick
Télécharger la présentation

Security Mechanism for Home Base Station in Wireless Residential Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security Mechanism for Home Base Station in Wireless Residential Networks Han Sang Kim Su Jin Kim

  2. Security Categorization Mechanism 1. [Dev || Dc || SL || Alg || MACk (Dev || Dc || SL)] Access Point 2. [Ek ( Dc || SL || Rn || TS)] MP3 Player 3. [Dev || Dest || Msg || h(Dest || Msg || Rn +1)] Dev: Device ID Dc: Device category SL: Security level Alg: Algorithm Rn: Nonce Dest: Destination address 4. [Msg || h(Msg || Rn || TS)] PDA

  3. Advantages and Limitations • Advantages - security architecture for universal access point - dynamically working - simple to implement and maintain - security mechanism is upgradeable • Limitations - does not solve the simple denial of service - bottleneck at the access point - not appropriate for some devices

  4. Our Hybrid Security Mechanism • Combine the security categorization mechanism with key distribution mechanism. • Key distribution mechanism: - Master key - Shared network key Access Point Key distribution Or Key update Encrypted by M1 M1 M2 Kn Appliance1 Appliance2 Mn: Master Key Kn: Shared Network Key Communication Encrypted by shared key kn

  5. Our Hybrid Security Mechanism (cont.) 1. [ID1 || Dc || SL || Alg || MACmk1 (ID1 || Dc || SL)] Access Point 2. [Emk ( Dc || SL || Rn || TS)] Appliance1 3. [ID1 || Dest|| h(Dest || Rn +1)] 4. [Emk1 ( ID2|| SKey12 || TS)] [Emk2 ( ID1|| SKey12 || TS)] 5. [Eskey12 (ID12 || Msg)] Appliance2

  6. What we have done so far and will do? • Implementation our hybrid mechanism by step 4  Yes • Reduction of bottleneck  Yes • Containment police  Yes • Communication between nodes with shared network key  No • Algorithm-agile encryption/decryption  No • Employing other devices  No • Implementing our hybrid mechanism with a sensor  No

  7. References [1] H. Nakakita, K. Yamaguchi, M. Hashimoto, T. Saito, and M. Sakurai, “A Study on Secure Wireless Networks Consisting of Home Appliance”, IEEE Transactions on Consumer Electronics, Vol. 49 Issue 2 pp. 375-387, May 2003. [2] P. Krishnamurthy, J. Kabara, and T. Anusas-amornkul, “Security In Wireless Residential Networks”, IEEE Transactions on Consumer Electronics, Vol. 48 No. 1 pp. 157-166, February 2002. [3] Bruce Schneier, “Applied Cryptography”, John Wiley & Sons, 1996 [4] Andrew S. Tanenbaum, “Computer Networks”, Prentice Hall, 1996 [5] J.A. DiGirolamo, “Home networks – from toasters to HDTV”, Digest of Technical Paper in Intl. Conf. On Cons. Electronics, June, 1996. [6] R. Barry, “The future home network – one interactive and entertainment platform”, IEEE Seminar on HomeNet, June 1999. [7] http://www.bluetooth.com [8] C. Kaufman “Network Security: Prentice Hall, 1995 [9] http://security.ece.orst.edu [10] Suman Banerjee, Arunesh Mishra, “Location-based Secure Wireless Group Communication”, Mobile Computing and Communications Review, Volume 1, Number 2

More Related