70 likes | 215 Vues
Security Mechanism for Home Base Station in Wireless Residential Networks. Han Sang Kim Su Jin Kim. Security Categorization Mechanism. 1. [ Dev || Dc || SL || Alg | | MAC k ( Dev || D c || SL)]. Access Point. 2. [E k ( Dc || SL || Rn || TS)]. MP3 Player. 3.
E N D
Security Mechanism for Home Base Station in Wireless Residential Networks Han Sang Kim Su Jin Kim
Security Categorization Mechanism 1. [Dev || Dc || SL || Alg || MACk (Dev || Dc || SL)] Access Point 2. [Ek ( Dc || SL || Rn || TS)] MP3 Player 3. [Dev || Dest || Msg || h(Dest || Msg || Rn +1)] Dev: Device ID Dc: Device category SL: Security level Alg: Algorithm Rn: Nonce Dest: Destination address 4. [Msg || h(Msg || Rn || TS)] PDA
Advantages and Limitations • Advantages - security architecture for universal access point - dynamically working - simple to implement and maintain - security mechanism is upgradeable • Limitations - does not solve the simple denial of service - bottleneck at the access point - not appropriate for some devices
Our Hybrid Security Mechanism • Combine the security categorization mechanism with key distribution mechanism. • Key distribution mechanism: - Master key - Shared network key Access Point Key distribution Or Key update Encrypted by M1 M1 M2 Kn Appliance1 Appliance2 Mn: Master Key Kn: Shared Network Key Communication Encrypted by shared key kn
Our Hybrid Security Mechanism (cont.) 1. [ID1 || Dc || SL || Alg || MACmk1 (ID1 || Dc || SL)] Access Point 2. [Emk ( Dc || SL || Rn || TS)] Appliance1 3. [ID1 || Dest|| h(Dest || Rn +1)] 4. [Emk1 ( ID2|| SKey12 || TS)] [Emk2 ( ID1|| SKey12 || TS)] 5. [Eskey12 (ID12 || Msg)] Appliance2
What we have done so far and will do? • Implementation our hybrid mechanism by step 4 Yes • Reduction of bottleneck Yes • Containment police Yes • Communication between nodes with shared network key No • Algorithm-agile encryption/decryption No • Employing other devices No • Implementing our hybrid mechanism with a sensor No
References [1] H. Nakakita, K. Yamaguchi, M. Hashimoto, T. Saito, and M. Sakurai, “A Study on Secure Wireless Networks Consisting of Home Appliance”, IEEE Transactions on Consumer Electronics, Vol. 49 Issue 2 pp. 375-387, May 2003. [2] P. Krishnamurthy, J. Kabara, and T. Anusas-amornkul, “Security In Wireless Residential Networks”, IEEE Transactions on Consumer Electronics, Vol. 48 No. 1 pp. 157-166, February 2002. [3] Bruce Schneier, “Applied Cryptography”, John Wiley & Sons, 1996 [4] Andrew S. Tanenbaum, “Computer Networks”, Prentice Hall, 1996 [5] J.A. DiGirolamo, “Home networks – from toasters to HDTV”, Digest of Technical Paper in Intl. Conf. On Cons. Electronics, June, 1996. [6] R. Barry, “The future home network – one interactive and entertainment platform”, IEEE Seminar on HomeNet, June 1999. [7] http://www.bluetooth.com [8] C. Kaufman “Network Security: Prentice Hall, 1995 [9] http://security.ece.orst.edu [10] Suman Banerjee, Arunesh Mishra, “Location-based Secure Wireless Group Communication”, Mobile Computing and Communications Review, Volume 1, Number 2