Intelligent Home Network Authentication: Home Device Authentication Using Device Certification

@inproceedings{Lee2007IntelligentHN,
  title={Intelligent Home Network Authentication: Home Device Authentication Using Device Certification},
  author={Deok-Gyu Lee and Yun-kyung Lee and Jong Wook Han and Jong Hyuk Park and Imyeong Lee},
  booktitle={OTM Conferences},
  year={2007}
}
The intelligent home network environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. As home network service is popularized, the interest in home network security is going up. Many people interested in home network security usually consider user authentication and authorization. But the consideration about home device authentication almost doesn't exist. In this paper, we describes home device… 
3 Citations

Extended personal media networks (XPMN)

TLDR
This thesis enhances the Extensible Messaging and Presence Protocol to be the core of an Extended Private Media Network (XPMN) providing confidentiality, data integrity, and peer entity authentication between clients, keeping usability constrains for both the end-user and the developer in mind.

Security Research on the Interfaces of Information Appliances Described by XML

TLDR
This paper provides an effective solution to provide secure remote access in home network environment that uses XML to describe the information appliances interfaces, which can effectively settle interoperability and plug and play problem.

Smart Environment Authentication: Multi-domain Authentication, Authorization, Security Policy for Pervasive Network

TLDR
This paper proposes authentication in a smart environment security for guaranteeing reliability and availability including authentication, authorization and security policy system and describes smart environment authentication which is the basic and essential element in the pervasive network security.

References

SHOWING 1-10 OF 22 REFERENCES

Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile

TLDR
A home device authentication framework, home device registration, method of issuing certificates and a home device certificate profile are proposed that can offer convenience and security to users of a home network service.

Efficient and User Friendly Inter-domain Device Authentication/Access Control for Home Networks

TLDR
This paper proposes a device authentication and access control scheme based on two-layered PKI approach for efficient communication and user convenience and provides secure, efficient and user friendly multi-domain device authentication protocols.

Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification

TLDR
The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive and it is the smart environment that user provides context awareness that is wanting computing environment.

A flexible, privacy-preserving authentication framework for ubiquitous computing environments

TLDR
This work proposes an authentication framework that addresses this problem through the use of different wearable and embedded devices that authenticate entities with varied levels of confidence, in a transparent, convenient, and private manner, allowing the framework to blend nicely into ubiquitous computing environments.

The personal CA – PKI for a Personal Area Network

TLDR
The security requirements for a ‘personal CA’ to provide certificates within a PAN are analysed, and a novel protocol for secure public key registration and certification is described and discussed.

Comparing passwords, tokens, and biometrics for user authentication

TLDR
This paper examines passwords, security tokens, and biometrics-which they collectively call authenticators-and compares their effectiveness against several attacks and suitability for particular security specifications such as compromise detection and nonrepudiation.

A DRM Framework for Distributing Digital Contents through the Internet

TLDR
A contract system for distribution of royalties among participants in the contents distribution channel, a license mechanism for enforcement of contents usage to purchasers, and both a packaging mechanism and a secure client system for prevention of illegal draining of digital contents are designed.

Gaia: enabling active spaces

TLDR
The model provided by current computer systems is extended to allow interaction with physical spaces and their contained entities by means of a single abstraction called Active Space, and the users' view of the computational environment is finally extended beyond the physical limits of the computer.

The Stanford Digital Library metadata architecture

TLDR
The metadata required for a diverse set of Stanford Digital Library services is surveyed and categorize, and an extensible metadata architecture is proposed that fits into the established infrastructure and promotes interoperability among existing and de-facto metadata standards.

Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part I

TLDR
A new book enPDFd computational science and its applications iccsa 2006 international conference glasgow uk may 8 11 2006 proceedings part iii lecture notes in computer science to read.