Self-authorized Public Key Management for Home Networks
نویسندگان
چکیده
This paper describes the key management method which allows secure communication channels between devices in home networks. Home network technologies have developed to enable various kinds of home devices to access the digital information between the devices. Without security framework, however, the digital information including a user’s private data may be exposed to a malicious attacker. Although conventional public key cryptosystems generally provide security features such as confidentiality and integrity, the distribution of the keys is vulnerable to man-in-the-middle attack without a trusted third party. In general home networks are dynamically set up without relying on any pre-existing infrastructure or central administration. Therefore, we must implement key distribution schemes without the assumption of a trusted third party. In this paper, we present self-authorized public key management for home networks. Our idea is to bind the device owner’s authorization information to the public key of a device. Our protocol enables the distribution of the authenticated public key using an identity-based encryption scheme. We also provide heuristic analysis of various security properties.
منابع مشابه
Secure User Authentication Mechanism in Digital Home Network Environments
The home network is a new IT technology environment for making an offer of convenient, safe, pleasant, and blessed lives to people, making it possible to be provided with various home network services by constructing home network infrastructure regardless of devices, time, and places. This can be done by connecting home devices based on wire and wireless communication networks, such as mobile c...
متن کاملKey Management and Security Planning in Wireless
Wireless Sensor Network is a class of wireless ad hoc networks. Self organization is an important phase of a wireless sensor network. After deployment, sensors nodes are required to self organize themselves to form a network of their own. Security is an important aspect while forming the network. Only the authorized nodes should be allowed to join the network. For implementing security, such as...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملImprovement of Self-Organized Public Key Management for MANET
This paper studies key management, a fundamental problem in securing Mobile Ad hoc Networks (MANETs) and presents a description of a self-organized public key management scheme and a comparison among number of certificate-based authentication schemes for mobile ad hoc networks. In this paper we improve selforganized public key management by combine features of self-organized schemes. [Marjan Ku...
متن کاملA Public Key Management Scheme and Threshold- Multisignature Scheme for Mobile Ad Hoc Networks
Mobile ad hoc networks offer communication over a shared wireless channel without any pre-existing infrastructure. Threshold digital signatures are an important cryptographic tool used in most existing key management schemes for mobile ad hoc networks. This paper proposes a thresholdmultisignature scheme designed specifically for mobile ad hoc networks. The signature scheme allows a subset of s...
متن کامل