Secure registration protocol for media appliances in wireless home networks
نویسندگان
چکیده
Wireless LANs based on the IEEE 802.11 technology are becoming increasingly prevalent. The availability of highbandwidth together with the convenience of being a wireless medium makes it a compelling technology for multimediabased applications. In this paper, we present a gatewaybased architecture of the wireless home media network and develop a secure registration protocol that is appropriate for such an architecture. The primary goal of the protocol is to provide a secure bootstrap registration mechanism for a new media appliance and to ensure a secure communication path between appliances and the gateway that minimizes the resource usage at the appliance.
منابع مشابه
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks
An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...
متن کاملDesign and Implementation of Home Network Protocol for Appliance Control Based on IEEE 802.15.4
Interest in a home network is increasing in accordance with enhancing functionalities of household-electric-appliances. A wireless communication standard, IEEE 802.15.4 attracts attention as a communication media of the home network. This paper proposes a network protocol based on IEEE 802.15.4, which is designed in consideration of requirements and features of the home network. This protocol p...
متن کاملAn efficient solution for management of pre-distribution in wireless sensor networks
A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کامل