security mechanism for home base station in wireless residential networks n.
Skip this Video
Loading SlideShow in 5 Seconds..
Security Mechanism for Home Base Station in Wireless Residential Networks PowerPoint Presentation
Download Presentation
Security Mechanism for Home Base Station in Wireless Residential Networks

play fullscreen
1 / 7
Download Presentation

Security Mechanism for Home Base Station in Wireless Residential Networks - PowerPoint PPT Presentation

ayoka
104 Views
Download Presentation

Security Mechanism for Home Base Station in Wireless Residential Networks

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Security Mechanism for Home Base Station in Wireless Residential Networks Han Sang Kim Su Jin Kim

  2. Security Categorization Mechanism 1. [Dev || Dc || SL || Alg || MACk (Dev || Dc || SL)] Access Point 2. [Ek ( Dc || SL || Rn || TS)] MP3 Player 3. [Dev || Dest || Msg || h(Dest || Msg || Rn +1)] Dev: Device ID Dc: Device category SL: Security level Alg: Algorithm Rn: Nonce Dest: Destination address 4. [Msg || h(Msg || Rn || TS)] PDA

  3. Advantages and Limitations • Advantages - security architecture for universal access point - dynamically working - simple to implement and maintain - security mechanism is upgradeable • Limitations - does not solve the simple denial of service - bottleneck at the access point - not appropriate for some devices

  4. Our Hybrid Security Mechanism • Combine the security categorization mechanism with key distribution mechanism. • Key distribution mechanism: - Master key - Shared network key Access Point Key distribution Or Key update Encrypted by M1 M1 M2 Kn Appliance1 Appliance2 Mn: Master Key Kn: Shared Network Key Communication Encrypted by shared key kn

  5. Our Hybrid Security Mechanism (cont.) 1. [ID1 || Dc || SL || Alg || MACmk1 (ID1 || Dc || SL)] Access Point 2. [Emk ( Dc || SL || Rn || TS)] Appliance1 3. [ID1 || Dest|| h(Dest || Rn +1)] 4. [Emk1 ( ID2|| SKey12 || TS)] [Emk2 ( ID1|| SKey12 || TS)] 5. [Eskey12 (ID12 || Msg)] Appliance2

  6. What we have done so far and will do? • Implementation our hybrid mechanism by step 4  Yes • Reduction of bottleneck  Yes • Containment police  Yes • Communication between nodes with shared network key  No • Algorithm-agile encryption/decryption  No • Employing other devices  No • Implementing our hybrid mechanism with a sensor  No

  7. References [1] H. Nakakita, K. Yamaguchi, M. Hashimoto, T. Saito, and M. Sakurai, “A Study on Secure Wireless Networks Consisting of Home Appliance”, IEEE Transactions on Consumer Electronics, Vol. 49 Issue 2 pp. 375-387, May 2003. [2] P. Krishnamurthy, J. Kabara, and T. Anusas-amornkul, “Security In Wireless Residential Networks”, IEEE Transactions on Consumer Electronics, Vol. 48 No. 1 pp. 157-166, February 2002. [3] Bruce Schneier, “Applied Cryptography”, John Wiley & Sons, 1996 [4] Andrew S. Tanenbaum, “Computer Networks”, Prentice Hall, 1996 [5] J.A. DiGirolamo, “Home networks – from toasters to HDTV”, Digest of Technical Paper in Intl. Conf. On Cons. Electronics, June, 1996. [6] R. Barry, “The future home network – one interactive and entertainment platform”, IEEE Seminar on HomeNet, June 1999. [7] http://www.bluetooth.com [8] C. Kaufman “Network Security: Prentice Hall, 1995 [9] http://security.ece.orst.edu [10] Suman Banerjee, Arunesh Mishra, “Location-based Secure Wireless Group Communication”, Mobile Computing and Communications Review, Volume 1, Number 2