DocumentCode
2812699
Title
A Design of Home Network Security Protocol Using User Authentication and Access Control Technology
Author
Lee, Young Gu ; Kim, Jung Jae ; Jung Jae Kim ; Jun, Moon Seog
Author_Institution
Dept. of Comput. Sci., SoongSil Univ., Seoul
fYear
2008
fDate
28-30 Aug. 2008
Firstpage
30
Lastpage
34
Abstract
This paper designs and suggests a home network security protocol using user authentication and access control technology to prevent the threat by unauthorized users towards personal information and user asset in advance by providing the gradual authority to corresponding devices based on authorized information, after authorizing the users with a public key certificate. Also, the excellence of the protocol suggested in this paper can be confirmed by experimenting, comparing, and analyzing many categories such as number of computations and hash computation, quantity of sending out or receiving data, number of encryption, and the size of used keys while authenticating users in existing commercial products.
Keywords
authorisation; computer networks; home computing; protocols; public key cryptography; access control; encryption; gradual authority; hash computation; home network security protocol; key size; personal information; public key certificate; user asset; user authentication; user authorization; Access control; Access protocols; Authentication; Computer security; Home automation; IP networks; Information security; Middleware; Public key; Web and internet services; Home Network;
fLanguage
English
Publisher
ieee
Conference_Titel
Convergence and Hybrid Information Technology, 2008. ICHIT '08. International Conference on
Conference_Location
Daejeon
Print_ISBN
978-0-7695-3328-5
Type
conf
DOI
10.1109/ICHIT.2008.200
Filename
4622796
Link To Document