Abstract
We study user authentication protocols that allow user to remotely access and control home appliances through home gateway. In particular, we explore the S/Key user authentication scheme, a widely known one-time password system. Earlier studies show that S/Key is vulnerable to server spoofing, replay, and off-line dictionary attacks. Several researchers have proposed various solutions to prevent such attacks. However, we show that these enhancements are still vulnerable to another security attacks and propose a scheme that defends such attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Sun, H.: Home Networking, Mitsubishi Electric Research Laboratories (2004), http://www.merl.com/projects/hmnt/
Haller, N.: The S/KEY One-time Password, RFC 1760 (February 1995)
Haller, N., Metz, C., Nesser, P., Straw, M.: A One-time Password System, RFC 2289 (February 1998)
Mitchell, C.J., Chen, L.: Comments on the S/KEY User Authentication Scheme. ACM Operating Systems Review 30(4), 12–16 (1996)
Yeh, T.C., Shen, H.Y., Hwang, J.J.: A Secure One-Time Password Authentication Scheme Using Smart Cards. IEICE Transaction on Communication E85-B(11), 2515–2518 (2002)
Lee, N.Y., Chen, J.C.: Improvement of One-Time Password Authentication Scheme Using Smart Cards. IEICE Transaction on Communication E88-B(9), 3765–3767 (2005)
Yen, S.M., Liao, K.H.: Shared Authentication Token Secure against Replay and Weak Key Attacks. Information Processing Letters 62, 77–80 (1997)
You, I., Cho, K.: A S/KEY Based Secure Authentication Protocol Using Public Key Cryptography. The KIPS Transactions: Part CÂ 10-C(6) (February 2003)
You, I., Cho, K.: Comments on YEH-SHEN-HWANG’s One-Time Password Authentication Scheme. IEICE Transaction on Communication E88-B(2), 751–753 (2005)
Denning, D., Sacco, G.: Timestamps in Key Distribution Systems. Communications of the ACM 24(8), 533–536 (1981)
Kim, S., Kim, B., Park, S., Yen, S.: Comments on Password-Based Private Key Download Protocol of NDSS 1999. Electronics Letters 35(22), 1937–1938 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
You, I., Jung, ES. (2006). A Light Weight Authentication Protocol for Digital Home Networks. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751632_45
Download citation
DOI: https://doi.org/10.1007/11751632_45
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34077-5
Online ISBN: 978-3-540-34078-2
eBook Packages: Computer ScienceComputer Science (R0)