A Light Weight Authentication Protocol for Digital Home Networks
We study user authentication protocols that allow user to remotely access and control home appliances through home gateway. In particular, we explore the S/Key user authentication scheme, a widely known one-time password system. Earlier studies show that S/Key is vulnerable to server spoofing, replay, and off-line dictionary attacks. Several researchers have proposed various solutions to prevent such attacks. However, we show that these enhancements are still vulnerable to another security attacks and propose a scheme that defends such attacks.
KeywordsSmart Card Authentication Scheme Authentication Protocol Home Network Security Attack
Unable to display preview. Download preview PDF.
- 1.Sun, H.: Home Networking, Mitsubishi Electric Research Laboratories (2004), http://www.merl.com/projects/hmnt/
- 2.Haller, N.: The S/KEY One-time Password, RFC 1760 (February 1995)Google Scholar
- 3.Haller, N., Metz, C., Nesser, P., Straw, M.: A One-time Password System, RFC 2289 (February 1998)Google Scholar
- 5.Yeh, T.C., Shen, H.Y., Hwang, J.J.: A Secure One-Time Password Authentication Scheme Using Smart Cards. IEICE Transaction on Communication E85-B(11), 2515–2518 (2002)Google Scholar
- 8.You, I., Cho, K.: A S/KEY Based Secure Authentication Protocol Using Public Key Cryptography. The KIPS Transactions: Part C 10-C(6) (February 2003)Google Scholar