Advertisement

A Secure Multimedia System in Emerging Wireless Home Networks

  • Nut Taesombut
  • Richard Huang
  • Venkat P. Rangan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2828)

Abstract

With their availability of high-bandwidth and extensive transmission range, Wireless Local Area Networks (WLANs) become a compelling technology for developing next-generation home entertainment systems. In the near future, home multimedia systems will rely on wireless networks in lieu of typical wired networks in interconnecting media appliances. Wireless connectivity will enable many novel and advanced features to entertain and comfort a home user. However, before systems are viable and widely acceptable, there are security and copyright protection problems that need to be addressed. Since the system relies on wireless communication, privacy of streaming media content becomes a great concern among media content owners and legitimate consumers who wish to protect their intellectual property against illegal use. In this paper, we present a gateway-based architecture for secure wireless home multimedia systems. We have developed a protocol to ensure secure bootstrap registration of new media devices and protect communication within a wireless home network. We have built the system prototype to evaluate the timing overhead of the device registration process and identify the bottleneck.

Keywords

Media Device Wireless Local Area Network Media Content Home Network Multimedia System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    L.M.S.C. of the IEEE Computer Society: Wireless LAN Medium Access Control. IEEE Standard 802.11 (1999)Google Scholar
  2. 2.
    Orinoco, L.: User’s Guide for the ORiNOCO Manager’s Suite (November 2000)Google Scholar
  3. 3.
    Arbaugh, W.A., Shankar, N., Wan, Y.J.: Your 802.11 Wireless Network Has No Clothes, http://www.cs.umd.edu/waa/wireless.pdf
  4. 4.
    Walker, J.: Unsafe at Any Key Size: Analysis of the WEP Encapsulation. Technical Report 03628E, 802.11 Committee (March 2002)Google Scholar
  5. 5.
    Intercepting Mobile Communications: The Insecurity of 802.11. In: Proceedings of the 7th Conference on Mobile Computing and Networking (March 2002)Google Scholar
  6. 6.
    Ramani, I., Bharadwaja, R., Rangan, P.V.: Location Tracking for Media Appliances in Wireless Home Networks. In: Proceedings of the IEEE International Conference on Multimedia and Expo (ICME 2003) (July 2003)Google Scholar
  7. 7.
    Ramanthan, S., Rangan, P.V.: Adaptive Feedback Techniques for Syschronized Multimedia Retrieval over Integrated Networks. IEEE/ACM Transaction on Networking (1993)Google Scholar
  8. 8.
    Taesombut, N., Kumar, V., Dubey, R., Rangan, P.V.: A Secure Registration Protocol for Media Appliances in Wireless Home Networks. In: Proceedings of the IEEE International Conference on Multimedia and Expo (ICME 2003) (July 2003)Google Scholar
  9. 9.
    Bellare, M., Canetti, R., Krawczyk, H.: Message Authentication Code Using Hash Functions: The HMAC Construction. In: Proceedings of the 23rd International Cryptology Conference (CRYPTO 1996) (March 1996)Google Scholar
  10. 10.
    Daemen, J., Rijmen, V.: AES Proposal: Rijindael. In: Proceedings of the 1st AES Conference (August 1998)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2003

Authors and Affiliations

  • Nut Taesombut
    • 1
  • Richard Huang
    • 1
  • Venkat P. Rangan
    • 1
  1. 1.Department of Computer Science and EngineeringUniversity of CaliforniaSan Diego, La JollaUSA

Personalised recommendations