Skip to main content

Robust Attributes-Based Authenticated Key Agreement Protocol Using Smart Cards over Home Network

  • Conference paper
Book cover Computational Science and Its Applications - ICCSA 2011 (ICCSA 2011)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6784))

Included in the following conference series:

  • 1361 Accesses

Abstract

Authenticated key agreement protocol is one of the most convenient ways to provide secure authentication and key agreement for the communication between the user and the service provider over insecure network. Recently, Lee proposed an attributes-based authenticated key agreement protocol over home network, which is based on the attribute based cryptosystem. He claimed that his protocol is secure against replay attack, impersonal attack, man-in-the-middle attack, password guessing attack and forward secrecy. However, this paper points out that Lee’s protocol still has a security flaw in password guessing attack. To solve the problem in Lee’s scheme, we propose a robust attributes-based authenticated key agreement protocol using smart cards over home network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ellison, M.M.: Home Network Security. Intel Technology Journal (2002)

    Google Scholar 

  2. Steve, G.U.: Home Network Security. In: IEEE Fourth International Workshop on Network Appliance (2004)

    Google Scholar 

  3. Hwang, B., Lee, H.K., Han, J.W.: Efficient and User Friendly Inter-domain Device Authentication Control for Home Networks. In: Sha, E., Han, S.-K., Xu, C.-Z., Kim, M.-H., Yang, L.T., Xiao, B. (eds.) EUC 2006. LNCS, vol. 4096, pp. 131–140. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  4. Home Networking, http://www.iec.org

  5. Reuhani, S.Z., Mahdavi, M.: User Authentication Using Neural Network in Smart Home Networks. International Journal of Smart Home 1(2) (2007)

    Google Scholar 

  6. Goyala, V., Kumara, V., Sigha, M., Abrahamb, A., Sanyalc, S.: A new protocol to counter online dictionary attacks. Computers & Security 25, 114–120 (2006)

    Article  Google Scholar 

  7. Chung, K.I.: Security Framework for Remote Access to Home Network. In: 2006 International Conference on Hybrid Information Technology(ICHIT 2006) (2006)

    Google Scholar 

  8. Lee, D.G., Han, J.W., Park, J.H.: User Authentication for Multi Domain in Home Network Environments. In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), pp. 89–96 (2007)

    Google Scholar 

  9. Lee, D.G., Kim, D.W., Han, J.W.: Trend of Home Network Security Technology and Standardization. Electronic Communication Trend Analysis ETRI 23(4), 89–101 (2008)

    Google Scholar 

  10. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Lee, W.J.: Robust attribute-based authenticated key agreement protocol over home network, Ph. D. Thesis (2008)

    Google Scholar 

  12. Pirretti, M., Traynor, P., Mcdaniel, P., Waters, B.: Secure attribute-based systems. Journal of Computer Security 18(5), 799–873 (2006)

    Article  Google Scholar 

  13. Funk, P.: The EAP MD5-Tunneled Authentication protocol, draft-funk-eap-md5-tunneled-01 (2004)

    Google Scholar 

  14. Panayappan, R., Palarz, T., Bauer, L., Perrig, A.: Usable key agreement in Home Networks. IEEE Press, Piscataway (2009)

    Book  Google Scholar 

  15. X.10 industry standard, http://www.en.wikipedia.org/wiki/X10_(industry_standard)

    Google Scholar 

  16. Insteon – wireless home control solutions for lighting, security, HVAC, and A/V systems, http://www.insteon.net

  17. HomeRF, http://www.en.wikipedia.org/wiki/HomeRF

  18. UPnP forum, http://www.upnp.org/

  19. Jini network technology, http://www.sun.com/software/jini

  20. Pure networks HNAP, http://www.purenetworks.com/partners/hnap.php

  21. Home automation, http://www.en.wikipedia.org/wiki/Domotics

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, XY., Kim, HS. (2011). Robust Attributes-Based Authenticated Key Agreement Protocol Using Smart Cards over Home Network. In: Murgante, B., Gervasi, O., Iglesias, A., Taniar, D., Apduhan, B.O. (eds) Computational Science and Its Applications - ICCSA 2011. ICCSA 2011. Lecture Notes in Computer Science, vol 6784. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21931-3_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21931-3_47

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21930-6

  • Online ISBN: 978-3-642-21931-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics