Abstract
Authenticated key agreement protocol is one of the most convenient ways to provide secure authentication and key agreement for the communication between the user and the service provider over insecure network. Recently, Lee proposed an attributes-based authenticated key agreement protocol over home network, which is based on the attribute based cryptosystem. He claimed that his protocol is secure against replay attack, impersonal attack, man-in-the-middle attack, password guessing attack and forward secrecy. However, this paper points out that Lee’s protocol still has a security flaw in password guessing attack. To solve the problem in Lee’s scheme, we propose a robust attributes-based authenticated key agreement protocol using smart cards over home network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ellison, M.M.: Home Network Security. Intel Technology Journal (2002)
Steve, G.U.: Home Network Security. In: IEEE Fourth International Workshop on Network Appliance (2004)
Hwang, B., Lee, H.K., Han, J.W.: Efficient and User Friendly Inter-domain Device Authentication Control for Home Networks. In: Sha, E., Han, S.-K., Xu, C.-Z., Kim, M.-H., Yang, L.T., Xiao, B. (eds.) EUC 2006. LNCS, vol. 4096, pp. 131–140. Springer, Heidelberg (2006)
Home Networking, http://www.iec.org
Reuhani, S.Z., Mahdavi, M.: User Authentication Using Neural Network in Smart Home Networks. International Journal of Smart Home 1(2) (2007)
Goyala, V., Kumara, V., Sigha, M., Abrahamb, A., Sanyalc, S.: A new protocol to counter online dictionary attacks. Computers & Security 25, 114–120 (2006)
Chung, K.I.: Security Framework for Remote Access to Home Network. In: 2006 International Conference on Hybrid Information Technology(ICHIT 2006) (2006)
Lee, D.G., Han, J.W., Park, J.H.: User Authentication for Multi Domain in Home Network Environments. In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), pp. 89–96 (2007)
Lee, D.G., Kim, D.W., Han, J.W.: Trend of Home Network Security Technology and Standardization. Electronic Communication Trend Analysis ETRI 23(4), 89–101 (2008)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)
Lee, W.J.: Robust attribute-based authenticated key agreement protocol over home network, Ph. D. Thesis (2008)
Pirretti, M., Traynor, P., Mcdaniel, P., Waters, B.: Secure attribute-based systems. Journal of Computer Security 18(5), 799–873 (2006)
Funk, P.: The EAP MD5-Tunneled Authentication protocol, draft-funk-eap-md5-tunneled-01 (2004)
Panayappan, R., Palarz, T., Bauer, L., Perrig, A.: Usable key agreement in Home Networks. IEEE Press, Piscataway (2009)
X.10 industry standard, http://www.en.wikipedia.org/wiki/X10_(industry_standard)
Insteon – wireless home control solutions for lighting, security, HVAC, and A/V systems, http://www.insteon.net
UPnP forum, http://www.upnp.org/
Jini network technology, http://www.sun.com/software/jini
Pure networks HNAP, http://www.purenetworks.com/partners/hnap.php
Home automation, http://www.en.wikipedia.org/wiki/Domotics
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, XY., Kim, HS. (2011). Robust Attributes-Based Authenticated Key Agreement Protocol Using Smart Cards over Home Network. In: Murgante, B., Gervasi, O., Iglesias, A., Taniar, D., Apduhan, B.O. (eds) Computational Science and Its Applications - ICCSA 2011. ICCSA 2011. Lecture Notes in Computer Science, vol 6784. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21931-3_47
Download citation
DOI: https://doi.org/10.1007/978-3-642-21931-3_47
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21930-6
Online ISBN: 978-3-642-21931-3
eBook Packages: Computer ScienceComputer Science (R0)