Robust Attributes-Based Authenticated Key Agreement Protocol Using Smart Cards over Home Network

  • Xin-Yi Chen
  • Hyun-Sung Kim
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6784)


Authenticated key agreement protocol is one of the most convenient ways to provide secure authentication and key agreement for the communication between the user and the service provider over insecure network. Recently, Lee proposed an attributes-based authenticated key agreement protocol over home network, which is based on the attribute based cryptosystem. He claimed that his protocol is secure against replay attack, impersonal attack, man-in-the-middle attack, password guessing attack and forward secrecy. However, this paper points out that Lee’s protocol still has a security flaw in password guessing attack. To solve the problem in Lee’s scheme, we propose a robust attributes-based authenticated key agreement protocol using smart cards over home network.


Attribute-based authentication key agreement 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ellison, M.M.: Home Network Security. Intel Technology Journal (2002)Google Scholar
  2. 2.
    Steve, G.U.: Home Network Security. In: IEEE Fourth International Workshop on Network Appliance (2004)Google Scholar
  3. 3.
    Hwang, B., Lee, H.K., Han, J.W.: Efficient and User Friendly Inter-domain Device Authentication Control for Home Networks. In: Sha, E., Han, S.-K., Xu, C.-Z., Kim, M.-H., Yang, L.T., Xiao, B. (eds.) EUC 2006. LNCS, vol. 4096, pp. 131–140. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  4. 4.
    Home Networking,
  5. 5.
    Reuhani, S.Z., Mahdavi, M.: User Authentication Using Neural Network in Smart Home Networks. International Journal of Smart Home 1(2) (2007)Google Scholar
  6. 6.
    Goyala, V., Kumara, V., Sigha, M., Abrahamb, A., Sanyalc, S.: A new protocol to counter online dictionary attacks. Computers & Security 25, 114–120 (2006)CrossRefGoogle Scholar
  7. 7.
    Chung, K.I.: Security Framework for Remote Access to Home Network. In: 2006 International Conference on Hybrid Information Technology(ICHIT 2006) (2006)Google Scholar
  8. 8.
    Lee, D.G., Han, J.W., Park, J.H.: User Authentication for Multi Domain in Home Network Environments. In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), pp. 89–96 (2007)Google Scholar
  9. 9.
    Lee, D.G., Kim, D.W., Han, J.W.: Trend of Home Network Security Technology and Standardization. Electronic Communication Trend Analysis ETRI 23(4), 89–101 (2008)Google Scholar
  10. 10.
    Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  11. 11.
    Lee, W.J.: Robust attribute-based authenticated key agreement protocol over home network, Ph. D. Thesis (2008)Google Scholar
  12. 12.
    Pirretti, M., Traynor, P., Mcdaniel, P., Waters, B.: Secure attribute-based systems. Journal of Computer Security 18(5), 799–873 (2006)CrossRefGoogle Scholar
  13. 13.
    Funk, P.: The EAP MD5-Tunneled Authentication protocol, draft-funk-eap-md5-tunneled-01 (2004)Google Scholar
  14. 14.
    Panayappan, R., Palarz, T., Bauer, L., Perrig, A.: Usable key agreement in Home Networks. IEEE Press, Piscataway (2009)CrossRefGoogle Scholar
  15. 15.
    X.10 industry standard, Google Scholar
  16. 16.
    Insteon – wireless home control solutions for lighting, security, HVAC, and A/V systems,
  17. 17.
  18. 18.
  19. 19.
    Jini network technology,
  20. 20.
  21. 21.

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Xin-Yi Chen
    • 1
  • Hyun-Sung Kim
    • 1
  1. 1.School of Computer EngineeringKyungil UniversityKyungsansiKorea

Personalised recommendations