Abstract
The authors have studied the security management architecture for Personal Networks (PN). The main feature of the proposed architecture is to exploit a trusted cellular system, namely, an IMS (IP Multimedia Subsystem), to provide security functions for PNs over open networks like the Internet. They also proposed two security functions to solve security issues for a PN, PE ID and Key Assignment (PIKA) function and a PN Key Sharing (PNKS) function. The PIKA function assigns an ID and key to non IMS–compliant devices (Peer Equipment: PE) to authenticate the user of the PE with the assistance of the IMS–compliant terminal (User Equipment: UE). The PNKS function makes it possible for PEs to share a common cipher key (PN Key) in a PN, which is used to protect a PN against eavesdropping on application data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
IP Multimedia Subsystem (IMS) Stage 2 (Release 8), 3GPP Technical Specification 23.228
My personal Adaptive Global NET, http://www.telecom.ece.ntua.gr/magnet/index.html
Naor, D., Naor, M., Lotspiech, J.: Revocation and Tracing Schemes for Stateless Receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41–62. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Matsunaka, T., Warabino, T., Kishi, Y., Umezawa, T., Nakauchi, K., Inoue, M. (2012). A Study on Security Management Architecture for Personal Networks. In: SĂ©nac, P., Ott, M., Seneviratne, A. (eds) Mobile and Ubiquitous Systems: Computing, Networking, and Services. MobiQuitous 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 73. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29154-8_36
Download citation
DOI: https://doi.org/10.1007/978-3-642-29154-8_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29153-1
Online ISBN: 978-3-642-29154-8
eBook Packages: Computer ScienceComputer Science (R0)