Abstract
As home network is expanding into ubiquitous computing environment and lots of private information is accessible, it is required to protect home network system from illegal accesses and security threats in open network. In general deployment of home network, a secure home gateway is located at the boarder of each home and regarded to be a core entity providing services and controlling traffic. So in this paper, we propose a security system guaranteeing security, availability, and reliability based on the secure home gateway and describe our implementation on home network including authentication, authorization, and security policy.
Chapter PDF
Similar content being viewed by others
References
Han, J.-W.: Revitalization Policy of Home Network Industry, 22nd edn., vol. 9, Korea Information Science Society (2009)
Han, J.-W., Kim, D.-W., Joo, H.-II.: Considerations for Home Network Security Framework. In: Korea Information Science Security, 22th edn., vol. 9 (September 2004)
Framework of security technologies for home network, ITU-T Recommendation X.1111 (2007)
Lee, Y.-k., Ju, H.-i., Park, J.-h., Han, j.-w.: User Authentication Mechanism Using Authentication Server in Home Network. In: Proceedings of the 8th International Conference on Advanced Communication and Technology
Lee, H.-k., Lee, Y.-k., Ju, H.-i., Han, J.-w.: User Authentication Mechanisms for Home Network using Home Server, TTAS.KO-12.0030
Abobo, B., et al.: Extensible Authentication Protocol (EAP)., IETF RFC3748 (June 2004)
Fund, P.: EAP Tunneled TLS Authentication Protocol, IETF draft-funk-eap-ttls-v1-00 (February 2005)
Palekar, A.S., Salowey, D., Zhou, J., Zorn, H.: Protected EAP Protocol (PEAP) version 2, IETF draft-josefsson-pppext-eap-tls-eap-10 (2004)
Kim, G.-W.: eXtensible Home Security Description Language. Telecommunications and Technologies Association (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, G.W., Lee, D.G., Han, J.W., Kim, S.W. (2007). Security Technologies Based on Home Gateway for Making Smart Home Secure. In: Denko, M.K., et al. Emerging Directions in Embedded and Ubiquitous Computing. EUC 2007. Lecture Notes in Computer Science, vol 4809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77090-9_12
Download citation
DOI: https://doi.org/10.1007/978-3-540-77090-9_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77089-3
Online ISBN: 978-3-540-77090-9
eBook Packages: Computer ScienceComputer Science (R0)