Design and Implementation of Security Protocol for Home-Network

被引:0
|
作者
Lee, Young-Gu [1 ]
Kim, Jung-Jae [1 ]
Kim, Hyun-Chul [1 ]
Jun, Moon-Seog [1 ]
机构
[1] Soongsil Univ, Dept Comp Sci, Seoul, South Korea
来源
SNPD 2009: 10TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCES, NETWORKING AND PARALLEL DISTRIBUTED COMPUTING, PROCEEDINGS | 2009年
关键词
Home-network; SOAP; ACL;
D O I
10.1109/SNPD.2009.74
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Home network is required for installment, simple & convenient use, expensive cost, various application service. Security is essential requirement for the interlock of intranet and extranet. To control home network by outside user terminal, this paper proposes that the outside client connects home server using SOAP(Simple Object Access Protocol) message. Based on x.509 v3,the proposed system controls device by dividing into user groups in the extention area of x.509 Q. This paper proposes the access control method by adding limited devices to the ACL(Access Control List) and by distinguishing between limited users and a administrator for each device.
引用
收藏
页码:220 / 224
页数:5
相关论文
共 50 条
  • [31] Wireless network design and implementation in smart home
    Zhang, Peng
    Sun, Lianke
    Zhang, Pizhen
    Hou, Rongxu
    Tian, Guiyan
    Liu, Xin
    2013 6TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKS AND INTELLIGENT SYSTEMS (ICINIS), 2013, : 167 - 170
  • [32] Analysis of the RFID security protocol for secure smart home network
    Kim, Hyun-Seok
    Oh, Jung-Hyun
    Choi, Jin-Young
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2006, : 356 - +
  • [33] Design and implementation of network protocol experimental system
    Ma, Jing
    Liu, Xingwei
    Chai, Halin
    ADVANCING SCIENCE THROUGH COMPUTATION, 2008, : 96 - 99
  • [34] Design and implementation of controller for a sensor network protocol
    College of Computer and Information Engineering, Zhejiang Gongshang University, Hangzhou 310018, China
    Yi Qi Yi Biao Xue Bao, 2007, SUPPL. 5 (116-120): : 116 - 120
  • [36] Implementation of security facilities in Simple Network Management Protocol (SNMP)
    Huang, Chuan
    Shi, Bingxin
    Zhao, Erdun
    Yin, Hao
    High Technology Letters, 2000, 6 (04) : 70 - 75
  • [37] Optimization design of encryption protocol in network security protocol based on wireless network development
    Zhang, Ming
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (05) : 6099 - 6106
  • [38] Design and implementation of home intercom and security control systems for buildings
    Bai, Ying-Wen
    Chen, Shi-Chang
    2007 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, VOLS 1 AND 2, 2007, : 229 - 234
  • [39] A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace a nd Security Protocol Implementation Ontology
    He, Xudong
    Liu, Jiabing
    Huang, Chin-Tser
    Wang, Dejun
    Meng, Bo
    IEEE ACCESS, 2019, 7 : 131050 - 131067
  • [40] Device Authentication/Authorization Protocol for Home Network in Next Generation Security
    Moon, Jong Sik
    Lee, Deok Gyu
    Lee, Im-Yeong
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 760 - +