Skip to main content

Security Research on the Interfaces of Information Appliances Described by XML

  • Conference paper
Network Computing and Information Security (NCIS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 345))

Included in the following conference series:

Abstract

At present, home network is one of the key research field, one of the important services that home network provides is remote control information appliances in home network. However, the remote control service causes various security threats. Therefore, home network should provide strong security services, particularly for remote user authentication and authorization. In this paper, we provide an effective solution to provide secure remote access in home network environment. It uses XML to describe the information appliances interfaces, which can effectively settle interoperability and plug and play problem. To provide the omni-directional safety protection for home network, uses soap to encapsulate xml standard message format, combines xml’s encrypted mechanism and signature mechanism, uses authentication and access control technics to achieve the security of remote control.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Qu, S., Liu, H.: Architecture Research of Information Appliances. Computer Technology and Development 17, 224–227 (2007)

    Google Scholar 

  2. Yuan, C., Jiang, Y., Xiao, J., Qu, S.: Research of Information Appliance and Remote Management System. Computer Knowledge and Technology 6, 8682–9684 (2010)

    Google Scholar 

  3. OpenCable Security Specification, http://www.opencable.com/specifications

  4. Trialog.: E-protection of appliances through secure and trusted access. E-Pasta IST Project Final Report 2000-26086 (2002)

    Google Scholar 

  5. Jiang, Z., Lee, K., Bae, H., Kim, S.: Security Service Framework for Home Network. In: The Fourth Annual ACIS International Conference on Computer and Information Science, pp. 233–238. IEEE Computer Society, South Korea (2005)

    Chapter  Google Scholar 

  6. Cho, E.-A., Moon, C.-J., Park, D.-H., Baik, D.-K.: Access control policy management framework based on RBAC in OSGi service platform. In: Sixth IEEE International Conference on Computer and Information Technology, pp. 161–166. IEEE Computer Society, Korea (2006)

    Chapter  Google Scholar 

  7. Ferraiolo, D.F., Richard Kuhn, D.: Role based access control. In: 15th National Computer Security Conference, Baltimore, pp. 554–563 (1992)

    Google Scholar 

  8. Cho, E.-A., Moon, C.-J., Park, D.-H., Baik, D.-K.: An effective policy management framework using RBAC model for service platform based on components. In: SERA 2006, pp. 281–288. IEEE Computer Society, Washington (2006)

    Google Scholar 

  9. Lim, H.-Y., Kim, Y.-G., Moon, C.-J., Baik, D.-K.: Bundle authentication and authorization using XML security in the OSGi service platform. In: Fourth Annual ACIS International Conference on Computer and Information Science, pp. 502–507. IEEE Computer Society, Washington (2005)

    Google Scholar 

  10. Kim, I., Lee, D., Kim, K.J., Lee, J.: Flexible authorization in home network environments. Cluster Computing 15, 3–15 (2012)

    Article  Google Scholar 

  11. Kim, G.W., Lee, D.-G., Han, J.-W., Kim, S.-C., Kim, S.-W.: Security Framework for Home Network: Authentication, Authorization, and Security Policy. In: Washio, T., Zhou, Z.-H., Huang, J.Z., Hu, X., Li, J., Xie, C., He, J., Zou, D., Li, K.-C., Freire, M.M. (eds.) PAKDD 2007. LNCS (LNAI), vol. 4819, pp. 621–628. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  12. Lee, D.-G., Lee, Y.-k., Han, J.-W., Park, J.-H., Lee, I.-Y.: Intelligent Home Network Authentication: Home Device Authentication Using Device Certification. In: Meersman, R. (ed.) OTM 2007, Part II. LNCS, vol. 4804, pp. 1688–1700. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  13. Hwang, J.-B., Lee, H.-K., Han, J.-W.: Efficient and User Friendly Inter-domain Device Authentication/Access Control for Home Networks. In: Sha, E., Han, S.-K., Xu, C.-Z., Kim, M.-H., Yang, L.T., Xiao, B. (eds.) EUC 2006. LNCS, vol. 4096, pp. 131–140. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  14. Hea, D., Mab, M., Zhangc, Y., Chena, C., Bua, J.: A strong user authentication scheme with smart cards for wireless communications. Computer Communications 34, 367–374 (2011)

    Article  Google Scholar 

  15. Qu, S., Liu, H.: Research of Family Network’S Security. Aeronautical Computing Techniquel 37, 112–115 (2007)

    Google Scholar 

  16. Shrestha, A.P., Choi, D.-Y., Kwon, G.R., Han, S.-J.: Kerberos based authentication for inter-domain roaming in wireless heterogeneous network. Computers and Mathematics with Applications 60, 245–255 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  17. You, I.: A One-Time Password Authentication Scheme for Secure Remote Access in Intelligent Home Networks. Knowledge-Based Intelligent Information and Engineering Systems 4252, 785–792 (2006)

    Article  Google Scholar 

  18. Park, J.-O., Jun, M.-S., Kim, S.-G.: A Study on Home Network User Authentication Using Token-Based OTP. In: Kim, T.-H., Stoica, A., Chang, R.-S. (eds.) SUComS 2010. CCIS, vol. 78, pp. 59–64. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  19. Vaidya, B., Park, J.H., Yeo, S.-S., Rodrigues, J.J.P.C.: Robust one-time password authentication scheme using smart card for home network environment. Computer Communications 34, 326–336 (2011)

    Article  Google Scholar 

  20. Colin, E., Nixon, P., Terzis, S.: Security Models for Trusting Network Appliances. In: The 5th IEEE International Workshop on Networked Appliances, pp. 39–44. IEEE Press, Liverpool (2002)

    Google Scholar 

  21. Mortensen, K.H., Schougaard, K.R., Schultz, U.P.: Distance-Based Access Modifiers Applied to Safety in Home Networks. In: Markopoulos, P., Eggen, B., Aarts, E., Crowley, J.L. (eds.) EUSAI 2004. LNCS, vol. 3295, pp. 315–326. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  22. Helander, J.: Deeply Embedded XML Communication Towards an Interoperable and Seamless World. In: Proceedings of the 5th ACM International Conference on Embedded Software, pp. 62–67. ACM Press, New York (2005)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Qu, S., Liu, H. (2012). Security Research on the Interfaces of Information Appliances Described by XML. In: Lei, J., Wang, F.L., Li, M., Luo, Y. (eds) Network Computing and Information Security. NCIS 2012. Communications in Computer and Information Science, vol 345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35211-9_84

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35211-9_84

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35210-2

  • Online ISBN: 978-3-642-35211-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics