Abstract
At present, home network is one of the key research field, one of the important services that home network provides is remote control information appliances in home network. However, the remote control service causes various security threats. Therefore, home network should provide strong security services, particularly for remote user authentication and authorization. In this paper, we provide an effective solution to provide secure remote access in home network environment. It uses XML to describe the information appliances interfaces, which can effectively settle interoperability and plug and play problem. To provide the omni-directional safety protection for home network, uses soap to encapsulate xml standard message format, combines xml’s encrypted mechanism and signature mechanism, uses authentication and access control technics to achieve the security of remote control.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Qu, S., Liu, H.: Architecture Research of Information Appliances. Computer Technology and Development 17, 224–227 (2007)
Yuan, C., Jiang, Y., Xiao, J., Qu, S.: Research of Information Appliance and Remote Management System. Computer Knowledge and Technology 6, 8682–9684 (2010)
OpenCable Security Specification, http://www.opencable.com/specifications
Trialog.: E-protection of appliances through secure and trusted access. E-Pasta IST Project Final Report 2000-26086 (2002)
Jiang, Z., Lee, K., Bae, H., Kim, S.: Security Service Framework for Home Network. In: The Fourth Annual ACIS International Conference on Computer and Information Science, pp. 233–238. IEEE Computer Society, South Korea (2005)
Cho, E.-A., Moon, C.-J., Park, D.-H., Baik, D.-K.: Access control policy management framework based on RBAC in OSGi service platform. In: Sixth IEEE International Conference on Computer and Information Technology, pp. 161–166. IEEE Computer Society, Korea (2006)
Ferraiolo, D.F., Richard Kuhn, D.: Role based access control. In: 15th National Computer Security Conference, Baltimore, pp. 554–563 (1992)
Cho, E.-A., Moon, C.-J., Park, D.-H., Baik, D.-K.: An effective policy management framework using RBAC model for service platform based on components. In: SERA 2006, pp. 281–288. IEEE Computer Society, Washington (2006)
Lim, H.-Y., Kim, Y.-G., Moon, C.-J., Baik, D.-K.: Bundle authentication and authorization using XML security in the OSGi service platform. In: Fourth Annual ACIS International Conference on Computer and Information Science, pp. 502–507. IEEE Computer Society, Washington (2005)
Kim, I., Lee, D., Kim, K.J., Lee, J.: Flexible authorization in home network environments. Cluster Computing 15, 3–15 (2012)
Kim, G.W., Lee, D.-G., Han, J.-W., Kim, S.-C., Kim, S.-W.: Security Framework for Home Network: Authentication, Authorization, and Security Policy. In: Washio, T., Zhou, Z.-H., Huang, J.Z., Hu, X., Li, J., Xie, C., He, J., Zou, D., Li, K.-C., Freire, M.M. (eds.) PAKDD 2007. LNCS (LNAI), vol. 4819, pp. 621–628. Springer, Heidelberg (2007)
Lee, D.-G., Lee, Y.-k., Han, J.-W., Park, J.-H., Lee, I.-Y.: Intelligent Home Network Authentication: Home Device Authentication Using Device Certification. In: Meersman, R. (ed.) OTM 2007, Part II. LNCS, vol. 4804, pp. 1688–1700. Springer, Heidelberg (2007)
Hwang, J.-B., Lee, H.-K., Han, J.-W.: Efficient and User Friendly Inter-domain Device Authentication/Access Control for Home Networks. In: Sha, E., Han, S.-K., Xu, C.-Z., Kim, M.-H., Yang, L.T., Xiao, B. (eds.) EUC 2006. LNCS, vol. 4096, pp. 131–140. Springer, Heidelberg (2006)
Hea, D., Mab, M., Zhangc, Y., Chena, C., Bua, J.: A strong user authentication scheme with smart cards for wireless communications. Computer Communications 34, 367–374 (2011)
Qu, S., Liu, H.: Research of Family Network’S Security. Aeronautical Computing Techniquel 37, 112–115 (2007)
Shrestha, A.P., Choi, D.-Y., Kwon, G.R., Han, S.-J.: Kerberos based authentication for inter-domain roaming in wireless heterogeneous network. Computers and Mathematics with Applications 60, 245–255 (2010)
You, I.: A One-Time Password Authentication Scheme for Secure Remote Access in Intelligent Home Networks. Knowledge-Based Intelligent Information and Engineering Systems 4252, 785–792 (2006)
Park, J.-O., Jun, M.-S., Kim, S.-G.: A Study on Home Network User Authentication Using Token-Based OTP. In: Kim, T.-H., Stoica, A., Chang, R.-S. (eds.) SUComS 2010. CCIS, vol. 78, pp. 59–64. Springer, Heidelberg (2010)
Vaidya, B., Park, J.H., Yeo, S.-S., Rodrigues, J.J.P.C.: Robust one-time password authentication scheme using smart card for home network environment. Computer Communications 34, 326–336 (2011)
Colin, E., Nixon, P., Terzis, S.: Security Models for Trusting Network Appliances. In: The 5th IEEE International Workshop on Networked Appliances, pp. 39–44. IEEE Press, Liverpool (2002)
Mortensen, K.H., Schougaard, K.R., Schultz, U.P.: Distance-Based Access Modifiers Applied to Safety in Home Networks. In: Markopoulos, P., Eggen, B., Aarts, E., Crowley, J.L. (eds.) EUSAI 2004. LNCS, vol. 3295, pp. 315–326. Springer, Heidelberg (2004)
Helander, J.: Deeply Embedded XML Communication Towards an Interoperable and Seamless World. In: Proceedings of the 5th ACM International Conference on Embedded Software, pp. 62–67. ACM Press, New York (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Qu, S., Liu, H. (2012). Security Research on the Interfaces of Information Appliances Described by XML. In: Lei, J., Wang, F.L., Li, M., Luo, Y. (eds) Network Computing and Information Security. NCIS 2012. Communications in Computer and Information Science, vol 345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35211-9_84
Download citation
DOI: https://doi.org/10.1007/978-3-642-35211-9_84
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35210-2
Online ISBN: 978-3-642-35211-9
eBook Packages: Computer ScienceComputer Science (R0)