Security framework for home network: Authentication, authorization, and security policy

被引:0
|
作者
Kim, Geon Woo [1 ]
Lee, Deok Gyu [1 ]
Han, Jong Wook [1 ]
Kim, Sang Choon [2 ]
Kim, Sang Wook [3 ]
机构
[1] Elect & Telecommun Res Inst, 161 Gajeong Dong, Taejon 305350, South Korea
[2] Kangwon Natl Univ, Samcheok, Gangwon Do, South Korea
[3] Kyungpook Natl Univ, Taegu 702701, South Korea
关键词
home network; security; authentication; authorization; access control; security policy;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As a number of home network services are available and home network is expanding into ubiquitous computing environment, we need to protect borne network system from illegal accesses and a variety of threats. Home network is exposed to various cyber attacks of Internet, involves hacking, malicious codes, worms, viruses, DoS attacks, and eavesdropping since it is connected to Internet. So in this paper, we propose a home network security framework for guaranteeing reliability and availability including authentication, authorization and security policy system.
引用
收藏
页码:621 / +
页数:2
相关论文
共 50 条
  • [1] The efficient security architecture for authentication and authorization in the home network
    Lee, Hyungkyu
    Lee, Jooyoung
    Han, Jongwook
    [J]. ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 5, PROCEEDINGS, 2007, : 713 - +
  • [2] Security architecture for authentication and authorization in the intelligent and ubiquitous home network
    Lee, Hyungkyu
    Han, Jongwook
    Chung, Kyoil
    [J]. ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF CONTEMPORARY INTELLIGENT COMPUTING TECHNIQUES, 2007, 2 : 1110 - +
  • [3] Authentication and authorization for network security service
    Kim, T
    Cho, S
    Jin, S
    [J]. SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 84 - 88
  • [4] Device Authentication/Authorization Protocol for Home Network in Next Generation Security
    Moon, Jong Sik
    Lee, Deok Gyu
    Lee, Im-Yeong
    [J]. ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 760 - +
  • [5] Smart Environment Authentication: Multi-Domain Authentication, Authorization, Security Policy for Pervasive Network
    Lee, Deok Gyu
    Kim, Geon Woo
    Han, Jong Wook
    Jeong, Young-Sik
    Park, Doo Soon
    [J]. INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 99 - 104
  • [6] A Security Framework for IoT Authentication and Authorization based on Blockchain Technology
    Pajooh, Houshyar Honar
    Rashid, M. A.
    [J]. 2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 264 - 271
  • [7] Security service framework for home network
    Jiang, ZF
    Kim, S
    Lee, K
    Bae, H
    Kim, S
    [J]. FOURTH ANNUAL ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2005, : 233 - 238
  • [8] Security policy specification for home network
    Kim, Geon Woo
    Lee, Deok Gyu
    Han, Jong Wook
    Kim, Sang Wook
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2009, 4 (06) : 372 - 378
  • [9] The security framework for home network environments
    Kim, DW
    Han, JW
    Ju, HI
    Lee, YK
    [J]. ISAS/CITSA 2004: International Conference on Cybernetics and Information Technologies, Systems and Applications and 10th International Conference on Information Systems Analysis and Synthesis, Vol 1, Proceedings: COMMUNICATIONS, INFORMATION TECHNOLOGIES AND COMPUTING, 2004, : 382 - 385
  • [10] A Framework for Improved Home Network Security
    Craveiro, Antonio
    Oliveira, Ana
    Proenca, Jorge
    Cruz, Tiago
    Simoes, Paulo
    [J]. PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 114 - 123