Usable Access Control inside Home Networks

WLAN link layer security has been well studied but very little work exists in the area of intuitive access control inside home networks. In this paper we propose an approach that allows fine-grained access control without overburdening users with difficult questions or complicated configuration tasks. The proposed concept originated from a user needs study and user trials, and it builds on the existing WiFi Protected Setup standard.

[1]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[2]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[3]  Wolfgang Müller,et al.  Secure Profile Management in Smart Home Networks , 2005, 16th International Workshop on Database and Expert Systems Applications (DEXA'05).

[4]  Sangwook Kim,et al.  Security service framework for home network , 2005, Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05).

[5]  Hans Scholten,et al.  Home Network Security , 2008, Seventh International Conference on Networking (icn 2008).

[6]  Constance Fleuriot,et al.  Girls, technology and privacy: "is my mother listening?" , 2006, CHI.

[7]  M. Angela Sasse,et al.  Users are not the enemy , 1999, CACM.

[8]  Jun-Ho Lee,et al.  Role-based Access Control Model in Home Network Environments , 2007 .

[9]  S. Ungar Home network security , 2002, Proceedings 2002 IEEE 4th International Workshop on Networked Appliances (Cat. No.02EX525).

[10]  J. Doug Tygar,et al.  Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.

[11]  Frank Stajano,et al.  Usability of Security Management: Defining the Permissions of Guests , 2006, Security Protocols Workshop.

[12]  Stephen Farrell,et al.  Towards security auto-configuration for smart appliances , 2003 .

[13]  Pekka Nikander,et al.  Users and Trust in Cyberspace , 2000, Security Protocols Workshop.

[14]  Diana K. Smetters,et al.  In search of usable security: five lessons from the field , 2004, IEEE Security & Privacy Magazine.

[15]  Karen Holtzblatt,et al.  Contextual design , 1997, INTR.

[16]  Kevin Driscoll,et al.  Making Home Automation Communications Secure , 2001, Computer.

[17]  Ka-Ping Yee,et al.  User Interaction Design for Secure Systems , 2002, ICICS.