Home Network Security

Service discovery and secure and safe service usage are essential elements in the deployment of home and personal networks. Because no system administrator is present, setup and daily operation of such a network has to be automated as much as possible with a high degree of user friendliness. To achieve this goal many systems sacrifice security and privacy such, that services can be discovered and used unauthorized or a person's privacy may be breached. In this paper we present a security mechanism that seamlessly integrates with service discovery and usage. Exchange of keys and certificates is combined with messages used for service discovery. Services messages themselves are encrypted and authenticated, and casual receivers cannot read them. Although encryption and decryption of messages takes extra time, the combined protocol poses minimal communication overhead and hence can be used even in small devices.

[1]  Chenxi Zhu,et al.  QoS routing for mobile ad hoc networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[2]  Paul C. van Oorschot,et al.  Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..

[3]  Domenico Ferrari,et al.  Dynamic management of guaranteed-performance multimedia connections , 2005, Multimedia Systems.

[4]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[5]  Andrew T. Campbell,et al.  Insignia: in-band signaling support for qos in mobile ad hoc networks , 1998 .

[6]  T. Aaron Gulliver,et al.  Quality of service for ad hoc on-demand distance vector routing , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[7]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[8]  C. R. Lin On-demand QoS routing in multihop mobile networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[9]  Antonio Kung,et al.  Open Home Networks: The TEAHA Approach , 2006, Sixth International Conference on Networking (ICN'07).

[10]  David A. Maltz,et al.  A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.

[11]  C. Brendan S. Traw Protecting Digital Content within the Home , 2001, Computer.

[12]  Christian Huitema Teredo: Tunneling IPv6 over UDP through NATs , 2002 .

[13]  Stuart Cheshire,et al.  Dynamic Configuration of IPv4 Link-Local Addresses , 2005, RFC.

[14]  Ingemar J. Cox,et al.  Copy protection for DVD video , 1999, Proc. IEEE.

[15]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[16]  Charles E. Perkins,et al.  Quality of Service for Ad hoc On-Demand Distance Vector Routing , 2001 .

[17]  Fangzhe Chang,et al.  Realizing the transition to IPv6 , 2002 .

[18]  S. Ungar,et al.  Home network security , 2002, Proceedings 2002 IEEE 4th International Workshop on Networked Appliances (Cat. No.02EX525).

[19]  Butler W. Lampson,et al.  SPKI Certificate Theory , 1999, RFC.

[20]  Leslie A. Rusch,et al.  Indoor Wireless Communications: Capacity and Coexistence on the Unlicensed Bands , 2001 .

[21]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[22]  V. Sundramoorthy,et al.  At Home in Service Discovery , 2006 .