Home-Network Security Model in Ubiquitous Environment
Social interest and demand on Home-Network has
been increasing greatly. Although various services are being
introduced to respond to such demands, they can cause serious
security problems when linked to the open network such as Internet.
This paper reviews the security requirements to protect the service
users with assumption that the Home-Network environment is
connected to Internet and then proposes the security model based on
the requirement. The proposed security model can satisfy most of the
requirements and further can be dynamically applied to the future
ubiquitous Home-Networks.
[1] "Ministry of Information and Communication IT893 Strategy", MIC,
2005, http://www.mic.go.kr
[2] Home-Network Security, ITU-T SG17 WP2 Q.9,
[3] "Home-Networked Device Interoperability Guidelines", Members of the
Digital Living Network Alliance (DLNA), June 2004.
[4] "Present Status and Future Development Strategies of Domestic and
Foreign Home-Network Industries,"Home-Network Industry Association,
2005.5
[5] "Policies and Technological Weak Points of Home-Network,"1st
Home-Network Security Workshop, Kim T. G., Institute of Information
Technology Administration, 2004.7.12
[6] "Introduction to the Standard Technology for Digital Home-Network,"
Han. C. M., Park G. N. Korea Telecommunication Technology
Association (TTA), 2004.2
[7] "Threats and Countermeasures against the Invasions in the Ubiquitous
Home-Network Environment,"Yoo D. Y., Kim Y. T., Rho B. G. Korea
Information Security Agency, 2004.10 Jorunal V31, B2, KIISE
[8] "BcN and Home-Network,"Lee J. W., 03/05/2005.
[1] "Ministry of Information and Communication IT893 Strategy", MIC,
2005, http://www.mic.go.kr
[2] Home-Network Security, ITU-T SG17 WP2 Q.9,
[3] "Home-Networked Device Interoperability Guidelines", Members of the
Digital Living Network Alliance (DLNA), June 2004.
[4] "Present Status and Future Development Strategies of Domestic and
Foreign Home-Network Industries,"Home-Network Industry Association,
2005.5
[5] "Policies and Technological Weak Points of Home-Network,"1st
Home-Network Security Workshop, Kim T. G., Institute of Information
Technology Administration, 2004.7.12
[6] "Introduction to the Standard Technology for Digital Home-Network,"
Han. C. M., Park G. N. Korea Telecommunication Technology
Association (TTA), 2004.2
[7] "Threats and Countermeasures against the Invasions in the Ubiquitous
Home-Network Environment,"Yoo D. Y., Kim Y. T., Rho B. G. Korea
Information Security Agency, 2004.10 Jorunal V31, B2, KIISE
[8] "BcN and Home-Network,"Lee J. W., 03/05/2005.
@article{"International Journal of Electrical, Electronic and Communication Sciences:51912", author = "Dong-Young Yoo and Jong-Whoi Shin and Jin-Young Choi", title = "Home-Network Security Model in Ubiquitous Environment", abstract = "Social interest and demand on Home-Network has
been increasing greatly. Although various services are being
introduced to respond to such demands, they can cause serious
security problems when linked to the open network such as Internet.
This paper reviews the security requirements to protect the service
users with assumption that the Home-Network environment is
connected to Internet and then proposes the security model based on
the requirement. The proposed security model can satisfy most of the
requirements and further can be dynamically applied to the future
ubiquitous Home-Networks.", keywords = "Home-Network, Security, Vulnerability, Response,Countermeasure.", volume = "1", number = "12", pages = "1759-4", }