Abstract: In this paper we describes the authentication for DHCP
(Dynamic Host Configuration Protocol) message which provides the
efficient key management and reduces the danger replay attack without
an additional packet for a replay attack. And the authentication for
DHCP message supports mutual authentication and provides both
entity authentication and message authentication. We applied the
authentication for DHCP message to the home network environments
and tested through a home gateway.
Abstract: The home in these days has not one computer connected to the Internet but rather a network of many devices within the home, and that network might be connected to the Internet. In such an environment, the potential for attacks is greatly increased. The general security technology can not apply because of the use of various wired and wireless network, middleware and protocol in digital home environment and a restricted system resource of home information appliances. To offer secure home services home network environments have need of access control for various home devices and information when users want to access. Therefore home network access control for user authorization is a very important issue. In this paper we propose access control model using RBAC in home network environments to provide home users with secure home services.
Abstract: As various mobile sensing technologies, remote
control and ubiquitous infrastructure are developing and expectations
on quality of life are increasing, a lot of researches and developments
on home network technologies and services are actively on going,
Until now, we have focused on how to provide users with high-level
home network services, while not many researches on home network
security for guaranteeing safety are progressing. So, in this paper, we
propose an access control model specific to home network that
provides various kinds of users with home network services up one-s
characteristics and features, and protects home network systems from
illegal/unnecessary accesses or intrusions.
Abstract: Powerline Communications –PLC– as an alternative
method for broadband networking, has the advantage of transmitting
over channels already used for electrical distribution or even
transmission. But these channels have been not designed with usual
wired channels requirements for broadband applications such as
stable impedance or known attenuation, and the network have to
reject noises caused by electrical appliances that share the same
channel. Noise control standards are difficult to complain or simply
do not exist on Latin-American environments. This paper analyzes
PLC throughput for home connectivity by probing noisy channel
scenarios in a PLC network and the statistical results are shown.
Abstract: Optical 1x12 fused-taper-twisted polymer optical fiber (POF) couplers has been fabricated by a perform technique. Characterization of the coupler which proposed to be used in passive night vision application to tracking a blind sport area was reported. During the development process of fused-taper-twisted POF couplers was carried out, red LED fully utilized to be injected into the couplers to test the quality of fabricated couplers. Some characterization parameters, such as optical output power, POFs attenuation characteristics and power losses on the network were observed. The maximum output power efficiency of the coupler is about 40%, but it can be improved gradually through experience and practice.
Abstract: Two completely different approaches for a Gigabit
Ethernet compliant stream transmission over 50m of 1mm PMMA SI-POF have been experimentally demonstrated and are compared in this paper. The first solution is based on a commercial RC-LED
transmission and a careful optimization of the physical layer architecture, realized during the POF-PLUS EU Project. The second solution exploits the performance of an edge-emitting laser at the
transmitter side in order to avoid any sort of electrical equalization at the receiver side.
Abstract: Security has been an important issue and concern in the
smart home systems. Smart home networks consist of a wide range of
wired or wireless devices, there is possibility that illegal access to
some restricted data or devices may happen. Password-based
authentication is widely used to identify authorize users, because this
method is cheap, easy and quite accurate. In this paper, a neural
network is trained to store the passwords instead of using verification
table. This method is useful in solving security problems that
happened in some authentication system. The conventional way to
train the network using Backpropagation (BPN) requires a long
training time. Hence, a faster training algorithm, Resilient
Backpropagation (RPROP) is embedded to the MLPs Neural
Network to accelerate the training process. For the Data Part, 200
sets of UserID and Passwords were created and encoded into binary
as the input. The simulation had been carried out to evaluate the
performance for different number of hidden neurons and combination
of transfer functions. Mean Square Error (MSE), training time and
number of epochs are used to determine the network performance.
From the results obtained, using Tansig and Purelin in hidden and
output layer and 250 hidden neurons gave the better performance. As
a result, a password-based user authentication system for smart home
by using neural network had been developed successfully.
Abstract: The next stage of the home networking environment is
supposed to be ubiquitous, where each piece of material is equipped
with an RFID (Radio Frequency Identification) tag. To fully support
the ubiquitous environment, home networking middleware should be
able to recommend home services based on a user-s interests and
efficiently manage information on service usage profiles for the users.
Therefore, USN (Ubiquitous Sensor Network) technology, which
recognizes and manages a appliance-s state-information (location,
capabilities, and so on) by connecting RFID tags is considered. The
Intelligent Multi-Agent Middleware (IMAM) architecture was
proposed to intelligently manage the mobile RFID-based home
networking and to automatically supply information about home
services that match a user-s interests. Evaluation results for
personalization services for IMAM using Bayesian-Net and Decision
Trees are presented.
Abstract: This paper proposes a power-controlled scheduling scheme for devices using a directional antenna in smart home. In the case of the home network using directional antenna, devices can concurrently transmit data in the same frequency band. Accordingly, the throughput increases compared to that of devices using omni-directional antenna in proportional to the number of concurrent transmissions. Also, the number of concurrent transmissions depends on the beamwidth of antenna, the number of devices operating in the network , transmission power, interference and so on. In particular, the less transmission power is used, the more concurrent transmissions occur due to small transmission range. In this paper, we considered sub-optimal scheduling scheme for throughput maximization and power consumption minimization. In the scheme, each device is equipped with a directional antenna. Various beamwidths, path loss components, and antenna radiation efficiencies are considered. Numerical results show that the proposed schemes outperform the scheduling scheme using directional antennas without power control.