A Study for PKI Based Home Network System Authentication and Access Control Protocol 


Vol. 35,  No. 4, pp. 592-598, Apr.  2010


PDF
  Abstract

A home network system is made up of subject of cyber attack from a variety factors of threatening, but also have security weakness in cases of hacking, vicious code, worm virus, DoS attack, tapping of communication network, and more. So, the necessity for a security protocol to protect user asset and personal information within a home network is gradually increasing. Thus, this paper designs and suggests a home network security protocol using user authentication and approach-control technology to prevent the threat by unauthorized users towards personal information and user asset in advance by providing the gradual authority to corresponding devices based on authorized information, after authorizing the users with a Public Key Certificate.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

Y. Lee, J. Kim, H. Kim, M. Jun, "A Study for PKI Based Home Network System Authentication and Access Control Protocol," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 4, pp. 592-598, 2010. DOI: .

[ACM Style]

Young-Gu Lee, Jung-Jae Kim, Hyun-Chul Kim, and Moon-Seog Jun. 2010. A Study for PKI Based Home Network System Authentication and Access Control Protocol. The Journal of Korean Institute of Communications and Information Sciences, 35, 4, (2010), 592-598. DOI: .

[KICS Style]

Young-Gu Lee, Jung-Jae Kim, Hyun-Chul Kim, Moon-Seog Jun, "A Study for PKI Based Home Network System Authentication and Access Control Protocol," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 4, pp. 592-598, 4. 2010.