2 OPERATION OF HOME
NETWORKS
The use of wireless technologies in home networks
is dominant. But, most users are not aware of the
possible threats and problems associated with their
wireless home network. A secure authentication sys-
tem would help reducing some of the risks. Wire-
less access points are often not secured, or use the
compromised Wired Equivalent Privacy (WEP) pro-
tocol(Borisov et al., ). Industrial grade solutions ad-
dress security for wireless networks through the IEEE
802.11x standard for authentication or IEEE 802.11i.
The use and management of these technologies re-
quires high competence, which is not usual in the
home area.
Because of the security problems associated with
medium access in home networks, it has a big proba-
bility, that an intruder will get access to the network.
In addition of the access control, current operating
systems provide the possibility of using some kind of
access restriction, for example either based on file or
share basis. This can provide an additional line of de-
fence.
On the Local Area Network (LAN), most of the
content is accessible without additional authentica-
tion. If a guest arrives, the user grants access to his
home network to show some content over the termi-
nal of the guest. While access to the network for
internet access might be acceptable, granting access
also opens possibilities for content access. Getting an
external user into the home network means to loose
control over which content the guest can access, and
be vulnerable to malicious attacks from the visitors
devices. This can be also done by trojans, which are
malicious even if the guest is unaware of its presence.
This paper proposes a solution in the form of a
right management infrastructure for home networks.
This service enables access right definition on user
content. With rights associated, content access is not
defined by the current place or network of the user,
but on the credentials, which are owned by him.
With such an infrastructure, the user can grant net-
work access to a guest without compromising his own
content stored on the network. Also, if the medium
access protection fails, this solution operates as a sec-
ond line of defence. The problem is, that with such a
system, all devices have to support this service. With
more and more entertainment devices connected, this
is a hard problem.
Entertainment devices usually have limited com-
puting capability, thus they might be supported
through a specific network device which is able to
carry out complex cryptographic operations and ex-
change the generated information with other parties
using a secure and easy method. A solution to com-
putational problems and trusted devices could be to
deploy smartcard based authentication in the home
environment(Pujolle et al., 2003).
In (Popescu et al., 2006) a rights management so-
lution is proposed, which is based on device domains.
These domains can be formed from the devices in the
LAN, and also can have members from external net-
works. Mobility can be addressed with secured trans-
port protocols to provide secure and easy access to
home content from the Internet side. This proposal
lacks a device, which can be used for easy and secure
key generation. In (Pujolle et al., 2003) a smartcard
based solution is shown for WLAN authentication.
Because of the expenses associated with deploy-
ing a smartcard infrastructure, we propose to have
only one smartcard in the system, which can exchange
the corresponding keys with the other terminals via a
contactless interface.
3 AUTHENTICATION AND KEY
MANAGEMENT
To keep the advantage of a tamper resistant cryptog-
raphy device, and ensure low cost, we propose to use
the mobile phone’s SIM to calculate and the phone
hardware to distribute keys for devices.
Currently, vast majority of the potential users al-
ready have SIM cards in their pockets. The phone
is becoming a permanent part of the user’s personal
area. In many cases the handset is already part of the
user’s identity, because of it’s services, look and im-
portant role in social connections. Because of it’s im-
portance, they are taking care of it, since it holds a
great deal of social and personal information.
According to (ETSI, 2005) it could be possible to
use the SIM as a fully featured smartcard as the SIM is
capable of storing keys and providing cryptographic
functions for third party services, not only for mobile
providers.
Setting up a secure network may be problematic,
since keys have to be transmitted and devices have to
authenticate themselves. This may be done by using
out-of-band key delivery methods (like using an USB
stick or in an SMS via the mobile network). Even if
the user is able to do this process, convenience con-
siderations might cause him to neglect security. Also,
currently, the user may decide to grant access or not,
but inside the network it is extremely rare to use some
kind of additional access restriction. This means, that
either no access is given or the guest can access prac-
tically all network resources.
SECRYPT 2007 - International Conference on Security and Cryptography
108