Boston, 08/2004
Securing Home Networks Securing Home Networks protocols protocols A ASWN’04
SWN’04
- K. MASMOUDI,
- K. MASMOUDI,
- H. AFIFI
- H. AFIFI
Securing Home Networks Securing Home Networks protocols protocols - - PowerPoint PPT Presentation
Securing Home Networks Securing Home Networks protocols protocols A SWN04 A SWN04 K. MASMOUDI, K. MASMOUDI, H. AFIFI H. AFIFI Boston, 08/2004 6 th PCRD Integrated Project Goal : provide secure communication
Boston, 08/2004
2 Boston, 08/2004
3 Boston, 08/2004
4 Boston, 08/2004
5 Boston, 08/2004
6 Boston, 08/2004
7 Boston, 08/2004
SIP UA SIP server (registrar and proxy) SIP UA Location Server
8 Boston, 08/2004
9 Boston, 08/2004
10 Boston, 08/2004
11 Boston, 08/2004
12 Boston, 08/2004
13 Boston, 08/2004
14 Boston, 08/2004
15 Boston, 08/2004
16 Boston, 08/2004
R G
Public network Public network Provider domain Carrier domain Home network domain Interactions
17 Boston, 08/2004
18 Boston, 08/2004
R G
Public network Public network Provider domain Carrier domain Home network domain Interactions
19 Boston, 08/2004
Residential gateway Device
Exchange nonces and authentication through signature Request access Device located Pre-master secret enc. With RG public key
Session keys generation and distibution Session encrypted key 1 Session encrypted key 2
20 Boston, 08/2004
Residential gateway Device
Exchange nonces and authentication through signature Request access Device located
Session keys generation and distibution Session encrypted Control for DOS
21 Boston, 08/2004
www www-
verimag.imag.fr/~Liana.Bozga/eva/hermes.php erimag.imag.fr/~Liana.Bozga/eva/hermes.php
BadPatterns BadPatterns: : Vide Vide GoodPatterns GoodPatterns: : { {xs}_PK(h xs}_PK(h); ); { {xs}_Ka xs}_Ka; ; { {xs}_shr(h,h xs}_shr(h,h) ) Secrets: Secrets: SK(h SK(h); Ka; ); Ka; shr(h,h shr(h,h); (h ); (h represent a represent a Principal Principal) )
22 Boston, 08/2004
Scenario Policy 1 Policy 2 Policy 2 Security protocol A Security protocol B Security protocol C Security protocol A Security protocol B Security protocol C Security protocol A Security protocol B Security protocol C
User requirements