2009 2nd IFIP Wireless Days (WD) 2009
DOI: 10.1109/wd.2009.5449692
|View full text |Cite
|
Sign up to set email alerts
|

An assisted device registration and service access system for future home networks

Abstract: Abstract-In today's home networks security features are very rare. Infact, the only service that is usually secured is the access to the wireless network. Services, such as video streaming and audio distribution systems, often use the popular UPnP protocol since it provides dynamic service discovery and is supported by the Digital Living Network Alliance (DLNA). However, UPnP implements no security features which is not only a problem for today's services, but especially for future services in future home netw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 6 publications
0
10
0
Order By: Relevance
“…To prove that our system works as expected, the DPWS video streaming solutions as described in [8] serves as a reference example for an application that is built upon DPWS. In our opinion, video/audio streaming is one of the most important applications for future home networks and as bandwidth grows, multi domain scenarios are most likely to appear.…”
Section: Discussionmentioning
confidence: 75%
See 2 more Smart Citations
“…To prove that our system works as expected, the DPWS video streaming solutions as described in [8] serves as a reference example for an application that is built upon DPWS. In our opinion, video/audio streaming is one of the most important applications for future home networks and as bandwidth grows, multi domain scenarios are most likely to appear.…”
Section: Discussionmentioning
confidence: 75%
“…In [8] we proposed a security framework for home networks, which acts as the cornerstone for our approach in this paper. The basic idea is that each home runs a local CA with self-signed certificates and manages all devices, services and users belonging to that home in an automated way.…”
Section: Trust Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…As shown in Figure 1, the key should be given to the trusted helper via a second (secure) channel, such as by phone or in an encrypted e-mail. For this purpose it would be very useful to have an infrastructure in place which allows establishing and maintaining trust relationship between different home networks, such as the one presented in [1] and [12].…”
Section: B Transport Optionsmentioning
confidence: 99%
“…Home and personal area networks have been researched and developed to manage the personal usage of multiple computers [1,2,3,4]. These typically focus on creating secure networks of devices that are co-located either physically or logically, such as on a home wireless network.…”
Section: Introductionmentioning
confidence: 99%