Method to Verify the Validity of Device in a Home Network

홈 네트워크에서 디바이스의 유효성 검증 방법

  • Published : 2006.06.01


With a home network, a device can dynamically join a home network obtain an IP address, convey its capabilities, and learn about the presence and capabilities of other devices. Devices can subsequently communicate with each other directly. Device discovery protocol defines how network services can be discovered on the network. In this paper, we propose the secure discovery method of devices that uses mutual authentication with symmetric key between devices. This method that we present distributes symmetric-key to home network devices by the home server. Using this key, mutual authentication is performed between home appliances. It enables any appliance under any middleware's control to securely communicate any other appliances.


  1. F. Zhu, M. Mutka, and L. Ni, 'Classification of Service Discovery in Pervasive Computing Environments,' Institution Michigan State University, MSUCSE-02-24, 2002
  2. Guttman, E. Perkins, c., Veizades, J., and Day, M. 'Service Location Protocol, V.2', Internet Engineering Task Force (IETF), RFC 2608
  3. Microsoft. 'Universal Plug and Play Architecture, V1.0', Jun 8, 2000
  4. Ken Arnold et al. 'The Jini Specification, V1.0', Addison-Wesley 1999. Latest version is 1.1
  5. Dabrowski, C. and Mills, K. 'Analyzing Properties and Behavior of Service Discovery Protocols Using an Architecture-Based Approach', Proceedings of Working Conference on Complex and Dynamic Systems Architecture, Brisbane, Australia, Dec 2001
  6. W. Stallings, Cryptography and Network Security: Principles and Practice, 2nd ed, Prentice Hall, 1998
  7. 'Salutation Architecture Specification,' Salutation Consortium, Version 2.0c, June 1, 1999
  8. P. Dobrev, D. Famolari, C. Kurzke, and B.A. Miller, Device and Service Discovery in Home Networks with OSGi, IEEE Commun. Mag. August 2002, pp 86-92
  9. 'Specification of the Bluetooth System, Version 1.2, Vo1.3, Part B: Service Discovery Protocol(SDP),' 2003
  10. F. Zhu, M. Mutka, and L. Ni, 'Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services', in Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (Percom'03). IEEE Computer Society, Mar. 2003, pp. 235 - 242
  11. Carl M. Ellison, 'Home Network Security', Intel Technology Journal, 2002
  12. Guoyou He, 'Requirements for Security in Home Environments', Residential and Virtual Home Environments Seminar on Internetworking, Spring 2002