HOTP-Based User Authentication Scheme in Home Networks | SpringerLink
Skip to main content

HOTP-Based User Authentication Scheme in Home Networks

  • Conference paper
Advances in Information Security and Assurance (ISA 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5576))

Included in the following conference series:

Abstract

Home networks are one of the focused areas of research these days. One of the important services that home networks provide is to remotely control home appliances in home network. However, the remote control service causes home networks to have various security threats. Hence, home networks should provide strong security services, especially remote user authentication. In this paper, we provide an efficient solution for authentication scheme to provide secure remote access in home network environments. Our proposed scheme uses HMAC-based one-time password algorithm for the user authentication in home networks. The proposed scheme is not only has several advantage features but also is quite satisfactory in terms of the security requirements of home networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 11439
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 14299
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Schulzrinne, H., Xiaotao, W., Sidiroglou, S., Berger, S.: Ubiquitous computing in home networks. IEEE Communications Magazine 41(11), 128–135 (2003)

    Article  Google Scholar 

  2. Saito, T., Tomoda, I., Takabatake, Y., Arni, J., Teramoto, K.: Home gateway architecture and its implementation. IEEE Transactions on Consumer Electronics 46(4), 1161–1166 (2000)

    Article  Google Scholar 

  3. Choi, K.S., Lim, S.O., Park, Y.C., Jung, K.M.: Home station, novel architecture of home gateway and its implementations. In: Proc. of the 4th WSEAS International Conference on Applied Informatics and Communications (AIC 2004) (2004)

    Google Scholar 

  4. Ise, M., Ogasahara, Y., Watanabe, K., Hatanaka, M., Onoye, T., Niwamoto, H., Keshi, I., Shirakawa, I.: Design and Implementation of Home Network Protocol for Appliance Control Based on IEEE 802.15.4. IJCSNS International Journal of Computer Science and Network Security 7(7), 20–30 (2007)

    Google Scholar 

  5. Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11), 770–772 (1981)

    Article  MathSciNet  Google Scholar 

  6. Das, M.L., Saxena, A., Gulati, V.P.: A Dynamic ID-based Remote User Authentication Scheme. IEEE Transactions on Consumer Electronics 50(2), 629–631 (2004)

    Article  Google Scholar 

  7. Haller, N., Metz, C., Nesser, P., Straw, M.: A One-Time Password System. IETF RFC 2289 (February 1998)

    Google Scholar 

  8. Yeh, T.C., Shen, H.Y., Hwang, J.J.: A Secure One-Time Password Authentication Scheme Using Smart Cards. IEICE Transaction on Communication E85-B(11), 2515–2518 (2002)

    Google Scholar 

  9. Tsuji, T., Shimizu, A.: One-time password authentication protocol against theft attacks. IEICE Transactions on Communications E87-B(3), 523–529 (2004)

    Google Scholar 

  10. Wang, N.W., Huang, Y.M.: User’s Authentication in Media Services by using One-Time Password Authentication Scheme. In: Proc. of the 3rd International Conference on International Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), vol. 01, pp. 623–626 (2007)

    Google Scholar 

  11. Jeong, J., Chung, M.Y., Choo, H.: Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks. In: Proc. of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008) (January 2008)

    Google Scholar 

  12. M’Raihi, D., Bellare, M., Hoornaert, F., Naccache, D., Ranen, O.: HOTP: An HMAC-Based One-Time Password Algorithm. IETF RFC 4226 (December 2005)

    Google Scholar 

  13. Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-Hashing for Message Authentication. IETF RFC 2104 (February 1997)

    Google Scholar 

  14. Wu, S.T., Chieu, B.C.: A user friendly remote authentication scheme with smart cards. Computers and Security 22(6), 547–550 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vaidya, B., Park, J.H., Rodrigues, J.J.P.C. (2009). HOTP-Based User Authentication Scheme in Home Networks. In: Park, J.H., Chen, HH., Atiquzzaman, M., Lee, C., Kim, Th., Yeo, SS. (eds) Advances in Information Security and Assurance. ISA 2009. Lecture Notes in Computer Science, vol 5576. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02617-1_68

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02617-1_68

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02616-4

  • Online ISBN: 978-3-642-02617-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics