Research Article
A Study on Security Management Architecture for Personal Networks
@INPROCEEDINGS{10.1007/978-3-642-29154-8_36, author={Takashi Matsunaka and Takayuki Warabino and Yoji Kishi and Takeshi Umezawa and Kiyohide Nakauchi and Masugi Inoue}, title={A Study on Security Management Architecture for Personal Networks}, proceedings={Mobile and Ubiquitous Systems: Computing, Networking, and Services. 7th International ICST Conference, MobiQuitous 2010, Sydeny, Australia, December 6-9, 2010, Revised Selected Papers}, proceedings_a={MOBIQUITOUS}, year={2012}, month={10}, keywords={Personal Network Mobile Computing Key Sharing}, doi={10.1007/978-3-642-29154-8_36} }
- Takashi Matsunaka
Takayuki Warabino
Yoji Kishi
Takeshi Umezawa
Kiyohide Nakauchi
Masugi Inoue
Year: 2012
A Study on Security Management Architecture for Personal Networks
MOBIQUITOUS
Springer
DOI: 10.1007/978-3-642-29154-8_36
Abstract
The authors have studied the security management architecture for Personal Networks (PN). The main feature of the proposed architecture is to exploit a trusted cellular system, namely, an IMS (IP Multimedia Subsystem), to provide security functions for PNs over open networks like the Internet. They also proposed two security functions to solve security issues for a PN, PE ID and Key Assignment (PIKA) function and a PN Key Sharing (PNKS) function. The PIKA function assigns an ID and key to non IMS–compliant devices (Peer Equipment: PE) to authenticate the user of the PE with the assistance of the IMS–compliant terminal (User Equipment: UE). The PNKS function makes it possible for PEs to share a common cipher key (PN Key) in a PN, which is used to protect a PN against eavesdropping on application data.