Mobile and Ubiquitous Systems: Computing, Networking, and Services. 7th International ICST Conference, MobiQuitous 2010, Sydeny, Australia, December 6-9, 2010, Revised Selected Papers

Research Article

A Study on Security Management Architecture for Personal Networks

Download
416 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-29154-8_36,
        author={Takashi Matsunaka and Takayuki Warabino and Yoji Kishi and Takeshi Umezawa and Kiyohide Nakauchi and Masugi Inoue},
        title={A Study on Security Management Architecture for Personal Networks},
        proceedings={Mobile and Ubiquitous Systems: Computing, Networking, and Services. 7th International ICST Conference, MobiQuitous 2010, Sydeny, Australia, December 6-9, 2010, Revised Selected Papers},
        proceedings_a={MOBIQUITOUS},
        year={2012},
        month={10},
        keywords={Personal Network Mobile Computing Key Sharing},
        doi={10.1007/978-3-642-29154-8_36}
    }
    
  • Takashi Matsunaka
    Takayuki Warabino
    Yoji Kishi
    Takeshi Umezawa
    Kiyohide Nakauchi
    Masugi Inoue
    Year: 2012
    A Study on Security Management Architecture for Personal Networks
    MOBIQUITOUS
    Springer
    DOI: 10.1007/978-3-642-29154-8_36
Takashi Matsunaka1,*, Takayuki Warabino1,*, Yoji Kishi1,*, Takeshi Umezawa2,*, Kiyohide Nakauchi2,*, Masugi Inoue2,*
  • 1: KDDI R&D Laboratories, Inc.
  • 2: The National Institute of Information and Communications Technology
*Contact email: ta-matsunaka@kddilabs.jp, warabino@kddilabs.jp, kishi@kddilabs.jp, umezawa@nict.go.jp, nakauchi@nict.go.jp, inoue@nict.go.jp

Abstract

The authors have studied the security management architecture for Personal Networks (PN). The main feature of the proposed architecture is to exploit a trusted cellular system, namely, an IMS (IP Multimedia Subsystem), to provide security functions for PNs over open networks like the Internet. They also proposed two security functions to solve security issues for a PN, PE ID and Key Assignment (PIKA) function and a PN Key Sharing (PNKS) function. The PIKA function assigns an ID and key to non IMS–compliant devices (Peer Equipment: PE) to authenticate the user of the PE with the assistance of the IMS–compliant terminal (User Equipment: UE). The PNKS function makes it possible for PEs to share a common cipher key (PN Key) in a PN, which is used to protect a PN against eavesdropping on application data.