www.softforum.co Home Network Security and PKI Role



Similar documents
Management Architecture and Distribution Framework for Home Network Services

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Firewalls for small business

Mobile Office Security Requirements for the Mobile Office

Connecting to the Internet. LAN Hardware Requirements. Computer Requirements. LAN Configuration Requirements

Exam Name: Cisco Sales Associate Exam Exam Type: Cisco Exam Code: Doc Type: Q & A with Explanations Total Questions: 50

Secure your Privacy. jrsys, Inc. All rights reserved.

Wireless Networking for Small Businesses, Branches and Home Offices

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

Avaya G700 Media Gateway Security - Issue 1.0

Avaya TM G700 Media Gateway Security. White Paper

The Ubiquitous Web, UPnP and Smart Homes

Configuring a customer owned router to function as a switch with Ultra TV

6 Steps to SIP trunking security. How securing your network secures your phone lines.

Security Policy JUNE 1, SalesNOW. Security Policy v v

Security Design.

How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph

Security Issues with Integrated Smart Buildings

Human Factors in Information Security

SpiderCloud E-RAN Security Overview

Introduction of Information Security Research Division

By David G. Holmberg, Ph.D., Member ASHRAE

Setting Up Your Wireless Network

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Public Key Infrastructure (PKI)

Windows Web Based VPN Connectivity Details & Instructions

Trends of Interactive TV & Triple Play

AT&T Digital Life. Home Security and Automation Service. Overview. Service Innovation EXECUTIVE SUMMARY

Introduction to Computer Networks and Data Communications

EMBEDDED MAJOR PROJECTS LIST

Brochure Achieving security with cloud data protection. Autonomy LiveVault

Principles of ICT Systems and Data Security

Required changes to Table 6 2 in FIPS 201

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

IPv6 over Power Line for the Digital Home

High Speed Internet - User Guide. Welcome to. your world.

Wireless (Select Models Only) User Guide

Current and Future Research into Network Security Prof. Madjid Merabti

Internet Privacy Options

Quick Installation Guide of WLAN Broadband Router

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Jrsys International Corp.

Synology QuickConnect

Cornerstones of Security

Port Forwarding for CCTV. How to See Video Offsite

Evaluate the Usability of Security Audits in Electronic Commerce

How to connect to the Middle Country Public Library Wireless Network (mcpl-ap) using Windows XP

Wireless Ethernet LAN (WLAN) General a/802.11b/802.11g FAQ

User Guide. Version 3.0 April 2006

Home networking Home automation. EASY & VALUE = MASS The business case is there Mark B.M. Ossel

Security Systems. Scenarios

Machine control going www - Opportunities and risks when connecting a control system to the Internet

Samsung SDS. Fast IDentity Online

MAC Web Based VPN Connectivity Details and Instructions

Enterprise A Closer Look at Wireless Intrusion Detection:

Sweex Wireless BroadBand Router + 4 port switch + print server

Secure Substation Automation for Operations & Maintenance

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

R&S IP-GATE IP gateway for R&S MKS9680 encryption devices

Telework and Remote Access Security Standard

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

Low Cost Home Security Options. Jim Niehaus October 9, 2012

Cisco Advanced Services for Network Security

Hardware/Software Deployment Strategies. Introduction to Information System Components. Chapter 1 Part 4 of 4 CA M S Mehta, FCA

TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Authentication Levels. White Paper April 23, 2014

White Paper Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012

SHORT MESSAGE SERVICE SECURITY

MDI FAQ. Version 8.1.0a Page 1 of 16

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

ViSolve Open Source Solutions

How To Set Up & Manage an IPTV System WHITE PAPER

HControl offers you not One, nor Two, or even Three but Four vital home services with our exclusive Smart Home System.

CHAPTER 1 INTRODUCTION

WLAN660 Wireless IP Phone Administrator s Guide

Description of system

Security Policy Revision Date: 23 April 2009

Address Resolution Protocol (ARP)

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

That Point of Sale is a PoS

Go Wireless. Open up new possibilities for work and play

IT - General Controls Questionnaire

E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing

What is an SSL Certificate?

Security Goals Services

Secure Use of the New NHS Network (N3): Good Practice Guidelines

Transcription:

Home Network Security and PKI Role

Definition of Home Network at is considered Home Network here? ome Network is the network where all digitalized appliances are connected -By networking home devices provide home automations and user convenience -Examples of Home Networking Items -Turning on the Heating/Air Conditioning System using cell phone prior to arrival -Centralizing the lighting system and able to program using home PC -Locking and Unlocking windows, rooms, garage and main entrance -Monitoring motion sensors or video surveillance -Online banking or credit card payment on TV set top box during home shopping -Recording a favorite TV programs away from home using phone or internet -Activate and control robotic vacuum cleaners over internet or wireless device -Managing utility (Electric, Gas etc) usage and control for maximize energy savings -More..

Home Network Structure Cable/Wireless Area Community Area al Broadcasting P.P Residential Management System (RMS) INTERNET CDMA 2000 1X, 1x EV-DO, W- CDMA Portable Internet Telematics LAN Wireles s Cable Service Home Network Server Fiber Application Server xdsl Home Gateway Resident Area PLC HomeRF IrDA (Infrared) Ethernet IEEE1394 (Direct Cable Etc. House Appliance AV & Entertainment Wireless Cyber Home PC & Office Device Core Network Home Gateway Home Network Net Terminal

Home Network Technology

Home Network Standard ome Network Standards in the area of Home Server, Middleware standard, and communication protocol. Home Server/ Home Gateway Middleware Communication Protocol

Central Hub Home GW Existing Service Home Gateway Service Voice Telecom Phone Internet ISP Modem/PC Cable TV CATV Set top/tv Security Service Security Co CCTV Telecom ISP CATV Appliance Security Co Home Gateway Phone PC TV CCTV

Home Network Security Issue Issue Question Figure onfidentiality Can someone else view my video surveillance? Can someone else listening my communication? Figure Solution Encryption/ Decryption ntegrity Can someone alter my TV internet election vote decision? Can someone send me the incorrect billing? Digital Signature uthentication Can someone else login to my home network? Is the person I m communicating with is the right person? Certificate onepudiation All actions must have evidence and should be non-repudiated Digital Signature igital Rights anagement Digital rights to contents. How to protect piracy? DRM

Home Network Security Example Security Threat Security hole in Home Automation can threaten financial status and privacy of networked homes. -DOS attack on Home Gateway must be prevented to protect valuable assets or information Secure Solution To prevent attacker, following items can be applied Channel Encryption between User& Home Gatewa Certificate based Home Gateway Home Gateway Detection or avesdropping DOS Attack to obtain authorization Firewall Certificate based Attacker Obtain access to Security alarm, Home control Unable to intercept

Home Network Secured Area rvice Provider/External Network Service User/Internal Network Digital Phone Co. Signature User ISP thentication CATV Appliance Co. Security Co. User Firewall Residential Gateway Phone PC DTV Alarm User Authentic Digital Signature Digital Signature Banks Mall A/V DRM Broadcasting INTERNET

Home Network Application Overview RMS is important gateway for flowing of information from external source to internal home appliances. All information passing through RMS must be secured from unwanted forces. RMS Security Advantage Authenticate all users connecting to RMS Authorization to G/W and privileged services Apply encryption to sensitive information RMS can be provided by service provider such as ISP, Cable TV operator or it can be located on residential community RMS Users Telephone Browser Internet User Information Control Information Control Information Residential Gateway PC DTV (IP Set top) WallPad Appliance

Sectional Security Requirements Section Application Applied Security Description WEB RMS (Residential Management System) Authenticate Home Network Users Client/Server Security Secured data communication between RMS and Web browser/pda End-to-End security Certificate based user/server authentication Based on user profile, authorization to connect to Home gateway RMS G/W Home Automation server Service or Content Server/GW Secure G/W Data Encryption between RMS and G/W RMS verifies secure G/W and G/W verifies correct RMS. Contents or Service authorization and authentication Example of content payments Appliance /GW Based on security protocol, apply secure encryption Appliance & G/W mutual authentication G/W Appliances Wireless Access EAP-TLS/Biometric ID/Password based Certificate based mutual authentication Biometric authentication For example, low usage such as Bluetooth can use ID/Pwd mutual authentication Appliance External For services without RMS User/Server Auth Provide Encryption Library to various Middleware protocols User

PKI Role in Home Networking Either from Home to Outside or Outside to Home, all authentication is forced to present certificates. Certificate Usage Limitation to certificate management : Difficult to manage certificate to digitalized home appliances. It would be recommended to store certificate to home PC or IT-STB to roaming it around the appliances whenever necessary. Home Security Manager tool is required to manage certificate usage Public CA Gateway IP-STB Internet Public Private CA Private

PKI Role in Home Networking HSM (Home Security Manager) is security tool to manage home network area such as public certificate management, roaming of certificate, private certificate issuing & management, and electronic wallet management etc. HSM Features Appliance Search: Able to search appliances with Home Security Agent such as Home Gateway, D-TV, IP-STB etc Electronic Wallet Management : Wallet View/Edit, Wallet Roaming. Certificate Management : Public Certificate Roaming, Certificate PWD Management, Generating Private certificate Authorization Management : Access Control Data Security : Elec. Wallet on the appliances or content encryption and protection Supported Appliance : RGW, IP-STB, DTV-STB, REF, LNDRY, LIGHT, CAM, DOOR, SVR etc. Appliance Manufacturer : ICROSS, SNET, IBRIGE, COMMAX, SAMSUNG HEAVY INDUSTRY etc (more to come) Home Security Manager Main Screen PC Certificate or electronic wallet management via PC etc. Automatic control of home network appliances Send HSA : Home Security Agent HSM : Home Security Manager www.softforum.co