영문목차
Title page=0,1,4
Contents=iii,5,3
List of Figures=vi,8,1
List of Tables=vii,9,1
Abstract=viii,10,2
I. Introduction=1,12,1
1.1 Motivation and Background=1,12,3
1.1.1 Home Network Environments=4,15,1
1.1.2 Security Threats and Requirements for Home Networks=5,16,2
1.2 Research Goals=6,17,3
1.3 Contributions=8,19,7
1.4 Organization=15,26,1
II. A Secure Mobile Agent Protocol for AMR Systems=16,27,2
2.1 Telemetering Service in Home Network Environments=17,28,2
2.2 A Basic Solution=18,29,2
2.3 Secure Mobile Agent Protocol=19,30,2
2.3.1 Mobile Agent Paradigm=20,31,2
2.3.2 Previous Multi-Signature-based Mobile Agent Protocol=21,32,4
2.3.3 Secure Mobile Agent Protocol using Multi-Signature=24,35,6
2.3.4 Security Analysis=29,40,2
2.4 A Multi-Signcryption Scheme=30,41,2
2.4.1 Definitions and Requirements of Multi-Signcryption=31,42,2
2.4.2 Review on Multi-Signcryption Schemes=32,43,4
2.4.3 Flexible and Secure Multi-Signcryption Scheme=35,46,3
2.4.4 Analysis=37,48,5
2.5 Secure Mobile Agent Protocol using Elliptic Curve-based Multi-Signcryption for AMR systems=41,52,2
2.5.1 Registration Procedure=42,53,2
2.5.2 Mobile Agent Creation Procedure=43,54,1
2.5.3 Mobile Agent Execution Procedure=43,54,2
2.5.4 Mobile Agent Arrival Procedure=44,55,2
2.6 Analysis=46,57,1
2.6.1 Security Analysis=46,57,3
2.6.2 Efficiency Analysis=48,59,2
2.7 Summary=49,60,2
III. Delegated User Authentication and Authorization Mechanism=51,62,2
3.1 Mediated Proxy Signature Scheme=53,64,2
3.1.1 Security Requirements and Notations=54,65,2
3.1.2 Review on Time-Stamp-based Proxy Signature Schemes=56,67,2
3.1.3 Mediated Proxy Signature Scheme with Fast Revocation=58,69,4
3.1.4 Analysis=61,72,5
3.2 Provably Secure Mediated Proxy Signature Scheme=65,76,1
3.2.1 A Notion of Mediated Proxy Signature Scheme=65,76,4
3.2.2 Basic Tools=68,79,3
3.2.3 Schnorr-based Mediated Proxy Signature Scheme=71,82,2
3.2.4 Security Proof=72,83,6
3.3 Proxy Signature-based Authentication and Authorization Mechanism for Outdoor Service Access at Home=78,89,1
3.3.1 EEAP-ProxySlGN Packet Format=78,89,6
3.3.2 Proxy Signature-based Authentication and Authorization Mechanism=83,94,9
3.3.3 Security and Performance Analysis=91,102,5
3.4 Password-based Authentication and Authorization Mechanism for Indoor Service Access at Home=96,107,1
3.4.1 EEAP-ProxyPWD Packet Format=96,107,6
3.4.2 Password-based Authentication and Authorization Mechanism=101,112,5
3.4.3 Simulation Results=105,116,4
3.4.4 Security and Performance Analysis=108,119,6
3.5 Summary=113,124,4
IV. A DoS-Resistant One-Time Password-based User Authentication Mechanism=117,128,2
4.1 Security Requirements=118,129,2
4.2 Review on one-Time Password Authentication Schemes=119,130,2
4.2.1 Previous Authentication Scheme for Home Networks=120,131,2
4.2.2 Weaknesses of Previous Scheme=122,133,2
4.3 New One-Time Password-based User Authentication Mechanism=124,135,3
4.4 Analysis of the Proposed Scheme=126,137,1
4.4.1 Security Analysis=126,137,3
4.4.2 Effciency Analysis=128,139,2
4.5 Summary=130,141,1
V. Conclusions=131,142,1
5.1 Summary of Results=131,142,4
5.2 Research Directions=135,146,2
References=137,148,8
[summary in korean]=145,156,3
Fig.1.1: Home network environments=4,15,1
Fig.1.2: Our research goals=7,18,1
Fig.2.1: Home network environments for telemetering service=17,28,1
Fig.2.2: Overview of the proposed protocol=25,36,1
Fig.2.3: Mitomi-Miyaji's scheme=33,44,1
Fig.2.4: Pang-Catania-Tan's scheme=35,46,1
Fig.2.5: Proposed multi-signcryption scheme=37,48,1
Fig.2.6: Overview of the proposed protocol=42,53,1
Fig.3.1: (1) Outdoor service access at home, (2) Indoor service access at home=52,63,1
Fig.3.2: EEAP-ProxySlGN packet format=79,90,1
Fig.3.3: EEAP-ProxySIGN packet format of server authentication phase=79,90,1
Fig.3.4: Flags field format=80,91,1
Fig.3.5: EEAP-ProxySIGN packet format of client authentication phase=81,92,1
Fig.3.6: Flags field format=82,93,1
Fig.3.7: EEAP-ProxyPWD packet format=97,108,1
Fig.3.8: EEAP-ProxyPWD packet format of server authentication phase=98,109,1
Fig.3.9: Flags field format=98,109,1
Fig.3.10: EEAP-ProxyPWD packet format of client authentication phase=99,110,1
Fig.3.11: Flags field format=100,111,1
Fig.3.12: The registration phase=106,117,1
Fig.3.13: The authentication phase=107,118,1
Fig.3.14: The authorization phase=108,119,1
Fig.3.15: The comparison results between RSA and ElGamal=110,121,1
Fig.3.16: The performance time in registration phase=111,122,1
Fig.3.17: The performance time in authentication and authorization phase=112,123,1
Fig.3.18: The performance time in authentication and authorization phase=113,124,1
Fig.3.19: The flow of proxy signature-based authentication and authorization phase=115,126,1
[Fig.3.20: The flow of password-based authentication and authorization phase]=116,127,1
Fig.4.1: Remote control access service at outdoor=118,129,1
Table2.1: Feature and security comparisions=38,49,1
Table2.2: Efficiency comparisions=40,51,1
Table3.1: Efficiency comparisions=63,74,1
Table4.1: Performance evaluations our scheme=128,139,1