A great majority of the people say that home network s have the potential for creating a high profit industry in future. Home networks are currently growing at a rapid scale thereby improving and facilitating human lives. In the future, it is expected, a home network will consist of many devices connected to the home network to provide diverse services to the home users. But the increasing complexity of services and number of devices connected to the home network, poses a great challenge in terms of maintaining security in home network. This paper aims at introducing a framework or model of information security for home networks. The proposed model uses shared key and a dedicated device to ensure all the devices at home are securely connected to the network. Home Network Security
Introduction
In today's technologically advanced world, we have been surrounded by many devices, resources and information. These devices, resources and pieces of information provide us with numerous interesting and exhilarating opportunities and services. These exciting services are expected expand their scope in the near future, thanks to advent of ubiquitous paradigm in information and communication technology. Presently, a great deal of research and work is being done on the idea of ubiquitous home. There are various functions these diverse devices can provide such as home security, healthcare, home automation and e-learning etc. while being interconnected with each and with the internet (Long, 2005).
These diverse information technologies have certainly helped our lives change in a convenient manner. Moreover, these advancements in technology have made it possible for people to watch movies and enjoy playing game at any time regardless of their physical location. Resultantly, these home networks are expected to go beyond a mere communication networks and will become an indispensable part of our daily lives. The security of home network should, therefore, be very given much importance and must not be neglected as something not worth one's attention. As the people's dependence upon information and communication technology grows, there is increased need of protecting the technology infrastructure from unwanted access in order to maintain one's privacy and prevent any financial, physical or emotional damage to a person that may be caused by security breach in home network (Speed, Ellis, & Korper, 2002).
Since, a security breach in home network could possibly result in the undesired disclosure of sensitive or personal information, comprise of such network would cause various social problems. This paper attempts to present a secure model of home networking using public key cryptography in order to, not secure the home network, but to also allow for multi-home device roaming.
Discussion
Literature Review
As Wakefield (2004) has rightly put it, perfect security in technology is a dream that can never be realized. Individuals, however, can employ adequate security controls that can reduce the risk associated with information technology. There are various threats that are associated with information and communication technologies, most common and most dangerous among them are system penetration threat, identity theft, digital theft, network and intrusion ...