Dynamic Forest of Random Subsets-based supervised hash signature scheme for secure user authentication in smart home environment

被引:0
作者
Sudha, K. Swapna [1 ]
Jeyanthi, N. [1 ]
机构
[1] VIT, Sch Informat Technol & Engn, Vellore Campus, Vellore, Tamil Nadu, India
关键词
Internet of things (IoT); security; smart home authentication; supervised hash signature; supervised learning; IOT; INTERNET;
D O I
10.1002/cpe.6302
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The advent of information and communication technology has revolutionized the application of smart home through which the residents remotely establish superior control over the smart devices. The users and the smart devices interact over an insecure communication channel that may help an illegitimate user to gain access on the data disseminated by the smart devices, resulting in high exploiting attacks like privileged insider attack, smart device and gateway node impersonation attack, and smart node capture attack in the smart home. Thus, a secure remote authentication scheme that permits only legitimate users to gain access to the smart devices based on supervised learning becomes essential. In this article, Dynamic Forest of Random Subsets-based supervised hash signature (DFORS-SHS) scheme is proposed for robust user authentication in smart homes. This proposed DFORS-SHS scheme concurrently performs the signed generation of random subsets such that each element of a signature is used for the generation of successive random subset elements for authentication. It utilized the strength of revealed secret keys through chaining approach that bundles the random subset generation and signature. This supervised learning approach only permits the signer of the original message to potentially generate a random subset and prevents the malicious intruder from gaining the access of the smart devices. The formal verification and the security investigation of the proposed DFORS-SHS scheme are conducted using the Burrows-Abadi-Needham (BAN) and AVIPSA toolkit for determining communication cost, communication time, computation time, and energy consumptions incurred during the authentication process. It can be stated that, the communication cost and storage costs of the proposed DFORS-SHS scheme was also identified to be comparatively minimized than the baseline smart home authentication schemes.
引用
收藏
页数:16
相关论文
共 35 条
  • [1] Agrawal D, 2020, COMPANION 2020 ACM I, V2, P34
  • [2] Al-Mutawa Rihab Fahd, 2020, International Journal of Advanced Computer Science and Applications, V11, P260
  • [3] Ashibani Y., 2017, P 2017 14 IEEE ANN C, V2, P56
  • [4] Session-Key Establishment and Authentication in a Smart Home Network Using Public Key Cryptography
    Dey, Shreya
    Hossain, Ashraf
    [J]. IEEE SENSORS LETTERS, 2019, 3 (04)
  • [5] A Survey of Internet of Things (IoT) Authentication Schemes
    El-hajj, Mohammed
    Fadlallah, Ahmad
    Chamoun, Maroun
    Serhrouchni, Ahmed
    [J]. SENSORS, 2019, 19 (05)
  • [6] Anomaly Detection, Analysis and Prediction Techniques in IoT Environment: A Systematic Literature Review
    Fahim, Muhammad
    Sillitti, Alberto
    [J]. IEEE ACCESS, 2019, 7 : 81664 - 81681
  • [7] Secure remote anonymous user authentication scheme for smart home environment
    Fakroon, Moneer
    Alshahrani, Mohammed
    Gebali, Fayez
    Traore, Issa
    [J]. INTERNET OF THINGS, 2020, 9
  • [8] Secure key agreement for multi-device home IoT environment
    Garg, Akash
    Lee, Taehee
    [J]. INTERNET OF THINGS, 2020, 11
  • [9] Gebrie MT., 2017, P 11 EUR C SOFTW ARC, V3, P12
  • [10] SoftAuthZ: A Context-Aware, Behavior-Based Authorization Framework for Home IoT
    Ghosh, Nirnay
    Chandra, Saket
    Sachidananda, Vinay
    Elovici, Yuval
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06) : 10773 - 10785