A Novel Multi-factor Authentication Protocol for Smart Home Environments

被引:8
|
作者
Nimmy, K. [1 ]
Sankaran, Sriram [1 ]
Achuthan, Krishnashree [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, Ctr Cybersecur Syst & Networks, Amritapuri, Kollam, India
来源
关键词
Mutual authentication; PRNU; Secret sharing Smart home; IoT; ECC; SECURITY;
D O I
10.1007/978-3-030-05171-6_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication plays an important role in smart home environments in which devices are interconnected through the Internet and security risks are high. Most of the existing research works for remote user authentication in smart homes fail in one way or the other in combating common attacks specifically smartphone capture attack. Robust authentication method which can uniquely identify the smartphones of users can thwart unauthorized access through the physical capture of smartphones. Existing studies demonstrate that Photo Response Non-Uniformity (PRNU) of a smartphone can be used to uniquely identify the device with an error rate less than 0.5%. Based on these results, we propose a multi-factor user authentication protocol based on Elliptic Curve Cryptography (ECC) and secret sharing for smart home environments. We leverage face biometric and PRNU to make it resilient to common attacks. Moreover, the proposed protocol achieves mutual authentication among all participating entities and thereby ensures the legitimacy of all the participating entities. Subsequently, a session key is established for secure communication between the users and the devices. Our analysis of the proposed protocol shows that it provides significantly better security than the existing schemes with a reasonable overhead. In addition, it provides better usability by alleviating the burden of users from memorizing passwords and carrying additional mechanisms such as smart cards.
引用
收藏
页码:44 / 63
页数:20
相关论文
共 50 条
  • [31] Chaotic map based multi-factor authentication protocol for underwater environment monitoring
    Diksha Rangwani
    Hari Om
    Multimedia Tools and Applications, 2024, 83 (9) : 26871 - 26900
  • [32] Efficient and Flexible Multi-Factor Authentication Protocol Based on Fuzzy Extractor of Administrator's Fingerprint and Smart Mobile Device
    Mohammed, Alzahraa J.
    Yassin, Ali A.
    CRYPTOGRAPHY, 2019, 3 (03) : 1 - 222
  • [33] Chaotic map based multi-factor authentication protocol for underwater environment monitoring
    Rangwani, Diksha
    Om, Hari
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (09) : 26871 - 26900
  • [34] A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System
    Chaudhary, Ravi Raushan Kumar
    Chatterjee, Kakali
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (04) : 1975 - 1992
  • [35] Database Multi-factor Authentication via Pluggable Authentication Modules
    Hamilton, Cameron
    Olmstead, Aspen
    2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 367 - 368
  • [36] Continuous authentication for IoT smart home environments
    Smith-Creasey M.
    Furnell S.
    Rajarajan M.
    Network Security, 2022, 2022 (04)
  • [37] A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System
    Ravi Raushan Kumar Chaudhary
    Kakali Chatterjee
    Peer-to-Peer Networking and Applications, 2023, 16 : 1975 - 1992
  • [38] Multi-factor authentication using threshold cryptography
    1694, Institute of Electrical and Electronics Engineers Inc., United States
  • [39] Internet Banking Login with Multi-Factor Authentication
    Boonkrong, Sirapat
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (01): : 511 - 535
  • [40] Multi-Factor Authentication in Key Management Systems
    de Souza, Rick Lopes
    Lung, Lau Cheuk
    Custodio, Ricardo Felipe
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 746 - 752