Scalable, password-based and threshold authentication for smart homes

被引:5
作者
Huszti, Andrea [1 ]
Kovacs, Szabolcs [2 ]
Olah, Norbert [1 ]
机构
[1] Univ Debrecen, Fac Informat, Debrecen, Hungary
[2] Univ Debrecen, Fac Informat, CCLab Ltd, Debrecen, Hungary
关键词
Authenticated key agreement; End-to-end security; Distributed system; Edge; Smart home; Internet of Things; Bilinear map; AVISPA; KEY EXCHANGE; PROTOCOL INSECURITY; SECURITY; INTRUDER; INTERNET; ENCRYPTION; MODEL;
D O I
10.1007/s10207-022-00578-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart homes are a special use-case of the IoT paradigm, which is becoming more and more important in our lives. Although sensors, devices and applications make our daily lives easier, they often collect our sensitive data, which may lead to security problems (e.g., hacked devices, botnets, etc.). In several cases, the appropriate security mechanisms are missing within the devices. Therefore, security measures have become a central topic in the field of IoT. The most essential requirements are secure user-device authentication and confidentiality of transferred sensitive data. Passwords are the most widely used factors in various areas, such as user authentication, key establishment, and also secret sharing. Password-based protocols that are resistant to typical threats, such as offline dictionary, man-in-the-middle and phishing attacks, generate new session keys. The major aim of these solutions is to guarantee high-level security, even if a user applies a single low-entropy human memorable password for all their accounts. We introduce a threshold and password-based, distributed, mutual authenticated key agreement with key confirmation protocol for a smart home environment. The proposed protocol is a scalable and robust scheme, which forces the adversary to corrupt l-1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l-1$$\end{document} smart home devices, where l is the threshold, in order to perform an offline dictionary attack. The protocol is designed to achieve password-only setting, and end-to-end security if the chosen IoT devices are also authenticated besides the user. We also provide a security analysis of the protocol in AVISPA. We apply the on-the-fly model checker and the constraint-logic-based attack searcher to perform protocol verification for bounded numbers of sessions. We show that the proposed protocol provides session key secrecy and mutual authentication of the user and the device manager. Since efficiency is a crucial aspect, we implemented our protocol to measure the computation and communication costs and demonstrate that our solution is appropriate and eligible for smart homes.
引用
收藏
页码:707 / 723
页数:17
相关论文
共 67 条
[1]   Single password authentication [J].
Acar, Tolga ;
Belenkiy, Mira ;
Kupcu, Alptekin .
COMPUTER NETWORKS, 2013, 57 (13) :2597-2614
[2]   Consumer IoT: Security Vulnerability Case Studies and Solutions [J].
Alladi, Tejasvi ;
Chamola, Vinay ;
Sikdar, Biplab ;
Choo, Kim-Kwang Raymond .
IEEE CONSUMER ELECTRONICS MAGAZINE, 2020, 9 (02) :17-25
[3]  
[Anonymous], 2019, BITDEFENDER WHITEPAP
[4]  
Arabi K., IEEE DAC 2014 KEYNOT
[5]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[6]  
Armando A, 2004, LECT NOTES COMPUT SC, V2919, P257
[7]   SATMC: A SAT-based model checker for security protocols [J].
Armando, A ;
Compagna, L .
LOGICS IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2004, 3229 :730-733
[8]  
Armando A, 2002, LECT NOTES COMPUT SC, V2529, P210
[9]   An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols [J].
Armando, Alessandro ;
Compagna, Luca .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 125 (01) :91-108
[10]  
Bagherzandi A, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P433