Scalable, password-based and threshold authentication for smart homes

被引:3
|
作者
Huszti, Andrea [1 ]
Kovacs, Szabolcs [2 ]
Olah, Norbert [1 ]
机构
[1] Univ Debrecen, Fac Informat, Debrecen, Hungary
[2] Univ Debrecen, Fac Informat, CCLab Ltd, Debrecen, Hungary
关键词
Authenticated key agreement; End-to-end security; Distributed system; Edge; Smart home; Internet of Things; Bilinear map; AVISPA; KEY EXCHANGE; PROTOCOL INSECURITY; SECURITY; INTRUDER; INTERNET; ENCRYPTION; MODEL;
D O I
10.1007/s10207-022-00578-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart homes are a special use-case of the IoT paradigm, which is becoming more and more important in our lives. Although sensors, devices and applications make our daily lives easier, they often collect our sensitive data, which may lead to security problems (e.g., hacked devices, botnets, etc.). In several cases, the appropriate security mechanisms are missing within the devices. Therefore, security measures have become a central topic in the field of IoT. The most essential requirements are secure user-device authentication and confidentiality of transferred sensitive data. Passwords are the most widely used factors in various areas, such as user authentication, key establishment, and also secret sharing. Password-based protocols that are resistant to typical threats, such as offline dictionary, man-in-the-middle and phishing attacks, generate new session keys. The major aim of these solutions is to guarantee high-level security, even if a user applies a single low-entropy human memorable password for all their accounts. We introduce a threshold and password-based, distributed, mutual authenticated key agreement with key confirmation protocol for a smart home environment. The proposed protocol is a scalable and robust scheme, which forces the adversary to corrupt l-1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l-1$$\end{document} smart home devices, where l is the threshold, in order to perform an offline dictionary attack. The protocol is designed to achieve password-only setting, and end-to-end security if the chosen IoT devices are also authenticated besides the user. We also provide a security analysis of the protocol in AVISPA. We apply the on-the-fly model checker and the constraint-logic-based attack searcher to perform protocol verification for bounded numbers of sessions. We show that the proposed protocol provides session key secrecy and mutual authentication of the user and the device manager. Since efficiency is a crucial aspect, we implemented our protocol to measure the computation and communication costs and demonstrate that our solution is appropriate and eligible for smart homes.
引用
收藏
页码:707 / 723
页数:17
相关论文
共 50 条
  • [22] Composition of password-based protocols
    Delaune, Stephanie
    Kremer, Steve
    Ryan, Mark
    CSF 2008: 21ST IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, PROCEEDINGS, 2008, : 239 - +
  • [23] An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System
    Ashok Kumar Das
    Bezawada Bruhadeshwar
    Journal of Medical Systems, 2013, 37
  • [24] Password-Based Authentication Protocol for Secret-Sharing-Based Multiparty Computation
    Kikuchi, Ryo
    Chida, Koji
    Ikarashi, Dai
    Hamada, Koki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (01) : 51 - 63
  • [25] Certificate Based Authentication Scheme for Smart Homes
    Nyangaresi, Vincent Omollo
    Ogundoyin, Sunday Oyinlola
    2021 IEEE 3RD GLOBAL POWER, ENERGY AND COMMUNICATION CONFERENCE (IEEE GPECOM2021), 2021, : 202 - 207
  • [26] Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card
    Wang, Chenyu
    Xu, Guoai
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [27] Countermeasure on Password-Based Authentication Scheme for Multi-server Environments
    Lee, Youngsook
    Kim, Jiye
    Won, Dongho
    MULTIMEDIA AND UBIQUITOUS ENGINEERING, 2014, 308 : 459 - 466
  • [28] Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation
    Kikuchi, Ryo
    Chida, Koji
    Ikarashi, Dai
    Hamada, Koki
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 179 - 196
  • [29] Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions
    Blazy, Olivier
    Chevalier, Celine
    Vergnaud, Damien
    TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 3 - 18
  • [30] How to Preserve User Anonymity in Password-Based Anonymous Authentication Scheme
    Shin, SeongHan
    Kobara, Kazukuni
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (03): : 803 - 807