Scalable, password-based and threshold authentication for smart homes

被引:3
|
作者
Huszti, Andrea [1 ]
Kovacs, Szabolcs [2 ]
Olah, Norbert [1 ]
机构
[1] Univ Debrecen, Fac Informat, Debrecen, Hungary
[2] Univ Debrecen, Fac Informat, CCLab Ltd, Debrecen, Hungary
关键词
Authenticated key agreement; End-to-end security; Distributed system; Edge; Smart home; Internet of Things; Bilinear map; AVISPA; KEY EXCHANGE; PROTOCOL INSECURITY; SECURITY; INTRUDER; INTERNET; ENCRYPTION; MODEL;
D O I
10.1007/s10207-022-00578-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart homes are a special use-case of the IoT paradigm, which is becoming more and more important in our lives. Although sensors, devices and applications make our daily lives easier, they often collect our sensitive data, which may lead to security problems (e.g., hacked devices, botnets, etc.). In several cases, the appropriate security mechanisms are missing within the devices. Therefore, security measures have become a central topic in the field of IoT. The most essential requirements are secure user-device authentication and confidentiality of transferred sensitive data. Passwords are the most widely used factors in various areas, such as user authentication, key establishment, and also secret sharing. Password-based protocols that are resistant to typical threats, such as offline dictionary, man-in-the-middle and phishing attacks, generate new session keys. The major aim of these solutions is to guarantee high-level security, even if a user applies a single low-entropy human memorable password for all their accounts. We introduce a threshold and password-based, distributed, mutual authenticated key agreement with key confirmation protocol for a smart home environment. The proposed protocol is a scalable and robust scheme, which forces the adversary to corrupt l-1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l-1$$\end{document} smart home devices, where l is the threshold, in order to perform an offline dictionary attack. The protocol is designed to achieve password-only setting, and end-to-end security if the chosen IoT devices are also authenticated besides the user. We also provide a security analysis of the protocol in AVISPA. We apply the on-the-fly model checker and the constraint-logic-based attack searcher to perform protocol verification for bounded numbers of sessions. We show that the proposed protocol provides session key secrecy and mutual authentication of the user and the device manager. Since efficiency is a crucial aspect, we implemented our protocol to measure the computation and communication costs and demonstrate that our solution is appropriate and eligible for smart homes.
引用
收藏
页码:707 / 723
页数:17
相关论文
共 50 条
  • [41] A Context-Aware Authentication Service for Smart Homes
    Ashibani, Yosef
    Kauling, Dylan
    Mahmoud, Qusay H.
    2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 588 - 589
  • [42] ECC Based Authentication Scheme for Smart Homes
    Nyangaresi, Vincent Omollo
    PROCEEDINGS OF 63RD INTERNATIONAL SYMPOSIUM ELMAR-2021, 2021, : 5 - 10
  • [43] An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks
    Turkanovic, M.
    Holbl, M.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2013, 19 (06) : 109 - 116
  • [44] REMOTE PASSWORD AUTHENTICATION WITH SMART CARDS
    CHANG, CC
    WU, TC
    IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1991, 138 (03): : 165 - 168
  • [45] Robust Password and Smart Card Based Authentication Scheme with Smart Card Revocation
    谢琪
    刘文浩
    王圣宝
    胡斌
    董娜
    于秀源
    JournalofShanghaiJiaotongUniversity(Science), 2014, 19 (04) : 418 - 424
  • [46] Robust password and smart card based authentication scheme with smart card revocation
    Xie Q.
    Liu W.-H.
    Wang S.-B.
    Hu B.
    Dong N.
    Yu X.-Y.
    Journal of Shanghai Jiaotong University (Science), 2014, 19 (04) : 418 - 424
  • [47] A countable and time-bound password-based user authentication scheme for the applications of electronic commerce
    Lin, Iuon-Chang
    Chang, Chin-Chen
    INFORMATION SCIENCES, 2009, 179 (09) : 1269 - 1277
  • [48] UC-secure Two-Server Password-Based Authentication Protocol and Its Applications
    Zhang, Lin
    Zhang, Zhenfeng
    Hu, Xuexian
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 153 - 164
  • [49] Privacy Preserving Password-Based Multi-server Authenticated Key Agreement Protocol Using Smart Card
    Mishra, Dheerendra
    Dhal, Subhasish
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 99 (01) : 1 - 21
  • [50] A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes
    Oh, JiHyeon
    Yu, SungJin
    Lee, JoonYoung
    Son, SeungHwan
    Kim, MyeongHyun
    Park, YoungHo
    SENSORS, 2021, 21 (04) : 1 - 24