Light Weight Authentication Scheme for Smart Home IoT Devices

被引:15
作者
Kumar, Vipin [1 ]
Malik, Navneet [1 ]
Singla, Jimmy [1 ]
Jhanjhi, N. Z. [2 ]
Amsaad, Fathi [3 ]
Razaque, Abdul [4 ]
机构
[1] Lovely Profess Univ, Dept Comp Sci & Engn, Phagwara 144001, India
[2] Taylors Univ, Sch Comp Sci, Subang Jaya 47500, Malaysia
[3] Wright State Univ, Dept Comp Sci & Engn, 3640 Colonel Glenn Hwy, Dayton, OH 45435 USA
[4] Int Informat Technol Univ, Dept Comp Engn, Alma Ata 050000, Kazakhstan
关键词
authentication; confidentiality; internet of things; cryptography; security;
D O I
10.3390/cryptography6030037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In today's world, the use of computer networks is everywhere, and to access the home network we use the Internet. IoT networks are the new range of these networks in which we try to connect different home appliances and try to give commands from a remote place. Access to any device over an insecure network invites various types of attacks. User authentication can be performed using some password or biometric technique. However, when it comes to authenticating a device, it becomes challenging to maintain data security over a secure network such as the Internet. Many encryptions and decryption algorithms assert confidentiality, and hash code or message authentication code MAC is used for authentication. Traditional cryptographic security methods are expensive in terms of computational resources such as memory, processing capacity, and power consumption. They are incompatible with the Internet of Things devices that have limited resources. Although automatic Device-to-Device communication enables new potential applications, the limited resources of the networks' machines and devices impose various constraints. This paper proposes a home device authentication scheme when these are accessed from a remote place. An authentication device is used for the home network and controller device to control home appliances. Our scheme can prevent various attacks such as replay attacks, server spoofing, and man-in-the-middle attack. The proposed scheme maintains the confidentiality and authenticity of the user and devices in the network. At the same time, we check the system in a simulated environment, and the results show that the network's performance does not degrade much in terms of delay, throughput, and energy consumed.
引用
收藏
页数:15
相关论文
共 36 条
  • [1] A review of IoT network management: Current status and perspectives
    Aboubakar, Moussa
    Kellil, Mounir
    Roux, Pierre
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (07) : 4163 - 4176
  • [2] MAC-AODV Based Mutual Authentication Scheme for Constraint Oriented Networks
    Adil, Muhammad
    Khan, Rahim
    Almaiah, Mohammed Amin
    Al-Zahrani, Mohammed
    Zakarya, Muhammad
    Amjad, Muhammad Saeed
    Ahmed, Rehan
    [J]. IEEE ACCESS, 2020, 8 (08): : 44459 - 44469
  • [3] A Supervised Intrusion Detection System for Smart Home IoT Devices
    Anthi, Eirini
    Williams, Lowri
    Slowinska, Malgorzata
    Theodorakopoulos, George
    Burnap, Pete
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05): : 9042 - 9053
  • [4] The Internet of Things (IoT) Applications and Communication Enabling Technology Standards: An Overview
    Bhuvaneswari, V.
    Porkodi, R.
    [J]. 2014 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING APPLICATIONS (ICICA 2014), 2014, : 324 - 329
  • [5] Costello Craig, 2020, Advances in Cryptology - ASIACRYPT 2020. 26th International Conference on the Theory and Application of Cryptology and Information Security. Proceedings. Lecture Notes in Computer Science (LNCS 12492), P440, DOI 10.1007/978-3-030-64834-3_15
  • [6] Cristescu G.-C., 2021, P 2021 INT S SIGNALS, P1
  • [7] On Attacking Kerberos Authentication Protocol in Windows Active Directory Services: A Practical Survey
    Diaz Motero, Carlos
    Bermejo Higuera, Juan Ramon
    Bermejo Higuera, Javier
    Sicilia Montalvo, Juan Antonio
    Gamez Gomez, Nadia
    [J]. IEEE ACCESS, 2021, 9 : 109289 - 109319
  • [8] Falk R., 2016, P 1 INT C CYBER TECH, P69
  • [9] Machine Learning for Intelligent Authentication in 5G and Beyond Wireless Networks
    Fang, He
    Wang, Xianbin
    Tomasin, Stefano
    [J]. IEEE WIRELESS COMMUNICATIONS, 2019, 26 (05) : 55 - 61
  • [10] OKIoT: Trade offanalysis of smart speaker architecture on open knowledge IoT project
    Hayashi, Victor T.
    Arakaki, Reginaldo
    Ruggiero, Wilson V.
    [J]. INTERNET OF THINGS, 2020, 12