Light Weight Authentication Scheme for Smart Home IoT Devices

被引:15
|
作者
Kumar, Vipin [1 ]
Malik, Navneet [1 ]
Singla, Jimmy [1 ]
Jhanjhi, N. Z. [2 ]
Amsaad, Fathi [3 ]
Razaque, Abdul [4 ]
机构
[1] Lovely Profess Univ, Dept Comp Sci & Engn, Phagwara 144001, India
[2] Taylors Univ, Sch Comp Sci, Subang Jaya 47500, Malaysia
[3] Wright State Univ, Dept Comp Sci & Engn, 3640 Colonel Glenn Hwy, Dayton, OH 45435 USA
[4] Int Informat Technol Univ, Dept Comp Engn, Alma Ata 050000, Kazakhstan
关键词
authentication; confidentiality; internet of things; cryptography; security;
D O I
10.3390/cryptography6030037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In today's world, the use of computer networks is everywhere, and to access the home network we use the Internet. IoT networks are the new range of these networks in which we try to connect different home appliances and try to give commands from a remote place. Access to any device over an insecure network invites various types of attacks. User authentication can be performed using some password or biometric technique. However, when it comes to authenticating a device, it becomes challenging to maintain data security over a secure network such as the Internet. Many encryptions and decryption algorithms assert confidentiality, and hash code or message authentication code MAC is used for authentication. Traditional cryptographic security methods are expensive in terms of computational resources such as memory, processing capacity, and power consumption. They are incompatible with the Internet of Things devices that have limited resources. Although automatic Device-to-Device communication enables new potential applications, the limited resources of the networks' machines and devices impose various constraints. This paper proposes a home device authentication scheme when these are accessed from a remote place. An authentication device is used for the home network and controller device to control home appliances. Our scheme can prevent various attacks such as replay attacks, server spoofing, and man-in-the-middle attack. The proposed scheme maintains the confidentiality and authenticity of the user and devices in the network. At the same time, we check the system in a simulated environment, and the results show that the network's performance does not degrade much in terms of delay, throughput, and energy consumed.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] End to end light weight mutual authentication scheme in IoT-based healthcare environment
    Suganthi S.D.
    Anitha R.
    Sureshkumar V.
    Harish S.
    Agalya S.
    Journal of Reliable Intelligent Environments, 2020, 6 (01) : 3 - 13
  • [22] Rhythm-Based Authentication Scheme on Smart Devices
    Lee, Jae Dong
    Kang, Won Min
    Moon, Chang Hyun
    Jeong, Hwa-Young
    Jeong, Young-Sik
    Jung, Jai-Jin
    Park, Jong Hyuk
    FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 : 313 - 319
  • [23] A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
    Amin, Ruhul
    Kumar, Neeraj
    Biswas, G. P.
    Iqbal, R.
    Chang, Victor
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 1005 - 1019
  • [24] Defending Industry 4.0: An Enhanced Authentication Scheme for IoT Devices
    Bagheri, Nasour
    Kumari, Saru
    Camara, Carmen
    Peris-Lopez, Pedro
    IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 4501 - 4512
  • [25] Mutual authentication scheme of IoT devices in fog computing environment
    Singh, Sunakshi
    Chaurasiya, Vijay Kumar
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03): : 1643 - 1657
  • [26] Mutual authentication scheme of IoT devices in fog computing environment
    Sunakshi Singh
    Vijay Kumar Chaurasiya
    Cluster Computing, 2021, 24 : 1643 - 1657
  • [27] Smart IoT Devices in the Home Security and Privacy Implications
    Sivaraman, Vijay
    Gharakheili, Hassan Habibi
    Fernandes, Clinton
    Clark, Narelle
    Karliychuk, Tanya
    IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2018, 37 (02) : 71 - 79
  • [28] Secure user authentication and key agreement scheme for IoT device access control based smart home communications
    Uppuluri, Sirisha
    Lakshmeeswari, G.
    WIRELESS NETWORKS, 2023, 29 (03) : 1333 - 1354
  • [29] SeMLAS: An Efficient Secure Multi-Level Authentication Scheme for IoT-Based Smart Home Systems
    Mbarek, Bacem
    Buhnova, Barbora
    Pitner, Tomas
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1373 - 1378
  • [30] Secure user authentication and key agreement scheme for IoT device access control based smart home communications
    Sirisha Uppuluri
    G. Lakshmeeswari
    Wireless Networks, 2023, 29 : 1333 - 1354