Light Weight Authentication Scheme for Smart Home IoT Devices

被引:15
|
作者
Kumar, Vipin [1 ]
Malik, Navneet [1 ]
Singla, Jimmy [1 ]
Jhanjhi, N. Z. [2 ]
Amsaad, Fathi [3 ]
Razaque, Abdul [4 ]
机构
[1] Lovely Profess Univ, Dept Comp Sci & Engn, Phagwara 144001, India
[2] Taylors Univ, Sch Comp Sci, Subang Jaya 47500, Malaysia
[3] Wright State Univ, Dept Comp Sci & Engn, 3640 Colonel Glenn Hwy, Dayton, OH 45435 USA
[4] Int Informat Technol Univ, Dept Comp Engn, Alma Ata 050000, Kazakhstan
关键词
authentication; confidentiality; internet of things; cryptography; security;
D O I
10.3390/cryptography6030037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In today's world, the use of computer networks is everywhere, and to access the home network we use the Internet. IoT networks are the new range of these networks in which we try to connect different home appliances and try to give commands from a remote place. Access to any device over an insecure network invites various types of attacks. User authentication can be performed using some password or biometric technique. However, when it comes to authenticating a device, it becomes challenging to maintain data security over a secure network such as the Internet. Many encryptions and decryption algorithms assert confidentiality, and hash code or message authentication code MAC is used for authentication. Traditional cryptographic security methods are expensive in terms of computational resources such as memory, processing capacity, and power consumption. They are incompatible with the Internet of Things devices that have limited resources. Although automatic Device-to-Device communication enables new potential applications, the limited resources of the networks' machines and devices impose various constraints. This paper proposes a home device authentication scheme when these are accessed from a remote place. An authentication device is used for the home network and controller device to control home appliances. Our scheme can prevent various attacks such as replay attacks, server spoofing, and man-in-the-middle attack. The proposed scheme maintains the confidentiality and authenticity of the user and devices in the network. At the same time, we check the system in a simulated environment, and the results show that the network's performance does not degrade much in terms of delay, throughput, and energy consumed.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] Blockchain based authentication and access verfication scheme in smart home
    Heshmati A.
    Bayat M.
    Doostari M.A.
    Pournaghi S.M.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (03) : 2525 - 2547
  • [32] Certificateless Authentication Scheme Based on Blockchain in Smart Home Network
    Zhang, Xingang
    Li, He
    Tian, Xiao
    Zhang, Rui
    Qi, Qinglei
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [33] Anonymous authentication scheme for smart home environment with provable security
    Shuai, Mengxia
    Yu, Nenghai
    Wang, Hongxia
    Xiong, Ling
    COMPUTERS & SECURITY, 2019, 86 : 132 - 146
  • [34] An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments
    Banerjee, Soumya
    Odelu, Vanga
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Park, Youngho
    SENSORS, 2020, 20 (04)
  • [35] A Trusted Authentication Scheme for IoT-based Smart Grid Applications
    Amsaad, Fathi
    Kose, Selcuk
    2020 IEEE 6TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2020,
  • [36] A Rhythm-Based Authentication Scheme for Smart Media Devices
    Lee, Jae Dong
    Jeong, Young-Sik
    Park, Jong Hyuk
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [37] Scalable Group Audio-Based Authentication Scheme for IoT Devices
    Gu, Zhong-lei
    Liu, Yang
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 277 - 281
  • [38] Novel one round message authentication scheme for constrained IoT devices
    Noura, Hassan N.
    Salman, Ola
    Couturier, Raphael
    Chehab, Ali
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (01) : 483 - 499
  • [39] Novel one round message authentication scheme for constrained IoT devices
    Hassan N. Noura
    Ola Salman
    Raphaël Couturier
    Ali Chehab
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 483 - 499
  • [40] Lightweight zero-knowledge authentication scheme for IoT embedded devices
    Wang, Zhangquan
    Huang, Jiaxuan
    Miao, Kelei
    Lv, Xiaowen
    Chen, Yourong
    Su, Bing
    Liu, Liyuan
    Han, Meng
    COMPUTER NETWORKS, 2023, 236