Light Weight Authentication Scheme for Smart Home IoT Devices

被引:15
|
作者
Kumar, Vipin [1 ]
Malik, Navneet [1 ]
Singla, Jimmy [1 ]
Jhanjhi, N. Z. [2 ]
Amsaad, Fathi [3 ]
Razaque, Abdul [4 ]
机构
[1] Lovely Profess Univ, Dept Comp Sci & Engn, Phagwara 144001, India
[2] Taylors Univ, Sch Comp Sci, Subang Jaya 47500, Malaysia
[3] Wright State Univ, Dept Comp Sci & Engn, 3640 Colonel Glenn Hwy, Dayton, OH 45435 USA
[4] Int Informat Technol Univ, Dept Comp Engn, Alma Ata 050000, Kazakhstan
关键词
authentication; confidentiality; internet of things; cryptography; security;
D O I
10.3390/cryptography6030037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In today's world, the use of computer networks is everywhere, and to access the home network we use the Internet. IoT networks are the new range of these networks in which we try to connect different home appliances and try to give commands from a remote place. Access to any device over an insecure network invites various types of attacks. User authentication can be performed using some password or biometric technique. However, when it comes to authenticating a device, it becomes challenging to maintain data security over a secure network such as the Internet. Many encryptions and decryption algorithms assert confidentiality, and hash code or message authentication code MAC is used for authentication. Traditional cryptographic security methods are expensive in terms of computational resources such as memory, processing capacity, and power consumption. They are incompatible with the Internet of Things devices that have limited resources. Although automatic Device-to-Device communication enables new potential applications, the limited resources of the networks' machines and devices impose various constraints. This paper proposes a home device authentication scheme when these are accessed from a remote place. An authentication device is used for the home network and controller device to control home appliances. Our scheme can prevent various attacks such as replay attacks, server spoofing, and man-in-the-middle attack. The proposed scheme maintains the confidentiality and authenticity of the user and devices in the network. At the same time, we check the system in a simulated environment, and the results show that the network's performance does not degrade much in terms of delay, throughput, and energy consumed.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] A light weight authentication protocol for digital home networks
    You, Ilsun
    Jung, Eun-Sun
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 416 - 423
  • [42] Light Weight Secure Authentication for Accessing IoT Application Resources
    Abbas, Zaheer
    Sajjad, Syed Muhammad
    Hadi, Hassan Jalil
    2019 22ND IEEE INTERNATIONAL MULTI TOPIC CONFERENCE (INMIC), 2019, : 396 - 400
  • [43] A Light-Weight Mutual Authentication Protocol for IoT Systems
    Aman, Muhammad Naveed
    Chua, Kee Chaing
    Sikdar, Biplab
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [44] Lightweight Privacy Preserving Scheme for IoT based Smart Home
    Sharma, Neha
    Dhiman, Pankaj
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2024, 17 (08) : 763 - 777
  • [45] Data Provenance for IoT With Light Weight Authentication and Privacy Preservation
    Aman, Muhammad Naveed
    Basheer, Mohammed Haroon
    Sikdar, Biplab
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06): : 10441 - 10457
  • [46] Vulnerability Assessment and Risk Modeling of IoT Smart Home Devices
    Baddula, Mounika
    Ray, Biplob
    ElKhodr, Mahmoud
    Anwar, Adnan
    Hettiarachchi, Pushpika
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 5, AINA 2024, 2024, 203 : 459 - 469
  • [47] A Monitoring and Control Gateway for IoT Edge Devices in Smart Home
    Aloul, Fadi
    Zualkernan, Imran
    Shapsough, Shams
    Towheed, Mohammed
    2020 34TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2020), 2020, : 696 - 701
  • [48] HOMESNITCH: Behavior Transparency and Control for Smart Home IoT Devices
    OConnor, T. J.
    Mohamed, Reham
    Miettinen, Markus
    Enck, William
    Reaves, Bradley
    Sadeghi, Ahmad-Reza
    PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 128 - 139
  • [49] Implementing Demand Response Using Smart Home IoT Devices
    Daniel-George, Dumitrascu
    Mihaela, Coroiu
    Bogdan, Marina
    Radu, Tarau
    PROCEEDINGS OF 2020 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS (AQTR), 2020, : 415 - 420
  • [50] Smart Home Forensics-Data Analysis of IoT Devices
    Kim, Soram
    Park, Myungseo
    Lee, Sehoon
    Kim, Jongsung
    ELECTRONICS, 2020, 9 (08) : 1 - 13