Anonymous Secure Framework in Connected Smart Home Environments

被引:102
作者
Kumar, Pardeep [1 ]
Braeken, An [2 ]
Gurtov, Andrei [3 ,4 ]
Iinatti, Jari [5 ]
Ha, Phuong Hoai [6 ]
机构
[1] Univ Oxford, Dept Comp Sci, Oxford OX1 3QD, England
[2] Vrije Univ Brussel, Ind Engn INDI, B-1050 Ixelles, Belgium
[3] Linkoping Univ, SE-58183 Linkoping, Sweden
[4] ITMO Univ, St Petersburg 199034, Russia
[5] Univ Oulu, FI-90014 Oulu, Finland
[6] Univ Tromso, Dept Comp Sci, N-9037 Tromso, Norway
基金
芬兰科学院;
关键词
Smart home; Internet of Things; anonymity; key agreement; unlinkability; AUTHENTICATION; APPLIANCES; NETWORKS;
D O I
10.1109/TIFS.2016.2647225
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The smart home is an environment, where heterogeneous electronic devices and appliances are networked together to provide smart services in a ubiquitous manner to the individuals. As the homes become smarter, more complex, and technology dependent, the need for an adequate security mechanism with minimum individual's intervention is growing. The recent serious security attacks have shown how the Internet-enabled smart homes can be turned into very dangerous spots for various ill intentions, and thus lead the privacy concerns for the individuals. For instance, an eavesdropper is able to derive the identity of a particular device/appliance via public channels that can be used to infer in the life pattern of an individual within the home area network. This paper proposes an anonymous secure framework (ASF) in connected smart home environments, using solely lightweight operations. The proposed framework in this paper provides efficient authentication and key agreement, and enables devices (identity and data) anonymity and unlinkability. One-time session key progression regularly renews the session key for the smart devices and dilutes the risk of using a compromised session key in the ASF. It is demonstrated that computation complexity of the proposed framework is low as compared with the existing schemes, while security has been significantly improved.
引用
收藏
页码:968 / 979
页数:12
相关论文
共 38 条
[1]  
[Anonymous], 2001, TECH REP
[2]  
[Anonymous], J MED SYST
[3]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[4]  
Ayday E., 2013, TECH REP
[5]  
Banerjee S., 2015, INT J SMART HOME, V9, P11, DOI [10.14257/ijsh.2015.9.5.02, DOI 10.14257/IJSH.2015.9.5.02]
[6]  
Braeken A., 2015, Int. J. Smart Home, V9, P177
[7]  
Burrough M., SMART THERMOSTAT SEC
[8]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[9]   Privacy Preserving Data Analytics for Smart Homes [J].
Chakravorty, Antorweep ;
Wlodarczyk, Tomasz ;
Rong, Chunming .
IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, :23-27
[10]  
Choi BC, 2016, IEEE T CONSUM ELECTR, V62, P39, DOI 10.1109/TCE.2016.7448561