A Design of Efficient Multi-Authentication Scheme Using a Merkle Hash Tree in the Smart Home Environments

被引:2
作者
Kim, Mansik [1 ]
Choi, Won-Kyu [1 ]
Jun, Moon-Seog [1 ]
机构
[1] Soongsil Univ, Dept Comp Sci & Engn, Sadangro 50, Seoul 07027, South Korea
关键词
Merkle Hash Tree; Multi-Authentication; Smart Home; PUFs; INTERNET; THINGS;
D O I
10.1166/asl.2016.7806
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The loT environment that allows us to connect to anything through the internet regardless of where we are and when, is offered in the fields of Smart home, Smart retail, Smart city, Smart agriculture/forest, Smart water and Smart transportation. In particular, the number of devices related to the smart home environment has grown explosively. However, the network energy consumption that grows in proportion to the increase in smart home related devices and the need to establish a secure channel between low functioning smart homes and the service provider are issues. Merkle Hash Tree requires a small amount of calculation because through repeated hash that composes a tree with the data set that can be used for the authentication, verification of the data integrity and signatures based on the safety of the hash function. PUFs is a challenges-responses method that makes it impossible to copy or forecast based on the random characteristics that appear when manufacturing ICs. It is used for authentication or generation of random values or keys. It only requires a small amount of calculation and for each ICs, a different pair of responses to the challenges are generated. This paper takes into account the Merkle Hash Tree and PUFs used in smart home environments to reduce energy consumption of the device network while allocating keys and allowing for safe end-to-end mutual authentication through the smart home gateway. Based on this, the paper proposes a 3-way handshaking protocol.
引用
收藏
页码:2538 / 2542
页数:5
相关论文
共 19 条
  • [1] Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring
    Ali, Syed Taha
    Sivaraman, Vijay
    Ostry, Diethelm
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 35 : 80 - 90
  • [2] [Anonymous], P 9 ACM C COMP COMM
  • [3] [Anonymous], 2008, BITCOIN PEER TO PEER
  • [4] The Internet of Things: A survey
    Atzori, Luigi
    Iera, Antonio
    Morabito, Giacomo
    [J]. COMPUTER NETWORKS, 2010, 54 (15) : 2787 - 2805
  • [5] Bielefeldt J., 2014, AD HOC NETW WORKSH M
  • [6] Gassend B. L P., 2003, DISS
  • [7] Internet of Things (IoT): A vision, architectural elements, and future directions
    Gubbi, Jayavardhana
    Buyya, Rajkumar
    Marusic, Slaven
    Palaniswami, Marimuthu
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07): : 1645 - 1660
  • [8] Housley R., 2014, USE HASH BASED MERKL
  • [9] Khan R., 2012, 20102 10 INT C FRONT
  • [10] Li H, 2014, SYSTEMS J, V8, P655