ECC Based Authentication Scheme for Smart Homes

被引:15
作者
Nyangaresi, Vincent Omollo [1 ]
机构
[1] Tom Mboya Univ Coll, Homabay 19940300, Kenya
来源
PROCEEDINGS OF 63RD INTERNATIONAL SYMPOSIUM ELMAR-2021 | 2021年
关键词
Authentication; ECC; ephemerals; smart homes; security attacks; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; SECURITY ISSUES; IOT; INTERNET; THINGS;
D O I
10.1109/ELMAR52657.2021.9550911
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart homes security has attracted a lot of attention from both the industry and academia, leading to the development of numerous schemes for both key management and authentication. However, most of these schemes are either inefficient due to both high communication and computational costs, or do not fully offer the required levels of both privacy and security. To address some of these issues, this paper proposed elliptic curve cryptography (ECC) based lightweight key management and mutual authentication protocol for the smart home environment. The performance evaluation of the proposed protocol was accomplished using communication costs, computation overheads, throughput and end-to-end- delays (EED). On the other hand, widely applied Dolev-Yao and Canetti-Krawczyk models were deployed for security evaluation of the proposed protocol. The simulation results showed that this protocol exhibited the least communication and computation overheads, and had the least impact on both throughput and EED compared with related schemes. Moreover, it was robust against conventional smart home attacks such as replay, forgery, impersonation and man-in-the middle (MitM) attacks.
引用
收藏
页码:5 / 10
页数:6
相关论文
共 50 条
  • [21] An User Authentication Scheme Based on the ECC and OpenID Techniques in the Internet of Things
    Lee, Jong J.
    Lee, Ki Young
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (11): : 79 - 87
  • [22] A Lightweight Authentication Scheme for RFID Using ECC
    Kumar, Atul
    Jain, Ankit Kumar
    4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND CONNECTED TECHNOLOGIES (ICIOTCT), 2019: INTERNET OF THINGS AND CONNECTED TECHNOLOGIES, 2020, 1122 : 177 - 183
  • [23] A Lightweight Authentication Protocol for UAVs Based on ECC Scheme
    Zhang, Shuo
    Liu, Yaping
    Han, Zhiyu
    Yang, Zhikai
    DRONES, 2023, 7 (05)
  • [24] Securing IoT-Based Smart Healthcare Systems by Using Advanced Lightweight Privacy-Preserving Authentication Scheme
    Das, Sangjukta
    Namasudra, Suyel
    Deb, Suman
    Moreno Ger, Pablo
    Gonzalez Crespo, Ruben
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (21) : 18486 - 18494
  • [25] EBIAS: ECC-enabled blockchain-based identity authentication scheme for IoT device
    Wang, Wenyue
    Yan, Biwei
    Chai, Baobao
    Shen, Ruiyao
    Dong, Anming
    Yu, Jiguo
    HIGH-CONFIDENCE COMPUTING, 2025, 5 (01):
  • [26] Vulnerabilities of an ECC-based RFID authentication scheme
    Li, Nan
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Varadharajan, Vijay
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3262 - 3270
  • [27] ECC based inter-device authentication and authorization scheme using MQTT for IoT networks
    Lohachab, Ankur
    Karambir
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 46 : 1 - 12
  • [28] Privacy-aware smart card based biometric authentication scheme for e-health
    Chen, Li
    Zhang, Ke
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) : 1353 - 1365
  • [29] Lightweight Three-Factor-Based Privacy- Preserving Authentication Scheme for IoT-Enabled Smart Homes
    Yu, Sungjin
    Jho, Namsu
    Park, Youngho
    IEEE ACCESS, 2021, 9 : 126186 - 126197
  • [30] On the Security of an ECC-Based Authentication Scheme for Internet of Drones
    Zhang, Min
    Xu, Chunxiang
    Li, Shanshan
    Jiang, Changsong
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6425 - 6428