ECC Based Authentication Scheme for Smart Homes

被引:15
作者
Nyangaresi, Vincent Omollo [1 ]
机构
[1] Tom Mboya Univ Coll, Homabay 19940300, Kenya
来源
PROCEEDINGS OF 63RD INTERNATIONAL SYMPOSIUM ELMAR-2021 | 2021年
关键词
Authentication; ECC; ephemerals; smart homes; security attacks; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; SECURITY ISSUES; IOT; INTERNET; THINGS;
D O I
10.1109/ELMAR52657.2021.9550911
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart homes security has attracted a lot of attention from both the industry and academia, leading to the development of numerous schemes for both key management and authentication. However, most of these schemes are either inefficient due to both high communication and computational costs, or do not fully offer the required levels of both privacy and security. To address some of these issues, this paper proposed elliptic curve cryptography (ECC) based lightweight key management and mutual authentication protocol for the smart home environment. The performance evaluation of the proposed protocol was accomplished using communication costs, computation overheads, throughput and end-to-end- delays (EED). On the other hand, widely applied Dolev-Yao and Canetti-Krawczyk models were deployed for security evaluation of the proposed protocol. The simulation results showed that this protocol exhibited the least communication and computation overheads, and had the least impact on both throughput and EED compared with related schemes. Moreover, it was robust against conventional smart home attacks such as replay, forgery, impersonation and man-in-the middle (MitM) attacks.
引用
收藏
页码:5 / 10
页数:6
相关论文
共 50 条
  • [31] Registration Center Based User Authentication Scheme for Smart E-Governance Applications in Smart Cities
    Alotaibi, Saud S.
    IEEE ACCESS, 2019, 7 : 5819 - 5833
  • [32] ESEAP: ECC based secure and efficient mutual authentication protocol using smart card
    Kumari, Adesh
    Jangirala, Srinivas
    Abbasi, M. Yahya
    Kumar, Vinod
    Alam, Mansaf
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51 (51)
  • [33] A provably secure biometrics and ECC-based authentication and key agreement scheme for WSNs
    Kumari, Saru
    Renuka, Km.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (03)
  • [34] Secure and efficient ECC based SIP authentication scheme for VoIP communications in internet of things
    Dhillon, Parwinder Kaur
    Kalra, Sheetal
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (16) : 22199 - 22222
  • [35] ECC-Based Anonymous and Multi-factor Authentication Scheme for IoT Environment
    Dargaoui, Souhayla
    Azrour, Mourade
    El Allaoui, Ahmad
    Guezzaz, Azidine
    Alabdulatif, Abdulatif
    Ahmad, Sultan
    INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2025, 21 (01) : 56 - 75
  • [36] Secure and efficient ECC based SIP authentication scheme for VoIP communications in internet of things
    Parwinder Kaur Dhillon
    Sheetal Kalra
    Multimedia Tools and Applications, 2019, 78 : 22199 - 22222
  • [37] Lightweight and Privacy-Preserving Remote User Authentication for Smart Homes
    Nimmy, K.
    Sankaran, Sriram
    Achuthan, Krishnashree
    Calyam, Prasad
    IEEE ACCESS, 2022, 10 : 176 - 190
  • [38] A secure authentication scheme for IoT application in smart home
    Kumar, Pankaj
    Chouhan, Lokesh
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (01) : 420 - 438
  • [39] Slight: A lightweight authentication scheme for smart healthcare services
    Amintoosi, Haleh
    Nikooghadam, Mahdi
    Shojafar, Mohammad
    Kumari, Saru
    Alazab, Mamoun
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 99
  • [40] Design and Implementation of a Contextual-Based Continuous Authentication Framework for Smart Homes
    Ashibani, Yosef
    Kauling, Dylan
    Mahmoud, Qusay H.
    APPLIED SYSTEM INNOVATION, 2019, 2 (01) : 1 - 20