ECC Based Authentication Scheme for Smart Homes

被引:15
作者
Nyangaresi, Vincent Omollo [1 ]
机构
[1] Tom Mboya Univ Coll, Homabay 19940300, Kenya
来源
PROCEEDINGS OF 63RD INTERNATIONAL SYMPOSIUM ELMAR-2021 | 2021年
关键词
Authentication; ECC; ephemerals; smart homes; security attacks; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; SECURITY ISSUES; IOT; INTERNET; THINGS;
D O I
10.1109/ELMAR52657.2021.9550911
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart homes security has attracted a lot of attention from both the industry and academia, leading to the development of numerous schemes for both key management and authentication. However, most of these schemes are either inefficient due to both high communication and computational costs, or do not fully offer the required levels of both privacy and security. To address some of these issues, this paper proposed elliptic curve cryptography (ECC) based lightweight key management and mutual authentication protocol for the smart home environment. The performance evaluation of the proposed protocol was accomplished using communication costs, computation overheads, throughput and end-to-end- delays (EED). On the other hand, widely applied Dolev-Yao and Canetti-Krawczyk models were deployed for security evaluation of the proposed protocol. The simulation results showed that this protocol exhibited the least communication and computation overheads, and had the least impact on both throughput and EED compared with related schemes. Moreover, it was robust against conventional smart home attacks such as replay, forgery, impersonation and man-in-the middle (MitM) attacks.
引用
收藏
页码:5 / 10
页数:6
相关论文
共 50 条
  • [41] A New Remote Authentication Scheme for Anonymous Users Using ECC
    Guo, Dianli
    Wen, Fengtong
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER, COMMUNICATION, CONTROL AND AUTOMATION, 2013, 68 : 143 - 146
  • [42] Authentication-enabled attribute-based access control for smart homes
    Burakgazi Bilgen, Melike
    Abul, Osman
    Bicakci, Kemal
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (02) : 479 - 495
  • [43] A remote authentication scheme based on smart cards
    Liu, Jiqiang
    Zhong, Sheng
    Tang, Weimin
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 1, 2008, : 1175 - 1177
  • [44] A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes
    Shin, Sooyeon
    Kwon, Taekyoung
    [J]. SENSORS, 2019, 19 (09)
  • [45] SDN-Based Privacy and Functional Authentication Scheme for Fog Nodes of Smart Healthcare
    Ke, Changbo
    Zhu, Zejiang
    Xiao, Fu
    Huang, Zhiqiu
    Meng, Yunfei
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (18) : 17989 - 18001
  • [46] Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment
    Zhao, Yan
    Li, Shiming
    Jiang, Liehui
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [47] ECC-reliant secure authentication protocol for cloud server and smart devices in IoT
    K. Selvi
    K. Muthumanickam
    P. Vijayalakshmi
    P. C. Senthil Mahesh
    [J]. The Journal of Supercomputing, 2023, 79 : 12191 - 12218
  • [48] A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT)
    Hammi, Badis
    Fayad, Achraf
    Khatoun, Rida
    Zeadally, Sherali
    Begriche, Youcef
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (03): : 3440 - 3450
  • [49] Fog-based smart homes: A systematic review
    Rahimi, Morteza
    Songhorabadi, Maryam
    Kashani, Mostafa Haghi
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 153
  • [50] Smart Contract-Based Blockchain-Envisioned Authentication Scheme for Smart Farming
    Vangala, Anusha
    Sutrala, Anil Kumar
    Das, Ashok Kumar
    Jo, Minho
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) : 10792 - 10806