A two-factor authentication scheme against FDM attack in IFTTT based Smart Home System

被引:21
作者
Baruah, Barnana [1 ]
Dhal, Subhasish [1 ]
机构
[1] Indian Inst Informat Technol Guwahati, Dept Comp Sci & Engn, Gauhati, Assam, India
关键词
IFTTT; IoT; Malware; Recipes; Smart Home; SECURITY; INTERNET; PUFS;
D O I
10.1016/j.cose.2018.03.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart Home is an emerging key-element of the advantages of Internet of Things (IoT), which facilitates an individual to have control over the smart devices of his house through the Internet. However, its control should be confined to the legitimate user only, which can refrain from malicious activities. Internet services like IFTTT (If This Then That) integrate heterogeneous Smart Home devices and allow the user to customize Smart Home configurations via IFTTT recipes. Earlier researches have suggested an attack scenario based on Feature Distributed Malware (FDM), where the malware can compromise the victim's IFTTT account and as a result the attacker can manipulate the recipes from his own device. This paper proposes a secure IFTTT-based Smart Home framework by incorporating suitable captchabased One Time Password (OTP) authentication scheme and Physical Unclonable Function (PUF). A suitable adversarial model has been used to evaluate the security of the framework. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:21 / 35
页数:15
相关论文
共 39 条
[1]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[2]  
[Anonymous], 2015, PROC ONLINE INT C GR
[3]  
Barabosch T, 2014, PROCEEDINGS OF THE 2014 9TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE: THE AMERICAS (MALWARE), P8, DOI 10.1109/MALWARE.2014.6999410
[4]   Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS [J].
Bhargavan, Karthikeyan ;
Delignat-Lavaud, Antoine ;
Fournet, Cedric ;
Pironti, Alfredo ;
Strub, Pierre-Yves .
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, :98-113
[5]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[6]  
Choi H, 2015, INT CONF UBIQ FUTUR, P476, DOI 10.1109/ICUFN.2015.7182589
[7]  
Cooijmans Tim., 2014, Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones Mobile Devices, P11, DOI DOI 10.1145/2666620.2666627
[8]  
Coppolino L, 2016, P IEEE 18 INT C COMP, P145
[9]  
Fernandes E, 2017, ARXIV170700405CSCR
[10]  
Gong L., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P234, DOI 10.1109/RISP.1990.63854