G2F: A Secure User Authentication for Rapid Smart Home IoT Management

被引:22
作者
Luo, Hongwei [1 ]
Wang, Chao [2 ]
Luo, Hao [2 ]
Zhang, Fan [2 ]
Lin, Feng [2 ]
Xu, Guoai [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Natl Engn Lab Mobile Network Secur, Beijing 100876, Peoples R China
[2] Zhejiang Univ, Inst Cyberspace Res, Hangzhou 310027, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Logic gates; Smart homes; Security; Internet of Things; Cloud computing; Protocols; Internet of Things (IoT); smart home; user authentication; PRIVACY;
D O I
10.1109/JIOT.2021.3050710
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet-of-Things (IoT) devices are widely deployed nowadays. A large number of smart home IoT devices are hosted on a cloud server for easy management. Users can use their accounts to initiate operations and management on IoT devices through a cloud server, such as updating firmware and configuring devices. However, the cloud account may be hacked resulting in adversarial attacks to the hosted IoT devices. As a consequence, an adversary may perform malicious operations through the cloud remotely to the hosted IoT devices without user awareness. Motivated by this, in this article we propose gateway-based 2 factor authentication (G2F), a secure user authentication framework dedicated for a gateway based on the universal 2nd factor (U2F) protocol to enhance the security of IoT devices management. In G2F, the user authentication on the gateway is completed utilizing a hardware token that interacts with the local gateway node to guarantee the token owner's presence. Furthermore, G2F can grant multiple simultaneous operations on IoT devices through just one user authentication. We implement a prototype to further evaluate the performance of G2F. Based on our realization on the commercial IoT server, i.e., Alibaba Cloud, G2F demonstrates the ability to protect against malicious attacks with high authentication efficiency.
引用
收藏
页码:10884 / 10895
页数:12
相关论文
共 39 条
[1]  
Alohali Bashar, 2014, 2014 6th Computer Science and Electronic Engineering Conference (CEEC). Proceedings, P115, DOI 10.1109/CEEC.2014.6958565
[2]  
[Anonymous], 7 MOST INFAMOUS CLOU
[3]  
[Anonymous], 2019, CLIENT AUTH PROT CTA
[4]  
[Anonymous], 2012, 2012 21 INT C COMP C
[5]  
Barreto L, 2015, IEEE CONF COMM NETW, P680, DOI 10.1109/CNS.2015.7346887
[6]  
Barth A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P75
[7]  
Beekman J. T, 2013, P 7 USENIX WORKSH OF, P5
[8]  
Benito R. J. C., 2009, P ICT MOB WIR COMM S, P1
[9]  
Bergmann NW, 2012, CONSUM COMM NETWORK, P360, DOI 10.1109/CCNC.2012.6181122