A Study on a JWT-Based User Authentication and API Assessment Scheme Using IMEI in a Smart Home Environment

被引:3
|
作者
Hong, Namsu [1 ]
Kim, Mansik [1 ]
Jun, Moon-Seog [1 ]
Kang, Jungho [1 ]
机构
[1] Soongsil Univ, Dept Comp Sci & Engn, Seoul 07027, South Korea
关键词
IoT; smart home; user authentication; smart home device; security; SECURITY CHALLENGES;
D O I
10.3390/su9071099
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
The development of information and communication technology (ICT) has opened the era of the Internet of Things (IoT), in which many devices can connect to the Internet to communicate. Recently, various technologies, such as smart grids, connected cars, and smart farms, have emerged based on IoT, and there is also the smart home, which is the fastest growing market. The smart home is where devices installed for various purposes connect to each other through the Internet so that users can use the service anytime and anywhere. However, while the smart home provides convenience to users, recently the smart home has been exposed to various security threats, such as vulnerability of session/cookies and the use of vulnerable OAuth. In addition, attacks on smart homes by hackers using these vulnerabilities are also increasing. Therefore, in this paper, we propose a user authentication method using the JSON Web Token (JWT) and International Mobile Equipment Identity (IMEI) in the smart home, and solved the problem of unauthorized smart home device registration of hackers by the application of IMEI and JWT technology.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Secure remote anonymous user authentication scheme for smart home environment
    Fakroon, Moneer
    Alshahrani, Mohammed
    Gebali, Fayez
    Traore, Issa
    INTERNET OF THINGS, 2020, 9
  • [2] Anonymous Authentication Scheme for Smart Home Environment
    Hasan, Qusai
    Abdelbasit, Sahar
    Alblooshi, Hamad
    Almobaideen, Wesam
    Al-Habashneh, Mahmoud
    INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND ENERGY TECHNOLOGIES (ICECET 2021), 2021, : 2066 - 2071
  • [3] Dynamic Forest of Random Subsets-based supervised hash signature scheme for secure user authentication in smart home environment
    Sudha, K. Swapna
    Jeyanthi, N.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (27)
  • [4] A ROBUST REMOTE USER AUTHENTICATION SCHEME USING SMART CARD
    Li, Chun-Ta
    Lee, Cheng-Chi
    INFORMATION TECHNOLOGY AND CONTROL, 2011, 40 (03): : 236 - 245
  • [5] A Secure and Anonymous User Authentication Scheme for IoT-Enabled Smart Home Environments Using PUF
    Cho, Yeongjae
    Oh, Jihyeon
    Kwon, Deokkyu
    Son, Seunghwan
    Lee, Joonyoung
    Park, Youngho
    IEEE ACCESS, 2022, 10 : 101330 - 101346
  • [6] A Robust Two-Factor User Authentication Scheme-Based ECC for Smart Home in IoT
    Zou, Shihong
    Cao, Qiang
    Wang, Chenyu
    Huang, Zifu
    Xu, Guoai
    IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 4938 - 4949
  • [7] An Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards
    Lu, Jian-Zhu
    Chen, Ting
    Zhou, Jipeng
    Yang, Jinjin
    Jiang, Junhui
    2013 6TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), VOLS 1-3, 2013, : 1643 - 1648
  • [8] An efficient Authentication Scheme Using Token Distribution for Cloud-based Smart Home
    Kou, Ruiming
    Wang, Yazhe
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL AND COMPUTER APPLICATION, 2016, 30 : 451 - 455
  • [9] An efficient biometrics-based remote user authentication scheme using smart cards
    Li, Chun-Ta
    Hwang, Min-Shiang
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 33 (01) : 1 - 5
  • [10] Anonymous authentication scheme for smart home environment with provable security
    Shuai, Mengxia
    Yu, Nenghai
    Wang, Hongxia
    Xiong, Ling
    COMPUTERS & SECURITY, 2019, 86 : 132 - 146