A Study on a JWT-Based User Authentication and API Assessment Scheme Using IMEI in a Smart Home Environment

被引:3
作者
Hong, Namsu [1 ]
Kim, Mansik [1 ]
Jun, Moon-Seog [1 ]
Kang, Jungho [1 ]
机构
[1] Soongsil Univ, Dept Comp Sci & Engn, Seoul 07027, South Korea
关键词
IoT; smart home; user authentication; smart home device; security; SECURITY CHALLENGES;
D O I
10.3390/su9071099
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
The development of information and communication technology (ICT) has opened the era of the Internet of Things (IoT), in which many devices can connect to the Internet to communicate. Recently, various technologies, such as smart grids, connected cars, and smart farms, have emerged based on IoT, and there is also the smart home, which is the fastest growing market. The smart home is where devices installed for various purposes connect to each other through the Internet so that users can use the service anytime and anywhere. However, while the smart home provides convenience to users, recently the smart home has been exposed to various security threats, such as vulnerability of session/cookies and the use of vulnerable OAuth. In addition, attacks on smart homes by hackers using these vulnerabilities are also increasing. Therefore, in this paper, we propose a user authentication method using the JSON Web Token (JWT) and International Mobile Equipment Identity (IMEI) in the smart home, and solved the problem of unauthorized smart home device registration of hackers by the application of IMEI and JWT technology.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] Strong Remote User Authentication Scheme using Smart Cards
    Martinez-Pelaez, Rafael
    Rico-Novella, Francisco
    Satizabal, Cristina
    Pomykala, Jacek
    PROCEEDINGS OF THE 8TH INTERNATIONAL NETWORK CONFERENCE (INC 2010), 2010, : 199 - 208
  • [22] Remote user authentication scheme using smart card: a review
    Karuppiah, Marimuthu
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2016, 9 (2-3) : 107 - 120
  • [23] An enhanced remote user authentication scheme using smart cards
    Awasthi, AK
    Lal, S
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 583 - 586
  • [24] Advance remote user authentication scheme using smart card
    Kumar S.
    Singh V.
    Sharma V.
    Singh V.P.
    Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2019, 78 (12): : 957 - 971
  • [25] A PLS-HECC-based device authentication and key agreement scheme for smart home networks
    Pirayesh, Jamshid
    Giaretta, Alberto
    Conti, Mauro
    Keshavarzi, Parviz
    COMPUTER NETWORKS, 2022, 216
  • [26] Robust smart-cards-based user authentication scheme with user anonymity
    Wu, Shuhua
    Zhu, Yuefei
    Pu, Qiong
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (02) : 236 - 248
  • [27] Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card
    Amin, Ruhul
    Maitra, Tanmoy
    Giri, Debasis
    Srivastava, P. D.
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (03) : 4629 - 4659
  • [28] Blockchain based authentication and access verfication scheme in smart home
    Heshmati A.
    Bayat M.
    Doostari M.A.
    Pournaghi S.M.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (03) : 2525 - 2547
  • [29] On the design of biometric-based user authentication protocol in smart city environment
    Bera, Basudeb
    Das, Ashok Kumar
    Balzano, Walter
    Medaglia, Carlo Maria
    PATTERN RECOGNITION LETTERS, 2020, 138 : 439 - 446
  • [30] A security enhanced user authentication scheme for multi-server environment without using smart cards
    Qiao, Pengshuai
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2015, 7 (02) : 197 - 210