A Study on a JWT-Based User Authentication and API Assessment Scheme Using IMEI in a Smart Home Environment

被引:3
作者
Hong, Namsu [1 ]
Kim, Mansik [1 ]
Jun, Moon-Seog [1 ]
Kang, Jungho [1 ]
机构
[1] Soongsil Univ, Dept Comp Sci & Engn, Seoul 07027, South Korea
关键词
IoT; smart home; user authentication; smart home device; security; SECURITY CHALLENGES;
D O I
10.3390/su9071099
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
The development of information and communication technology (ICT) has opened the era of the Internet of Things (IoT), in which many devices can connect to the Internet to communicate. Recently, various technologies, such as smart grids, connected cars, and smart farms, have emerged based on IoT, and there is also the smart home, which is the fastest growing market. The smart home is where devices installed for various purposes connect to each other through the Internet so that users can use the service anytime and anywhere. However, while the smart home provides convenience to users, recently the smart home has been exposed to various security threats, such as vulnerability of session/cookies and the use of vulnerable OAuth. In addition, attacks on smart homes by hackers using these vulnerabilities are also increasing. Therefore, in this paper, we propose a user authentication method using the JSON Web Token (JWT) and International Mobile Equipment Identity (IMEI) in the smart home, and solved the problem of unauthorized smart home device registration of hackers by the application of IMEI and JWT technology.
引用
收藏
页数:16
相关论文
共 50 条
[31]   A security enhanced user authentication scheme for multi-server environment without using smart cards [J].
Qiao, Pengshuai .
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2015, 7 (02) :197-210
[32]   A NOVEL REMOTE USER AUTHENTICATION SCHEME FOR MULTI-SERVER ENVIRONMENT WITHOUT USING SMART CARDS [J].
Yeh, Kuo-Hui ;
Lo, Nai Wei .
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (08) :3467-3478
[33]   A two-factor authentication scheme against FDM attack in IFTTT based Smart Home System [J].
Baruah, Barnana ;
Dhal, Subhasish .
COMPUTERS & SECURITY, 2018, 77 :21-35
[34]   A Multi-server Environment with Secure and Efficient Remote User Authentication Scheme Based on Dynamic ID Using Smart Cards [J].
Srinivas Jangirala ;
Sourav Mukhopadhyay ;
Ashok Kumar Das .
Wireless Personal Communications, 2017, 95 :2735-2767
[35]   A Multi-server Environment with Secure and Efficient Remote User Authentication Scheme Based on Dynamic ID Using Smart Cards [J].
Jangirala, Srinivas ;
Mukhopadhyay, Sourav ;
Das, Ashok Kumar .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (03) :2735-2767
[36]   A Self-Encryption Remote User Anonymous Authentication Scheme Using Smart Cards [J].
陆荣幸 ;
曹珍富 ;
苏仁旺 .
JournalofShanghaiJiaotongUniversity(Science), 2006, (02) :210-214
[37]   NCZKP Based Privacy-Preserving Authentication Scheme for the Untrusted Gateway Node Smart Home Environment [J].
Liu, Wenzheng ;
Wang, Xiaofeng ;
Peng, Wei .
2020 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2020, :391-396
[38]   Weaknesses and improvements of a remote user authentication scheme using smart cards [J].
HU LanlanNIU XinxinYANG Yixian Information Security CenterState Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing China .
TheJournalofChinaUniversitiesofPostsandTelecommunications, 2007, (03) :91-94
[39]   Security Analysis of a Remote User Authentication Scheme Using Smart Card [J].
Zhu, Canyan ;
Zhang, Lihua .
2008 INTERNATIONAL CONFERENCE ON NEURAL NETWORKS AND SIGNAL PROCESSING, VOLS 1 AND 2, 2007, :133-+
[40]   A secure remote user mutual authentication scheme using smart cards [J].
Karuppiah, Marimuthu ;
Saravanan, R. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (4-5) :282-294