A Study on a JWT-Based User Authentication and API Assessment Scheme Using IMEI in a Smart Home Environment

被引:3
作者
Hong, Namsu [1 ]
Kim, Mansik [1 ]
Jun, Moon-Seog [1 ]
Kang, Jungho [1 ]
机构
[1] Soongsil Univ, Dept Comp Sci & Engn, Seoul 07027, South Korea
关键词
IoT; smart home; user authentication; smart home device; security; SECURITY CHALLENGES;
D O I
10.3390/su9071099
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
The development of information and communication technology (ICT) has opened the era of the Internet of Things (IoT), in which many devices can connect to the Internet to communicate. Recently, various technologies, such as smart grids, connected cars, and smart farms, have emerged based on IoT, and there is also the smart home, which is the fastest growing market. The smart home is where devices installed for various purposes connect to each other through the Internet so that users can use the service anytime and anywhere. However, while the smart home provides convenience to users, recently the smart home has been exposed to various security threats, such as vulnerability of session/cookies and the use of vulnerable OAuth. In addition, attacks on smart homes by hackers using these vulnerabilities are also increasing. Therefore, in this paper, we propose a user authentication method using the JSON Web Token (JWT) and International Mobile Equipment Identity (IMEI) in the smart home, and solved the problem of unauthorized smart home device registration of hackers by the application of IMEI and JWT technology.
引用
收藏
页数:16
相关论文
共 50 条
[41]   A SECURITY ENHANCED REMOTE USER AUTHENTICATION SCHEME USING SMART CARDS [J].
Yoon, Eun-Jun ;
Kim, Sung-Ho ;
Yoo, Kee-Young .
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (5B) :3661-3675
[42]   Security Improvement on a Remote User Authentication Scheme Using Smart Cards [J].
Chen, Tien-Ho ;
Hsiang, Han-Cheng ;
Shih, Wei-Kuan .
INFORMATION SECURITY AND ASSURANCE, 2010, 76 :9-+
[43]   An efficient and complete remote user authentication scheme using smart cards [J].
Liaw, Horng-Twu ;
Lin, Jiann-Fu ;
Wu, Wei-Chen .
MATHEMATICAL AND COMPUTER MODELLING, 2006, 44 (1-2) :223-228
[44]   Cryptanalysis of a modified remote user authentication scheme using smart cards [J].
Leung, KC ;
Cheng, LM ;
Fong, AS ;
Chan, CK .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2003, 49 (04) :1243-1245
[45]   An enhanced smart card based remote user password authentication scheme [J].
Li, Xiong ;
Niu, Jianwei ;
Khan, Muhammad Khurram ;
Liao, Junguo .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (05) :1365-1371
[46]   An Improved Timestamp-Based User Authentication Scheme with Smart Card [J].
Feng, Tung-Huang ;
Ling, Chung-Huei ;
Hwang, Min-Shiang .
INDUSTRIAL ENGINEERING, MACHINE DESIGN AND AUTOMATION (IEMDA 2014) & COMPUTER SCIENCE AND APPLICATION (CCSA 2014), 2015, :111-117
[47]   A SMART CARD BASED AUTHENTICATION SCHEME FOR REMOTE USER LOGIN AND VERIFICATION [J].
Cheng, Zi-Yao ;
Liu, Yun ;
Chang, Chin-Chen ;
Chang, Shih-Chang .
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (08) :5499-5511
[48]   Smart Card Based Remote User Authentication Scheme for Cloud Computing [J].
Madhusudhan, R. ;
Hegde, Manjunath .
2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, :905-910
[49]   An Efficient Secure Scheme Based on Hierarchical Topology in the Smart Home Environment [J].
Kim, Mansik ;
Lim, Kyung-Soo ;
Song, Jungsuk ;
Jun, Moon-seog .
SYMMETRY-BASEL, 2017, 9 (08)
[50]   Blockchain-based cloud-fog collaborative smart home authentication scheme [J].
Yang, Huan ;
Guo, Yajun ;
Guo, Yimin .
COMPUTER NETWORKS, 2024, 242