Similarity Learning-Based Supervised Discrete Hash Signature Scheme for authentication of smart home scenario

被引:0
|
作者
Sudha K.S. [1 ]
Jeyanthi N. [1 ]
机构
[1] School of Information Technology and Engineering, VIT, Tamil Nadu, Vellore
关键词
Communication overhead; Similarity Learning; Smart home; Supervised Discrete Hash Signature Scheme; User authentication;
D O I
10.1007/s41870-022-00920-1
中图分类号
学科分类号
摘要
Smart home technology is one of the significant emerging application in the Internet of Things (IoT) that facilitates the user to control home devices in the remote manner. In this context, investigating and addressing IoT security issues is highly challenging as the operating strategies of IoT application differs due to their heterogeneity characteristics. At this juncture, an authentication mechanism with anonymity and efficiency is necessary for facilitating secure communication in the smart home scenario, since the user or home communication channels are generally determined to be highly insecure. In this paper, Similarity Learning-Based Supervised Discrete Hash Signature Scheme (SLSDHS) is proposed for achieving secure user during the process of smart home authentication. This proposed SLSDHS utilized a supervised learning strategy that derives the potentiality of learning the mutual similarities of user behavior patterns in order to facilitate secure authentication. It leverages the mutual association between possible semantic labels in order to learn maximized more stable hash codes, which is a predominant improvement over the traditional hash code approaches. It was also proposed for facilitating projections among the original features and their related hash codes that can simultaneously learn discrete hash codes during the process of training samples. The communication overhead and computation overhead of the proposed SLSDHS is identified to be considerably minimized compared to the benchmarked schemes used for comparison. The security analysis of the proposed SLSDHS scheme evaluated using informal analysis, formal analysis and AVIPSA tool-based model checks confirmed its predominance with respect to automated testing of internet security protocols. © 2022, The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management.
引用
收藏
页码:3377 / 3389
页数:12
相关论文
共 25 条
  • [1] Blockchain based authentication and access verfication scheme in smart home
    Heshmati A.
    Bayat M.
    Doostari M.A.
    Pournaghi S.M.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (03) : 2525 - 2547
  • [2] A Design of Efficient Multi-Authentication Scheme Using a Merkle Hash Tree in the Smart Home Environments
    Kim, Mansik
    Choi, Won-Kyu
    Jun, Moon-Seog
    ADVANCED SCIENCE LETTERS, 2016, 22 (09) : 2538 - 2542
  • [3] An efficient Authentication Scheme Using Token Distribution for Cloud-based Smart Home
    Kou, Ruiming
    Wang, Yazhe
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL AND COMPUTER APPLICATION, 2016, 30 : 451 - 455
  • [4] A PLS-HECC-based device authentication and key agreement scheme for smart home networks
    Pirayesh, Jamshid
    Giaretta, Alberto
    Conti, Mauro
    Keshavarzi, Parviz
    COMPUTER NETWORKS, 2022, 216
  • [5] A flexible authentication scheme for smart home networks using app interactions and machine learning
    Ashibani, Yosef
    Mahmoud, Qusay H.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 39 (05) : 6009 - 6020
  • [6] Blockchain-based cloud-fog collaborative smart home authentication scheme
    Yang, Huan
    Guo, Yajun
    Guo, Yimin
    COMPUTER NETWORKS, 2024, 242
  • [7] A Study on a JWT-Based User Authentication and API Assessment Scheme Using IMEI in a Smart Home Environment
    Hong, Namsu
    Kim, Mansik
    Jun, Moon-Seog
    Kang, Jungho
    SUSTAINABILITY, 2017, 9 (07)
  • [8] A Multifactor Ring Signature based Authentication Scheme forQuality Assessment of IoMT Environment in COVID-19 Scenario
    Chatterjee, Kakali
    Singh, Ashish
    Neha
    Yu, Keping
    ACM JOURNAL OF DATA AND INFORMATION QUALITY, 2023, 15 (02):
  • [9] Fog-enabled private blockchain-based identity authentication scheme for smart home
    Xu, Xianbin
    Guo, Yajun
    Guo, Yimin
    COMPUTER COMMUNICATIONS, 2023, 205 : 58 - 68
  • [10] A Robust and Anonymous Three-Factor Authentication Scheme Based ECC for Smart Home Environments
    Wang, Xiong
    Teng, Yuan
    Chi, Yaping
    Hu, Hongbo
    SYMMETRY-BASEL, 2022, 14 (11):