Similarity Learning-Based Supervised Discrete Hash Signature Scheme for authentication of smart home scenario

被引:0
|
作者
Sudha K.S. [1 ]
Jeyanthi N. [1 ]
机构
[1] School of Information Technology and Engineering, VIT, Tamil Nadu, Vellore
关键词
Communication overhead; Similarity Learning; Smart home; Supervised Discrete Hash Signature Scheme; User authentication;
D O I
10.1007/s41870-022-00920-1
中图分类号
学科分类号
摘要
Smart home technology is one of the significant emerging application in the Internet of Things (IoT) that facilitates the user to control home devices in the remote manner. In this context, investigating and addressing IoT security issues is highly challenging as the operating strategies of IoT application differs due to their heterogeneity characteristics. At this juncture, an authentication mechanism with anonymity and efficiency is necessary for facilitating secure communication in the smart home scenario, since the user or home communication channels are generally determined to be highly insecure. In this paper, Similarity Learning-Based Supervised Discrete Hash Signature Scheme (SLSDHS) is proposed for achieving secure user during the process of smart home authentication. This proposed SLSDHS utilized a supervised learning strategy that derives the potentiality of learning the mutual similarities of user behavior patterns in order to facilitate secure authentication. It leverages the mutual association between possible semantic labels in order to learn maximized more stable hash codes, which is a predominant improvement over the traditional hash code approaches. It was also proposed for facilitating projections among the original features and their related hash codes that can simultaneously learn discrete hash codes during the process of training samples. The communication overhead and computation overhead of the proposed SLSDHS is identified to be considerably minimized compared to the benchmarked schemes used for comparison. The security analysis of the proposed SLSDHS scheme evaluated using informal analysis, formal analysis and AVIPSA tool-based model checks confirmed its predominance with respect to automated testing of internet security protocols. © 2022, The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management.
引用
收藏
页码:3377 / 3389
页数:12
相关论文
共 25 条
  • [21] Development of Video Encryption Scheme Based on Quantum Controlled Dense Coding Using GHZ State for Smart Home Scenario
    Hongyang Ma
    Yulin Ma
    Wenbin Zhang
    Xiaolong Zhao
    Pengcheng Chu
    Wireless Personal Communications, 2022, 123 : 295 - 309
  • [22] Reinforcement Learning-Based Energy Management of Smart Home with Rooftop Solar Photovoltaic System, Energy Storage System, and Home Appliances
    Lee, Sangyoon
    Choi, Dae-Hyun
    SENSORS, 2019, 19 (18)
  • [23] Machine learning-based demand response in PV-based smart home considering energy management in digital twin
    Huang, Jueru
    Koroteev, Dmitry D.
    Rynkovskaya, Marina
    SOLAR ENERGY, 2023, 252 : 8 - 19
  • [24] A privacy-preserving distributed energy management framework based on vertical federated learning-based smart data cleaning for smart home electricity data
    Lin, Yu-Hsiu
    Ciou, Jian-Cheng
    INTERNET OF THINGS, 2024, 26
  • [25] Machine learning and smart card based two-factor authentication scheme for preserving anonymity in telecare medical information system (TMIS)
    Gupta, B. B.
    Prajapati, Varun
    Nedjah, Nadia
    Vijayakumar, P.
    Abd El-Latif, Ahmed A.
    Chang, Xiaojun
    NEURAL COMPUTING & APPLICATIONS, 2023, 35 (07) : 5055 - 5080