Education, Science, Technology, Innovation and Life
Open Access
Sign In

A Lightweight Remote Mutual Authentication Scheme for Smart Home Environments

Download as PDF

DOI: 10.23977/acss.2022.060106 | Downloads: 21 | Views: 128

Author(s)

Shaomin Zhang 1, Yincai Zhang 1, Baoyi Wang 1

Affiliation(s)

1 School of Control and Computer Engineering, North China Electric Power University, China

Corresponding Author

Shaomin Zhang

ABSTRACT

Based on IoT technology, smart home owners can access smart devices remotely and enjoy convenient and efficient services. However, sensitive data collected by smart devices are vulnerable to attacks such as eavesdropping and impersonation when transmitted over untrusted channels. The security of resource-constrained smart devices is low, and attackers may use the controlled devices to further execute malicious behaviors. In order to solve the above existing security problems, a lightweight remote mutual authentication scheme is designed in this paper, which can be applied in resource-constrained smart home environments. Compared with related schemes, this scheme has lower computation overhead and communication overhead.

KEYWORDS

smart home, mutual authentication, lightweight, security

CITE THIS PAPER

Shaomin Zhang, Yincai Zhang and Baoyi Wang, A Lightweight Remote Mutual Authentication Scheme for Smart Home Environments. Advances in Computer, Signals and Systems (2022) Vol. 6: 40-45. DOI: http://dx.doi.org/10.23977/acss.2022.060106.

REFERENCES

[1] K. Sikder, G. Petracca, H. Aksu, T. Jaeger and A. S. Uluagac, A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications, in IEEE Communications Surveys & Tutorials, vol. 23, no. 2, pp. 1125-1159, Second quarter 2021.
[2] Data age 2025: The evolution of data to life-critical, [Online]. Available: https://www.import.io/wp-content/uploads/2017/04/Seagate-WP-DataAge2025-March-2017, accessed: Nov. 29, 2021.
[3] S. P. Mohanty, U. Choppali, and E. Kougianos, everything you wanted to know about smart cities, IEEE Consum. Electron. Mag., vol. 5, no. 3, pp. 60-70, Jul. 2016.
[4] S. Sendra, L. Parra, J. Lloret, and J. Tomas, Smart system for children chronic illness monitoring, Information Fusion, vol. 40, pp. 76-86, Mar 2018.
[5] R. Wijewickrama, A. Maiti, and M. Jadliwala, deWristified: Handwriting inference using wrist-based motion sensors revisited, in Proc. 12th Conf. Security Privacy Wireless Mobile Netw., 2019, pp. 49-59.
[6] C.-C. Chang and H.-D. Le, A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks, IEEE Trans. Wireless Commun., vol. 15, no. 1, pp. 357-366, Jan. 2016.
[7] A. K. Das, S. Kumari, V. Odelu, X. Li, F. Wu, and X. Huang, provably secure user authentication and key agreement scheme for wireless sensor networks, Secur. Commun. Netw., vol. 9, no. 16, pp. 3670-3687, 2016.
[8] P. Kumar, A. Gurtov, J. Iinatti, M. Ylianttila, and M. Sain, Lightweight and Secure session-key establishment scheme in smart home environments, IEEE Sensors J., vol. 16, no. 1, pp. 254-264, Jan. 2016.
[9] Shuai, M., Yu, N., Wang, H., Xiong, L., Anonymous authentication scheme for smart home environment with provable security. Computers & Security 86, 132-146, 2019. 
[10] Damandeep Kaur, Devender Kumar, Cryptanalysis and improvement of a two-factor user authentication scheme for smart home, Journal of Information Security and Applications, Volume 58, 2021.
[11] M. Wazid, A. K. Das, V. Odelu, N. Kumar and W. Susilo, "Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment," in IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 2, pp. 391-406, 1 March-April 2020.

Downloads: 1425
Visits: 74193

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.