A Lightweight Remote Mutual Authentication Scheme for Smart Home Environments
DOI: 10.23977/acss.2022.060106 | Downloads: 33 | Views: 756
Author(s)
Shaomin Zhang 1, Yincai Zhang 1, Baoyi Wang 1
Affiliation(s)
1 School of Control and Computer Engineering, North China Electric Power University, China
Corresponding Author
Shaomin ZhangABSTRACT
Based on IoT technology, smart home owners can access smart devices remotely and enjoy convenient and efficient services. However, sensitive data collected by smart devices are vulnerable to attacks such as eavesdropping and impersonation when transmitted over untrusted channels. The security of resource-constrained smart devices is low, and attackers may use the controlled devices to further execute malicious behaviors. In order to solve the above existing security problems, a lightweight remote mutual authentication scheme is designed in this paper, which can be applied in resource-constrained smart home environments. Compared with related schemes, this scheme has lower computation overhead and communication overhead.
KEYWORDS
smart home, mutual authentication, lightweight, securityCITE THIS PAPER
Shaomin Zhang, Yincai Zhang and Baoyi Wang, A Lightweight Remote Mutual Authentication Scheme for Smart Home Environments. Advances in Computer, Signals and Systems (2022) Vol. 6: 40-45. DOI: http://dx.doi.org/10.23977/acss.2022.060106.
REFERENCES
[1] K. Sikder, G. Petracca, H. Aksu, T. Jaeger and A. S. Uluagac, A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications, in IEEE Communications Surveys & Tutorials, vol. 23, no. 2, pp. 1125-1159, Second quarter 2021.
[2] Data age 2025: The evolution of data to life-critical, [Online]. Available: https://www.import.io/wp-content/uploads/2017/04/Seagate-WP-DataAge2025-March-2017, accessed: Nov. 29, 2021.
[3] S. P. Mohanty, U. Choppali, and E. Kougianos, everything you wanted to know about smart cities, IEEE Consum. Electron. Mag., vol. 5, no. 3, pp. 60-70, Jul. 2016.
[4] S. Sendra, L. Parra, J. Lloret, and J. Tomas, Smart system for children chronic illness monitoring, Information Fusion, vol. 40, pp. 76-86, Mar 2018.
[5] R. Wijewickrama, A. Maiti, and M. Jadliwala, deWristified: Handwriting inference using wrist-based motion sensors revisited, in Proc. 12th Conf. Security Privacy Wireless Mobile Netw., 2019, pp. 49-59.
[6] C.-C. Chang and H.-D. Le, A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks, IEEE Trans. Wireless Commun., vol. 15, no. 1, pp. 357-366, Jan. 2016.
[7] A. K. Das, S. Kumari, V. Odelu, X. Li, F. Wu, and X. Huang, provably secure user authentication and key agreement scheme for wireless sensor networks, Secur. Commun. Netw., vol. 9, no. 16, pp. 3670-3687, 2016.
[8] P. Kumar, A. Gurtov, J. Iinatti, M. Ylianttila, and M. Sain, Lightweight and Secure session-key establishment scheme in smart home environments, IEEE Sensors J., vol. 16, no. 1, pp. 254-264, Jan. 2016.
[9] Shuai, M., Yu, N., Wang, H., Xiong, L., Anonymous authentication scheme for smart home environment with provable security. Computers & Security 86, 132-146, 2019.
[10] Damandeep Kaur, Devender Kumar, Cryptanalysis and improvement of a two-factor user authentication scheme for smart home, Journal of Information Security and Applications, Volume 58, 2021.
[11] M. Wazid, A. K. Das, V. Odelu, N. Kumar and W. Susilo, "Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment," in IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 2, pp. 391-406, 1 March-April 2020.
Downloads: | 11330 |
---|---|
Visits: | 240214 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks