Secure user authentication and key agreement scheme for IoT device access control based smart home communications

被引:14
|
作者
Uppuluri, Sirisha [1 ]
Lakshmeeswari, G. [1 ]
机构
[1] GITAM Univ, Visakhapatnam 530045, Andhra Pradesh, India
关键词
Internet of things (IoT); Authentication; Key agreement; Smart home; Security; Device access control; Attacks; MUTUAL AUTHENTICATION; THINGS IOT; INTERNET; ENCRYPTION; CRYPTANALYSIS; PROTOCOL;
D O I
10.1007/s11276-022-03197-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The upcoming paradigm in Internet of Things (IoT) based applications is to afford effective interactional communication strategies between the devices in the smart home system. With the rapid growth of IoT services, the incorporation of security measures becomes a vital concern. The general issue faced in the security of the intercommunication between the devices and the users is improper authentication between them. Also, the access control of devices must be ensured with reliable features for establishing secure communication between the users and devices. Hence, we propose a protocol called Modified Honey Encryption using Inverse Sampling-Conditional Probability Model Transform (MHE-IS-CPMT) with Elliptic Curve Cryptography (ECC) to authenticate and perform the key agreement. Here, we employ the following steps: (1) Initialization, (2) Registration, (3) Login and data access Request, (4) Authentication and Session key agreement, and (5) Key update. At the commencement of the session, the users (u), Mobile Users (MU), and the other devices participating in the smart home system are initialized to the Home network head (H). Then, for the registration process, the user and the devices register them into H via the smart gateway (SG) by providing their own identities. The user details and the data about the devices are secured using the MHE-IS-CPMT with the ECC method. Next, during the login process, the registered users connect to the smart home system and send a request to SG to gain access to the devices. After verification, the user is authenticated and the system enables them to acquire the device access control by providing them with the private key of the device. In addition, the proposed system facilitates the secure key change procedure for the legitimate user to update their key whenever required. Hence, the performance of the model is secured against different types of attacks and also obtains more security features than existing methods.
引用
收藏
页码:1333 / 1354
页数:22
相关论文
共 50 条
  • [41] An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards
    Li, Chun-Ta
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 517 - 520
  • [42] A secure and effcient mutual authentication and key agreement protocol with smart cards for wireless communications
    Guo, Cheng
    Chang, Chin-Chen
    Chang, Shih-Chang
    International Journal of Network Security, 2018, 20 (02) : 323 - 331
  • [43] A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems
    Chun-Ta Li
    Cheng-Chi Lee
    Chi-Yao Weng
    Journal of Medical Systems, 2014, 38
  • [44] An authentication and key agreement scheme for smart grid
    Safkhani, Masoumeh
    Kumari, Saru
    Shojafar, Mohammad
    Kumar, Sachin
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (03) : 1595 - 1616
  • [45] An authentication and key agreement scheme for smart grid
    Masoumeh Safkhani
    Saru Kumari
    Mohammad Shojafar
    Sachin Kumar
    Peer-to-Peer Networking and Applications, 2022, 15 : 1595 - 1616
  • [46] A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems
    Li, Chun-Ta
    Lee, Cheng-Chi
    Weng, Chi-Yao
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (09)
  • [47] A More Efficient and Secure Untraceable Remote User Password Authentication Scheme Using Smart Card with Session Key Agreement
    Sahu, Ajay Kumar
    Kumar, Ashish
    COMPUTER COMMUNICATION, NETWORKING AND INTERNET SECURITY, 2017, 5 : 395 - 410
  • [48] An Effective and Secure User Authentication and Key Agreement Scheme in m-Healthcare Systems
    Lee, Young Sil
    Ndibanje, Bruce
    Alasaarela, Esko
    Kim, TaeYong
    Lee, HoonJae
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1685 - 1690
  • [49] An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT
    Tyagi, Pooja
    Kumari, Saru
    Alzahrani, Bander A.
    Gupta, Anshay
    Yang, Ming-Hour
    SENSORS, 2022, 22 (22)
  • [50] A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme
    Chandrakar, Preeti
    Om, Hari
    INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2016, 12 (02) : 62 - 79