A Secure and Anonymous User Authentication Scheme for IoT-Enabled Smart Home Environments Using PUF

被引:13
|
作者
Cho, Yeongjae [1 ]
Oh, Jihyeon [1 ]
Kwon, Deokkyu [1 ]
Son, Seunghwan [1 ]
Lee, Joonyoung [1 ]
Park, Youngho [1 ,2 ]
机构
[1] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
[2] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
基金
新加坡国家研究基金会;
关键词
Authentication; Smart homes; Security; Logic gates; Physical unclonable function; Elliptic curve cryptography; Performance evaluation; Internet of Things; smart home; authentication; physical unclonable functions; ROR model; BAN logic; AVISPA; PROTOCOL; LIGHTWEIGHT; SYSTEM;
D O I
10.1109/ACCESS.2022.3208347
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the continuous development of Internet of Things (IoT) technology, research on smart home environments is being conducted by many researchers. In smart home environments, home users can remotely access and control a variety of home devices such as smart curtains, lights, and speakers placed throughout the house. Despite providing convenient services, including home monitoring, temperature management, and daily work assistance, smart homes can be vulnerable to malicious attacks because all messages are transmitted over insecure channels. Moreover, home devices can be a target for device capture attacks since they are placed in physically accessible locations. Therefore, a secure authentication and key agreement scheme is required to prevent such security problems. In 2021, Zou et al. proposed a two-factor-based authentication and key agreement scheme using elliptic curve cryptography (ECC) in smart home environments. They claimed that their scheme provides user anonymity and forward secrecy. However, we prove that their scheme suffers from forgery, ephemeral secret leakage, and session key disclosure attacks. To overcome the security vulnerabilities of Zou et al.'s scheme and provide home users with secure communication in smart home environments, we propose a secure user authentication scheme using physical unclonable functions (PUF). We utilize Real-or-Random (ROR) model and Burrows-Abadi-Needham (BAN) logic to verify the session key security and mutual authentication of the proposed scheme, respectively. Furthermore, we use the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool to simulate the resistance of our scheme to security attacks. After that, we analyze and compare the communication costs, computational consumption, and security functionalities along with related schemes.
引用
收藏
页码:101330 / 101346
页数:17
相关论文
共 50 条
  • [1] Mutual authentication scheme for smart devices in IoT-enabled smart home systems
    Ma, Qingru
    Tan, Haowen
    Zhou, Tianqi
    [J]. COMPUTER STANDARDS & INTERFACES, 2023, 86
  • [2] Secure remote anonymous user authentication scheme for smart home environment
    Fakroon, Moneer
    Alshahrani, Mohammed
    Gebali, Fayez
    Traore, Issa
    [J]. INTERNET OF THINGS, 2020, 9
  • [3] A Secure, Lightweight, and Anonymous User Authentication Protocol for IoT Environments
    Son, Seunghwan
    Park, Yohan
    Park, Youngho
    [J]. SUSTAINABILITY, 2021, 13 (16)
  • [4] A secure authentication scheme for IoT application in smart home
    Kumar, Pankaj
    Chouhan, Lokesh
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (01) : 420 - 438
  • [5] A secure authentication scheme for IoT application in smart home
    Pankaj Kumar
    Lokesh Chouhan
    [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 420 - 438
  • [6] An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF
    Zahoor, Amina
    Mahmood, Khalid
    Shamshad, Salman
    Saleem, Muhammad Asad
    Ayub, Muhammad Faizan
    Conti, Mauro
    Das, Ashok Kumar
    [J]. INTERNET OF THINGS, 2023, 22
  • [7] An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments
    Banerjee, Soumya
    Odelu, Vanga
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Park, Youngho
    [J]. SENSORS, 2020, 20 (04)
  • [8] A Secure User Authentication Scheme with Biometrics for IoT Medical Environments
    Park, YoHan
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (11) : 607 - 615
  • [9] LASUA: A Lightweight Authentication Scheme with User Anonymity for IoT-Enabled Mobile Cloud
    Amande, Vincent
    Kaur, Kuljeet
    Garg, Sahil
    Guizani, Mohsen
    [J]. 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 3563 - 3568
  • [10] A Lightweight Anonymous Authentication and Key Negotiation Scheme in Smart Home Environments
    ZUO Xinyu
    WANG Zhangang
    LI Anqian
    HUO Yuyan
    NIU Shufang
    [J]. Wuhan University Journal of Natural Sciences, 2023, 28 (06) : 523 - 530