A Secure and Anonymous User Authentication Scheme for IoT-Enabled Smart Home Environments Using PUF

被引:13
|
作者
Cho, Yeongjae [1 ]
Oh, Jihyeon [1 ]
Kwon, Deokkyu [1 ]
Son, Seunghwan [1 ]
Lee, Joonyoung [1 ]
Park, Youngho [1 ,2 ]
机构
[1] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
[2] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
基金
新加坡国家研究基金会;
关键词
Authentication; Smart homes; Security; Logic gates; Physical unclonable function; Elliptic curve cryptography; Performance evaluation; Internet of Things; smart home; authentication; physical unclonable functions; ROR model; BAN logic; AVISPA; PROTOCOL; LIGHTWEIGHT; SYSTEM;
D O I
10.1109/ACCESS.2022.3208347
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the continuous development of Internet of Things (IoT) technology, research on smart home environments is being conducted by many researchers. In smart home environments, home users can remotely access and control a variety of home devices such as smart curtains, lights, and speakers placed throughout the house. Despite providing convenient services, including home monitoring, temperature management, and daily work assistance, smart homes can be vulnerable to malicious attacks because all messages are transmitted over insecure channels. Moreover, home devices can be a target for device capture attacks since they are placed in physically accessible locations. Therefore, a secure authentication and key agreement scheme is required to prevent such security problems. In 2021, Zou et al. proposed a two-factor-based authentication and key agreement scheme using elliptic curve cryptography (ECC) in smart home environments. They claimed that their scheme provides user anonymity and forward secrecy. However, we prove that their scheme suffers from forgery, ephemeral secret leakage, and session key disclosure attacks. To overcome the security vulnerabilities of Zou et al.'s scheme and provide home users with secure communication in smart home environments, we propose a secure user authentication scheme using physical unclonable functions (PUF). We utilize Real-or-Random (ROR) model and Burrows-Abadi-Needham (BAN) logic to verify the session key security and mutual authentication of the proposed scheme, respectively. Furthermore, we use the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool to simulate the resistance of our scheme to security attacks. After that, we analyze and compare the communication costs, computational consumption, and security functionalities along with related schemes.
引用
收藏
页码:101330 / 101346
页数:17
相关论文
共 50 条
  • [21] A secure anonymous authentication scheme for wireless communications using smart cards
    Lu, Yanrong
    Wu, Xiaobo
    Yang, Xiaodong
    [J]. International Journal of Network Security, 2015, 17 (03) : 237 - 245
  • [22] An anonymous and provably secure authentication scheme for mobile user
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Amin, Ruhul
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (09) : 1529 - 1544
  • [23] A Secure Three-Factor Anonymous User Authentication Scheme for Internet of Things Environments
    Chang, Ya-Fen
    Tai, Wei-Liang
    Hou, Po-Lin
    Lai, Kuan-Yu
    [J]. SYMMETRY-BASEL, 2021, 13 (07):
  • [24] Secure user authentication and key agreement scheme for IoT device access control based smart home communications
    Uppuluri, Sirisha
    Lakshmeeswari, G.
    [J]. WIRELESS NETWORKS, 2023, 29 (03) : 1333 - 1354
  • [25] Secure and Efficient Authentication Scheme in IoT Environments
    Thakare, Abhijeet
    Kim, Young-Gab
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (03): : 1 - 27
  • [26] Secure user authentication and key agreement scheme for IoT device access control based smart home communications
    Sirisha Uppuluri
    G. Lakshmeeswari
    [J]. Wireless Networks, 2023, 29 : 1333 - 1354
  • [27] Blockchain-Based Robust Data Security Scheme in IoT-Enabled Smart Home
    Vangala, Anusha
    Das, Ashok Kumar
    Park, YoungHo
    Jamal, Sajjad Shaukat
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (02): : 3549 - 3570
  • [28] A Secure IoT Enabled Smart Home System
    Srinivasan, P.
    Anusha, B.
    Reddy, K. Satish Kumar
    Reddy, N. Chandra Sekhar
    Maheswari, K.
    [J]. INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (04) : 466 - 472
  • [29] Secure Cyber Engineering for IoT-Enabled Smart Healthcare System
    Pandey, Abhishek Kumar
    Das, Ashok Kumar
    Kumar, Rajeev
    Rodrigues, Joel J. P. C.
    [J]. IEEE Internet of Things Magazine, 2024, 7 (02): : 70 - 77
  • [30] Lightweight and Anonymous Group Authentication Scheme Based on PUF in the Smart Grid
    Zhou, Yang
    Yang, Bing
    Liu, Dengzhi
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2023, 24 (05): : 1055 - 1065