A Secure and Anonymous User Authentication Scheme for IoT-Enabled Smart Home Environments Using PUF

被引:13
|
作者
Cho, Yeongjae [1 ]
Oh, Jihyeon [1 ]
Kwon, Deokkyu [1 ]
Son, Seunghwan [1 ]
Lee, Joonyoung [1 ]
Park, Youngho [1 ,2 ]
机构
[1] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
[2] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
基金
新加坡国家研究基金会;
关键词
Authentication; Smart homes; Security; Logic gates; Physical unclonable function; Elliptic curve cryptography; Performance evaluation; Internet of Things; smart home; authentication; physical unclonable functions; ROR model; BAN logic; AVISPA; PROTOCOL; LIGHTWEIGHT; SYSTEM;
D O I
10.1109/ACCESS.2022.3208347
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the continuous development of Internet of Things (IoT) technology, research on smart home environments is being conducted by many researchers. In smart home environments, home users can remotely access and control a variety of home devices such as smart curtains, lights, and speakers placed throughout the house. Despite providing convenient services, including home monitoring, temperature management, and daily work assistance, smart homes can be vulnerable to malicious attacks because all messages are transmitted over insecure channels. Moreover, home devices can be a target for device capture attacks since they are placed in physically accessible locations. Therefore, a secure authentication and key agreement scheme is required to prevent such security problems. In 2021, Zou et al. proposed a two-factor-based authentication and key agreement scheme using elliptic curve cryptography (ECC) in smart home environments. They claimed that their scheme provides user anonymity and forward secrecy. However, we prove that their scheme suffers from forgery, ephemeral secret leakage, and session key disclosure attacks. To overcome the security vulnerabilities of Zou et al.'s scheme and provide home users with secure communication in smart home environments, we propose a secure user authentication scheme using physical unclonable functions (PUF). We utilize Real-or-Random (ROR) model and Burrows-Abadi-Needham (BAN) logic to verify the session key security and mutual authentication of the proposed scheme, respectively. Furthermore, we use the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool to simulate the resistance of our scheme to security attacks. After that, we analyze and compare the communication costs, computational consumption, and security functionalities along with related schemes.
引用
收藏
页码:101330 / 101346
页数:17
相关论文
共 50 条
  • [31] Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters
    Maurya, Anup Kumar
    Das, Ashok Kumar
    Jamal, Sajjad Shaukat
    Giri, Debasis
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 120
  • [32] Continuous authentication for IoT smart home environments
    Smith-Creasey, Max
    Furnell, Steven
    Rajarajan, Muttukrishnan
    [J]. Network Security, 2022, 2022 (04)
  • [33] IoT-Enabled Plant Monitoring System with Power Optimization and Secure Authentication
    Huda, Samsul
    Nogami, Yasuyuki
    Rahayu, Maya
    Akada, Takuma
    Hossain, Md Biplob
    Musthafa, Muhammad Bisri
    Jie, Yang
    Anh, Le Hoang
    [J]. Computers, Materials and Continua, 2024, 81 (02): : 3165 - 3187
  • [34] Anonymous Secure Framework in Connected Smart Home Environments
    Kumar, Pardeep
    Braeken, An
    Gurtov, Andrei
    Iinatti, Jari
    Ha, Phuong Hoai
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (04) : 968 - 979
  • [35] Design of an Intrusion Detection Model for IoT-Enabled Smart Home
    Rani, Deepti
    Gill, Nasib Singh
    Gulia, Preeti
    Arena, Fabio
    Pau, Giovanni
    [J]. IEEE ACCESS, 2023, 11 : 52509 - 52526
  • [36] Towards secure and efficient user authentication scheme using smart card for multi-server environments
    Chen, Te-Yu
    Lee, Cheng-Chi
    Hwang, Min-Shiang
    Jan, Jinn-Ke
    [J]. JOURNAL OF SUPERCOMPUTING, 2013, 66 (02): : 1008 - 1032
  • [37] Towards secure and efficient user authentication scheme using smart card for multi-server environments
    Te-Yu Chen
    Cheng-Chi Lee
    Min-Shiang Hwang
    Jinn-Ke Jan
    [J]. The Journal of Supercomputing, 2013, 66 : 1008 - 1032
  • [38] Secure and Anonymous Authentication Scheme for Mobile Edge Computing Environments
    Lee, Hakjun
    Ryu, Jihyeon
    Won, Dongho
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 5798 - 5815
  • [39] A provably secure and anonymous message authentication scheme for smart grids
    Li, Xiong
    Wu, Fan
    Kumari, Saru
    Xu, Lili
    Sangaiah, Arun Kumar
    Choo, Kim-Kwang Raymond
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 132 : 242 - 249
  • [40] Study on A Secure Remote User Authentication Scheme Using Smart Cards
    Jin Qiuyan
    Lee, Kwangwoo
    Won, Dongho
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (02): : 105 - 115