A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes

被引:47
|
作者
Oh, JiHyeon [1 ]
Yu, SungJin [1 ,2 ]
Lee, JoonYoung [1 ]
Son, SeungHwan [1 ]
Kim, MyeongHyun [1 ]
Park, YoungHo [1 ,3 ]
机构
[1] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
[2] Elect & Telecommun Res Inst, Daejeon 34129, South Korea
[3] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
基金
新加坡国家研究基金会;
关键词
smart homes; IoT; authentication; BAN logic; ROR model; AVISPA; KEY MANAGEMENT PROTOCOL; PROVABLY SECURE; SCHEME; INTERNET; PRIVACY; DESIGN; ACCESS; ROBUST;
D O I
10.3390/s21041488
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
With the information and communication technologies (ICT) and Internet of Things (IoT) gradually advancing, smart homes have been able to provide home services to users. The user can enjoy a high level of comfort and improve his quality of life by using home services provided by smart devices. However, the smart home has security and privacy problems, since the user and smart devices communicate through an insecure channel. Therefore, a secure authentication protocol should be established between the user and smart devices. In 2020, Xiang and Zheng presented a situation-aware protocol for device authentication in smart grid-enabled smart home environments. However, we demonstrate that their protocol can suffer from stolen smart device, impersonation, and session key disclosure attacks and fails to provide secure mutual authentication. Therefore, we propose a secure and lightweight authentication protocol for IoT-based smart homes to resolve the security flaws of Xiang and Zheng's protocol. We proved the security of the proposed protocol by performing informal and formal security analyses, using the real or random (ROR) model, Burrows-Abadi-Needham (BAN) logic, and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Moreover, we provide a comparison of performance and security properties between the proposed protocol and related existing protocols. We demonstrate that the proposed protocol ensures better security and lower computational costs than related protocols, and is suitable for practical IoT-based smart home environments.
引用
收藏
页码:1 / 24
页数:24
相关论文
共 50 条
  • [21] Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures
    Samad Rostampour
    Nasour Bagheri
    Behnam Ghavami
    Ygal Bendavid
    Saru Kumari
    Honorio Martin
    Carmen Camara
    [J]. The Journal of Supercomputing, 2024, 80 : 1668 - 1693
  • [22] Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures
    Rostampour, Samad
    Bagheri, Nasour
    Ghavami, Behnam
    Bendavid, Ygal
    Kumari, Saru
    Martin, Honorio
    Camara, Carmen
    [J]. JOURNAL OF SUPERCOMPUTING, 2024, 80 (02): : 1668 - 1693
  • [23] SEA: A Secure and Efficient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways
    Moosavi, Sanaz Rahimi
    Tuan Nguyen Gia
    Rahmani, Amir-Mohammad
    Nigussie, Ethiopia
    Virtanen, Seppo
    Isoaho, Jouni
    Tenhunen, Hannu
    [J]. 6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015), 2015, 52 : 452 - 459
  • [24] Enhanced secure and efficient mutual authentication protocol in IoT-based energy internet using blockchain
    Benrebbouh, Chahrazed
    Mansouri, Houssem
    Cherbal, Sarra
    Pathan, Al-Sakib Khan
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (01) : 68 - 88
  • [25] Lightweight IoT-based authentication scheme in cloud computing circumstance
    Zhou, Lu
    Li, Xiong
    Yeh, Kuo-Hui
    Su, Chunhua
    Chiu, Wayne
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 : 244 - 251
  • [26] Enhanced secure and efficient mutual authentication protocol in IoT-based energy internet using blockchain
    Chahrazed Benrebbouh
    Houssem Mansouri
    Sarra Cherbal
    Al-Sakib Khan Pathan
    [J]. Peer-to-Peer Networking and Applications, 2024, 17 : 68 - 88
  • [27] WSN- and IOT-Based Smart Homes and Their Extension to Smart Buildings
    Ghayvat, Hemant
    Mukhopadhyay, Subhas
    Gui, Xiang
    Suryadevara, Nagender
    [J]. SENSORS, 2015, 15 (05): : 10350 - 10379
  • [28] Lightweight and Secure Password Based Smart Home Authentication Protocol: LSP-SHAP
    Naoui, Sarra
    Elhdhili, Mohamed Elhoucine
    Saidane, Leila Azouz
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2019, 27 (04) : 1020 - 1042
  • [29] Lightweight and Secure Password Based Smart Home Authentication Protocol: LSP-SHAP
    Sarra Naoui
    Mohamed Elhoucine Elhdhili
    Leila Azouz Saidane
    [J]. Journal of Network and Systems Management, 2019, 27 : 1020 - 1042
  • [30] A Secure IoT-Based Authentication System in Cloud Computing Environment
    Wu, Hsiao-Ling
    Chang, Chin-Chen
    Zheng, Yao-Zhu
    Chen, Long-Sheng
    Chen, Chih-Cheng
    [J]. SENSORS, 2020, 20 (19) : 1 - 14