A Security Protocol for Route Optimization in DMM-Based Smart Home IoT Networks

被引:40
|
作者
Shin, Daemin [1 ,2 ]
Yun, Keon [1 ]
Kim, Jiyoon [1 ]
Astillo, Philip Virgil [1 ]
Kim, Jeong-Nyeo [3 ]
You, Ilsun [1 ]
机构
[1] Soonchunhyang Univ, Dept Informat Secur Engn, Asan 31538, South Korea
[2] Financial Secur Inst, Yongin 16881, South Korea
[3] Elect & Telecommun Res Inst, Daejeon 34129, South Korea
关键词
Security; Smart homes; Optimization; Routing protocols; Manganese; 5G mobile communication; route optimization; distributed mobility management; smart home; IoT; MOBILITY MANAGEMENT; EFFICIENT PROTOCOL;
D O I
10.1109/ACCESS.2019.2943929
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart home networks have been recognized as one of its representative important applications in the forthcoming 5G era. It is also expected that in 5G networks, future smart home services will be much powered by mobility management, which enables users to remotely access and control their in-home Internet of Things (IoT) sensors and appliances anywhere anytime any device. As a major solution, Distributed IP Mobility Management (DMM) can be considered because it addresses the limitation of the centralized approaches as well as its flat architecture is suit for 5G networks. Obviously, without being protected, mobility management can cause smart home systems to be vulnerable to various security threats. Especially, it is of paramount important to protect data traffic transmitted between user mobile devices and their in-home IoT appliances because they include users sensitive and critical privacy information. Taking this into consideration, it is necessary to support secure route optimization, which allows the involved devices to directly communicate each other in secure way while minimizing possibility of information leakage during data transmission. According to our best knowledge, there is no study on securing route optimization for DMM networks. Motivated by this, we propose a secure route optimization protocol for DMM-based smart home systems. The proposed security protocol, composed of the route optimization initialization and handover phases, is designed to provide mutual authentication, key exchange, perfect forward secrecy, and privacy protection. Its security is thoroughly verified through the two formal security analysis tools, BAN-logic and Automated Validation of Internet Security Protocols and Applications (AVISPA). From the comparison analysis, it is shown that the proposed protocol is better than other standard protocols.
引用
收藏
页码:142531 / 142550
页数:20
相关论文
共 50 条
  • [31] MQTT Protocol based IoT solution for Voice-controlled Smart Home
    Samal, Soumya Ranjan
    Bandopadhaya, Shuvabrata
    Roy, Amarjit
    Mishra, Annapurna
    Mihovska, Albena
    Poulkov, Vladimir
    2023 26TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS, WPMC, 2023, : 171 - 175
  • [32] Identity Authentication Protocol of Smart Home IoT based on Chebyshev Chaotic Mapping
    Sun, Jingjing
    Zhang, Peng
    Kong, Xiaohong
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (04) : 557 - 565
  • [33] Secure Smart-Home Application Based on IoT-CoAP protocol
    Abosata, Nasr Rajb A.
    Kemp, Andrew H.
    Razavi, Mohsen
    2019 SIXTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2019, : 13 - 17
  • [34] NFV-based IoT Security for Home Networks using MUD
    Afek, Yehuda
    Bremler-Barr, Anat
    Hay, David
    Goldschmidt, Ran
    Shafir, Lior
    Avraham, Gafnit
    Shalev, Avraham
    NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE, 2020,
  • [35] IoT based Smart Security for the Blind
    Fernandes, Roshan
    Rodrigues, Anisha P.
    Sudeepa, K. B.
    2018 FOURTEENTH INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING (ICINPRO) - 2018, 2018, : 12 - 15
  • [36] A Research on IoT Based Smart Home
    Ma, Linlian
    Li, Zhangbing
    Zheng, Mingcai
    2019 11TH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2019), 2019, : 120 - 122
  • [37] Smart Home Security: A Distributed Identity-based Security Protocol for Authentication and Key Exchange
    Rathore, M. Mazhar
    Bentafat, Elmahdi
    Bakiras, Spiridon
    2019 28TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2019,
  • [38] Review of Security and Privacy-Based IoT Smart Home Access Control Devices
    Uppuluri, Sirisha
    Lakshmeeswari, G.
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 137 (03) : 1601 - 1640
  • [39] Research on Sensor-Gateway-Terminal Security Mechanism of Smart Home Based on IOT
    Li, Fei
    Wan, Zhou
    Xiong, Xin
    Tan, Jiajun
    INTERNET OF THINGS-BK, 2012, 312 : 415 - 422
  • [40] Amazon Echo Enabled IoT Home Security System for Smart Home Environment
    Thapliyal, Himanshu
    Ratajczak, Nathan
    Wendroth, Ole
    Labrado, Carson
    2018 IEEE 4TH INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2018), 2018, : 31 - 36