A secure authentication scheme for IoT application in smart home

被引:0
|
作者
Pankaj Kumar
Lokesh Chouhan
机构
[1] National Institute of Technology,
关键词
Internet of things; Interface identifier; Authentication; Security; Access control; Smart home network;
D O I
暂无
中图分类号
学科分类号
摘要
The edge-based Internet of Things (IoT) computing provides a new value for the consumer where the smart devices, objects, and appliances connected over the internet. The data generated from the smart IoT devices need to be securely processed. With the increasing rate of smart IoT devices, the existing addressing schemes and security protocols do not guaranty to perform well in all situations. This paper proposed a smart card based secure addressing and authentication (SCSAA) scheme by modifying the standard IPv6 protocol to mitigate the security threats in the IoT network. The proposed scheme has two folds; firstly, this scheme provides a unique way of addressing by assigning unique 64-bit interface identifier (IID) to smart devices/appliances and uniquely authenticates them in IoT network. Secondly, this scheme uses the secret session key to prevent the network from unauthorized access. Additionally, this work also evaluates the informal security analysis, formal security analysis using ROR model and AVISPA tool. The overall security analysis proves that proposed scheme protect the smart home IoT network from various vulnerabilities and attacks.
引用
收藏
页码:420 / 438
页数:18
相关论文
共 50 条
  • [31] Design of Secure IoT Platform for Smart Home System
    Arvandy
    Bandung, Yoanes
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, COMPUTER, AND ELECTRICAL ENGINEERING (ICITACEE), 2018, : 114 - 119
  • [32] An Unlinkable Authentication Scheme for Distributed IoT Application
    Zhou, Yousheng
    Liu, Tong
    Tang, Fei
    Tinashe, Magara
    [J]. IEEE ACCESS, 2019, 7 : 14757 - 14766
  • [33] Study on the Application of IOT in Smart Home
    Jiao, Keying
    [J]. PROCEEDINGS OF 2014 2ND INTERNATIONAL CONFERENCE IN HUMANITIES, SOCIAL SCIENCES AND GLOBAL BUSINESS MANAGEMENT (ISSGBM 2014), VOL 27, 2014, 27 : 245 - 250
  • [34] IoT Application with Tortoise Smart Home
    Qian, Siying
    [J]. 2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021, 2021, : 541 - 547
  • [35] A Robust Two-Factor User Authentication Scheme-Based ECC for Smart Home in IoT
    Zou, Shihong
    Cao, Qiang
    Wang, Chenyu
    Huang, Zifu
    Xu, Guoai
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 4938 - 4949
  • [36] GDPR Compliance IoT Authentication Model for Smart Home Environment
    Merzeh, Hisham Raad Jafer
    Kara, Mustafa
    Aydin, Muhammed Ali
    Balik, Hasan Huseyin
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 31 (03): : 1953 - 1970
  • [37] A Secure RFID Application Revocation Scheme for IoT
    Fan, Kai
    Du, Zhao
    Gong, Yuanyuan
    Wang, Yue
    Yan, Tongjiang
    Li, Hui
    Yang, Yintang
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (08): : 2027 - 2035
  • [38] An improved mutual authentication scheme for smart card secure messaging
    Dang, LJ
    Koi, WD
    Xiao, YX
    [J]. PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY FOR DYNAMIC E-BUSINESS, 2004, : 261 - 264
  • [39] Scalable and efficient authentication scheme for secure smart grid communication
    Hammami, Hamza
    Ben Yahia, Sadok
    Obaidat, Mohammad S.
    [J]. IET NETWORKS, 2020, 9 (04) : 165 - 169
  • [40] A New Secure Password Authentication Scheme Using Smart Cards
    WANG Bangju1
    2. School of Science
    3. College of Information Science and Engineering
    Zhengzhou 450001
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 739 - 743