Secure user authentication and key agreement scheme for IoT device access control based smart home communications

被引:0
|
作者
Sirisha Uppuluri
G. Lakshmeeswari
机构
[1] GITAM University,
来源
Wireless Networks | 2023年 / 29卷
关键词
Internet of things (IoT); Authentication; Key agreement; Smart home; Security; Device access control; Attacks;
D O I
暂无
中图分类号
学科分类号
摘要
The upcoming paradigm in Internet of Things (IoT) based applications is to afford effective interactional communication strategies between the devices in the smart home system. With the rapid growth of IoT services, the incorporation of security measures becomes a vital concern. The general issue faced in the security of the intercommunication between the devices and the users is improper authentication between them. Also, the access control of devices must be ensured with reliable features for establishing secure communication between the users and devices. Hence, we propose a protocol called Modified Honey Encryption using Inverse Sampling-Conditional Probability Model Transform (MHE-IS-CPMT) with Elliptic Curve Cryptography (ECC) to authenticate and perform the key agreement. Here, we employ the following steps: (1) Initialization, (2) Registration, (3) Login and data access Request, (4) Authentication and Session key agreement, and (5) Key update. At the commencement of the session, the users (u), Mobile Users (MU), and the other devices participating in the smart home system are initialized to the Home network head (H). Then, for the registration process, the user and the devices register them into H via the smart gateway (SG) by providing their own identities. The user details and the data about the devices are secured using the MHE-IS-CPMT with the ECC method. Next, during the login process, the registered users connect to the smart home system and send a request to SG to gain access to the devices. After verification, the user is authenticated and the system enables them to acquire the device access control by providing them with the private key of the device. In addition, the proposed system facilitates the secure key change procedure for the legitimate user to update their key whenever required. Hence, the performance of the model is secured against different types of attacks and also obtains more security features than existing methods.
引用
收藏
页码:1333 / 1354
页数:21
相关论文
共 50 条
  • [1] Secure user authentication and key agreement scheme for IoT device access control based smart home communications
    Uppuluri, Sirisha
    Lakshmeeswari, G.
    [J]. WIRELESS NETWORKS, 2023, 29 (03) : 1333 - 1354
  • [2] A secure authentication scheme for IoT application in smart home
    Kumar, Pankaj
    Chouhan, Lokesh
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (01) : 420 - 438
  • [3] A secure authentication scheme for IoT application in smart home
    Pankaj Kumar
    Lokesh Chouhan
    [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 420 - 438
  • [4] A PLS-HECC-based device authentication and key agreement scheme for smart home networks
    Pirayesh, Jamshid
    Giaretta, Alberto
    Conti, Mauro
    Keshavarzi, Parviz
    [J]. Computer Networks, 2022, 216
  • [5] A PLS-HECC-based device authentication and key agreement scheme for smart home networks
    Pirayesh, Jamshid
    Giaretta, Alberto
    Conti, Mauro
    Keshavarzi, Parviz
    [J]. COMPUTER NETWORKS, 2022, 216
  • [6] Secure device authentication and key agreement mechanism for LoRaWAN based IoT networks
    Naidu, Devishree
    Ray, Niranjan K.
    [J]. Concurrency and Computation: Practice and Experience, 2024, 36 (27)
  • [7] Secure Key Agreement and Key Protection for Mobile Device User Authentication
    Wu, Libing
    Wang, Jing
    Choo, Kim-Kwang Raymond
    He, Debiao
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) : 319 - 330
  • [8] Toward a Secure Smart-Home IoT Access Control Scheme Based on Home Registration Approach
    Wu, Tsu-Yang
    Meng, Qian
    Chen, Yeh-Cheng
    Kumari, Saru
    Chen, Chien-Ming
    [J]. MATHEMATICS, 2023, 11 (09)
  • [9] A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment
    Yu, Yicheng
    Hu, Liang
    Chu, Jianfeng
    [J]. SYMMETRY-BASEL, 2020, 12 (01):
  • [10] Secure Authentication Scheme Using Diffie-Hellman Key Agreement for Smart IoT Irrigation Systems
    Nashwan, Shadi
    [J]. ELECTRONICS, 2022, 11 (02)