Secure user authentication and key agreement scheme for IoT device access control based smart home communications

被引:14
|
作者
Uppuluri, Sirisha [1 ]
Lakshmeeswari, G. [1 ]
机构
[1] GITAM Univ, Visakhapatnam 530045, Andhra Pradesh, India
关键词
Internet of things (IoT); Authentication; Key agreement; Smart home; Security; Device access control; Attacks; MUTUAL AUTHENTICATION; THINGS IOT; INTERNET; ENCRYPTION; CRYPTANALYSIS; PROTOCOL;
D O I
10.1007/s11276-022-03197-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The upcoming paradigm in Internet of Things (IoT) based applications is to afford effective interactional communication strategies between the devices in the smart home system. With the rapid growth of IoT services, the incorporation of security measures becomes a vital concern. The general issue faced in the security of the intercommunication between the devices and the users is improper authentication between them. Also, the access control of devices must be ensured with reliable features for establishing secure communication between the users and devices. Hence, we propose a protocol called Modified Honey Encryption using Inverse Sampling-Conditional Probability Model Transform (MHE-IS-CPMT) with Elliptic Curve Cryptography (ECC) to authenticate and perform the key agreement. Here, we employ the following steps: (1) Initialization, (2) Registration, (3) Login and data access Request, (4) Authentication and Session key agreement, and (5) Key update. At the commencement of the session, the users (u), Mobile Users (MU), and the other devices participating in the smart home system are initialized to the Home network head (H). Then, for the registration process, the user and the devices register them into H via the smart gateway (SG) by providing their own identities. The user details and the data about the devices are secured using the MHE-IS-CPMT with the ECC method. Next, during the login process, the registered users connect to the smart home system and send a request to SG to gain access to the devices. After verification, the user is authenticated and the system enables them to acquire the device access control by providing them with the private key of the device. In addition, the proposed system facilitates the secure key change procedure for the legitimate user to update their key whenever required. Hence, the performance of the model is secured against different types of attacks and also obtains more security features than existing methods.
引用
收藏
页码:1333 / 1354
页数:22
相关论文
共 50 条
  • [11] Secure Authentication Scheme Using Diffie-Hellman Key Agreement for Smart IoT Irrigation Systems
    Nashwan, Shadi
    ELECTRONICS, 2022, 11 (02)
  • [12] A secure authentication and key agreement scheme for roaming service with user anonymity
    Arshad, Hamed
    Rasoolzadegan, Abbas
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (18)
  • [13] Provably Secure Mutual Authentication and Key Agreement Scheme with User Anonymity
    Hwang, Tzonelih
    Gope, Prosanta
    2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,
  • [14] Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment
    Das, Ashok Kumar
    Wazid, Mohammad
    Yannam, Animi Reddy
    Rodrigues, Joel J. P. C.
    Park, Youngho
    IEEE ACCESS, 2019, 7 : 55382 - 55397
  • [15] Provably Secure and Lightweight Authentication Key Agreement Scheme for Smart Meters
    Chai, Sheng
    Yin, Haotian
    Xing, Bin
    Li, Zhukun
    Guo, Yunyi
    Zhang, Di
    Zhang, Xin
    He, Da
    Zhang, Jie
    Yu, Xiaoling
    Wang, Wei
    Huang, Xin
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (05) : 3816 - 3827
  • [16] A secure password-based authentication and key agreement scheme using smart cards
    Mishra, Dheerendra
    Das, Ashok Kumar
    Chaturvedi, Ankita
    Mukhopadhyay, Sourav
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 23 : 28 - 43
  • [17] Secure and Efficient Anonymous Authentication Key Agreement Scheme for Smart Industry
    Su, Xing
    Xie, Yong
    Wang, Hui
    Liu, Wei
    Shui, Dingyi
    2022 IEEE 28TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, ICPADS, 2022, : 250 - 257
  • [18] A Secure and Anonymous User Authentication Scheme for IoT-Enabled Smart Home Environments Using PUF
    Cho, Yeongjae
    Oh, Jihyeon
    Kwon, Deokkyu
    Son, Seunghwan
    Lee, Joonyoung
    Park, Youngho
    IEEE ACCESS, 2022, 10 : 101330 - 101346
  • [19] Towards Secure Smart Home IoT: Manufacturer and User Network Access Control Framework
    Al-Shaboti, Mohammed
    Welch, Ian
    Chen, Aaron
    Mahmood, Muhammad Adeel
    PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2018, : 892 - 899
  • [20] Secure IoT Device Authentication Scheme using Key Hiding Technology
    Kim, Byoungkoo
    Yoon, Seoungyong
    Kang, Yousung
    Choi, Dooho
    11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 1808 - 1810