Secure user authentication and key agreement scheme for IoT device access control based smart home communications

被引:14
|
作者
Uppuluri, Sirisha [1 ]
Lakshmeeswari, G. [1 ]
机构
[1] GITAM Univ, Visakhapatnam 530045, Andhra Pradesh, India
关键词
Internet of things (IoT); Authentication; Key agreement; Smart home; Security; Device access control; Attacks; MUTUAL AUTHENTICATION; THINGS IOT; INTERNET; ENCRYPTION; CRYPTANALYSIS; PROTOCOL;
D O I
10.1007/s11276-022-03197-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The upcoming paradigm in Internet of Things (IoT) based applications is to afford effective interactional communication strategies between the devices in the smart home system. With the rapid growth of IoT services, the incorporation of security measures becomes a vital concern. The general issue faced in the security of the intercommunication between the devices and the users is improper authentication between them. Also, the access control of devices must be ensured with reliable features for establishing secure communication between the users and devices. Hence, we propose a protocol called Modified Honey Encryption using Inverse Sampling-Conditional Probability Model Transform (MHE-IS-CPMT) with Elliptic Curve Cryptography (ECC) to authenticate and perform the key agreement. Here, we employ the following steps: (1) Initialization, (2) Registration, (3) Login and data access Request, (4) Authentication and Session key agreement, and (5) Key update. At the commencement of the session, the users (u), Mobile Users (MU), and the other devices participating in the smart home system are initialized to the Home network head (H). Then, for the registration process, the user and the devices register them into H via the smart gateway (SG) by providing their own identities. The user details and the data about the devices are secured using the MHE-IS-CPMT with the ECC method. Next, during the login process, the registered users connect to the smart home system and send a request to SG to gain access to the devices. After verification, the user is authenticated and the system enables them to acquire the device access control by providing them with the private key of the device. In addition, the proposed system facilitates the secure key change procedure for the legitimate user to update their key whenever required. Hence, the performance of the model is secured against different types of attacks and also obtains more security features than existing methods.
引用
收藏
页码:1333 / 1354
页数:22
相关论文
共 50 条
  • [31] Remotely Access "My" Smart Home in Private: An Anti-Tracking Authentication and Key Agreement Scheme
    Lyu, Qiuyun
    Zheng, Ning
    Liu, Huaping
    Gao, Can
    Chen, Si
    Liu, Junliang
    IEEE ACCESS, 2019, 7 : 41835 - 41851
  • [32] Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Kumari, Saru
    Wu, Fan
    Chaudhry, Shehzad Ashraf
    Niranchana, R.
    MOBILE NETWORKS & APPLICATIONS, 2019, 24 (03): : 1046 - 1062
  • [33] An efficient authentication and key agreement scheme for secure smart grid communication services
    Hammami, Hamza
    Obaidat, Mohammad S.
    Ben Yahia, Sadok
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (15)
  • [34] Secure device control scheme with blockchain in a smart home
    Park, Junbeom
    Chang, Seongju
    MEASUREMENT & CONTROL, 2023, 56 (3-4): : 546 - 557
  • [35] Provably Secure Lightweight Mutual Authentication and Key Agreement Scheme for Cloud-Based IoT Environments
    Ju, Sieun
    Park, Yohan
    SENSORS, 2023, 23 (24)
  • [36] A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
    Chen, Liquan
    Wang, Jinlong
    Yin, Bangwei
    Yu, Kunliang
    Han, Jinguang
    CHINA COMMUNICATIONS, 2023, 20 (05) : 198 - 216
  • [37] A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability
    Zahednejad, Behnam
    Teng, Huang
    Kosari, Saeed
    Xiaojun, Ren
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2023, 2023
  • [38] A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
    Liquan Chen
    Jinlong Wang
    Bangwei Yin
    Kunliang Yu
    Jinguang Han
    ChinaCommunications, 2023, 20 (05) : 198 - 216
  • [39] Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
    Park, Kisung
    Kim, Myeonghyun
    Park, Youngho
    SENSORS, 2025, 25 (01)
  • [40] A Modified Remote User Authentication and Key Agreement Scheme Using Smart Cards
    Zhang, Lijiang
    Wei, Puwen
    2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 419 - 423