Scalable, password-based and threshold authentication for smart homes

被引:3
|
作者
Huszti, Andrea [1 ]
Kovacs, Szabolcs [2 ]
Olah, Norbert [1 ]
机构
[1] Univ Debrecen, Fac Informat, Debrecen, Hungary
[2] Univ Debrecen, Fac Informat, CCLab Ltd, Debrecen, Hungary
关键词
Authenticated key agreement; End-to-end security; Distributed system; Edge; Smart home; Internet of Things; Bilinear map; AVISPA; KEY EXCHANGE; PROTOCOL INSECURITY; SECURITY; INTRUDER; INTERNET; ENCRYPTION; MODEL;
D O I
10.1007/s10207-022-00578-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart homes are a special use-case of the IoT paradigm, which is becoming more and more important in our lives. Although sensors, devices and applications make our daily lives easier, they often collect our sensitive data, which may lead to security problems (e.g., hacked devices, botnets, etc.). In several cases, the appropriate security mechanisms are missing within the devices. Therefore, security measures have become a central topic in the field of IoT. The most essential requirements are secure user-device authentication and confidentiality of transferred sensitive data. Passwords are the most widely used factors in various areas, such as user authentication, key establishment, and also secret sharing. Password-based protocols that are resistant to typical threats, such as offline dictionary, man-in-the-middle and phishing attacks, generate new session keys. The major aim of these solutions is to guarantee high-level security, even if a user applies a single low-entropy human memorable password for all their accounts. We introduce a threshold and password-based, distributed, mutual authenticated key agreement with key confirmation protocol for a smart home environment. The proposed protocol is a scalable and robust scheme, which forces the adversary to corrupt l-1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l-1$$\end{document} smart home devices, where l is the threshold, in order to perform an offline dictionary attack. The protocol is designed to achieve password-only setting, and end-to-end security if the chosen IoT devices are also authenticated besides the user. We also provide a security analysis of the protocol in AVISPA. We apply the on-the-fly model checker and the constraint-logic-based attack searcher to perform protocol verification for bounded numbers of sessions. We show that the proposed protocol provides session key secrecy and mutual authentication of the user and the device manager. Since efficiency is a crucial aspect, we implemented our protocol to measure the computation and communication costs and demonstrate that our solution is appropriate and eligible for smart homes.
引用
收藏
页码:707 / 723
页数:17
相关论文
共 50 条
  • [1] Scalable, password-based and threshold authentication for smart homes
    Andrea Huszti
    Szabolcs Kovács
    Norbert Oláh
    International Journal of Information Security, 2022, 21 : 707 - 723
  • [2] PASTA: PASsword-based Threshold Authentication
    Agrawal, Shashank
    Miao, Peihan
    Mohassel, Payman
    Mukherjee, Pratyay
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2042 - 2059
  • [3] Threshold password-based authentication using bilinear pairings
    Lee, S
    Han, K
    Kang, SK
    Kim, K
    Ine, SR
    PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2004, 3093 : 350 - 363
  • [4] Enhancing of a Password-Based Authentication Scheme Using Smart Cards
    Lee, Youngsook
    Won, Dongho
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2009, PT 2, 2009, 5871 : 879 - +
  • [5] A Threshold Multi-Server Protocol for Password-Based Authentication
    Guan, Mengxiang
    Song, Jiaxing
    Liu, Weidong
    2016 IEEE 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2016, : 108 - 118
  • [6] A lightweight password-based authentication protocol using smart card
    Wang, Chenyu
    Wang, Ding
    Xu, Guoai
    Guo, Yanhui
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (16)
  • [7] An Improvement Password-based Authentication Protocol Using Smart Card
    Hui, Liu
    SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 2182 - 2185
  • [8] Cryptanalysis of two password-based authentication schemes using smart cards
    Phan, RCW
    COMPUTERS & SECURITY, 2006, 25 (01) : 52 - 54
  • [9] Secure password-based authentication in WLAN
    Keshava, M.
    Journal of the Indian Institute of Science, 2006, 86 (04) : 389 - 396
  • [10] Securing Password in Static Password-based Authentication: A Review
    Mohamedali, Intisar A.
    Fadlalla, Yahia
    PROCEEDINGS OF 2017 SUDAN CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (SCCSIT), 2017, : 98 - 102