A Reverse Sequence Hash Chain-based Access Control for a Smart Home System

被引:0
|
作者
Kim, DaeYoub [1 ]
机构
[1] Suwon Univ, Hwaseong Si, Gyeonggi Do, South Korea
基金
新加坡国家研究基金会;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As a smart home system utilizes a machine learning technology, intelligent and user-friendly smart home systems will be trends more and more. However, since a consumer home generally consists of various IoT-devices which are with different capabilities and from different vendors each other, it is difficult to apply centralized high performance security solutions to their smart home systems. A blockchain system, a decentralized authentication solution, is spotlighted as an alternative. However, since a blockchain system needs high resources for its mining process, to apply a blockchain technology to a smart home system, it is needed to improve such a high resource problem. This paper presents a reverse sequence hash chain based authentication scheme for a smart home. Since this authentication system needs small numbers of hash value computation to compute the solution of POW, a user can build a authentication system of his smart home without using a centralized and heavy security system like PKI.
引用
收藏
页码:570 / 573
页数:4
相关论文
共 50 条
  • [1] A Reverse Hash Chain Path-Based Access Control Scheme for a Connected Smart Home System
    Kim, DaeYoub
    Lee, Jihoon
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2021, 10 (01) : 93 - 100
  • [2] Chain-based big data access control infrastructure
    Emmanuel Boateng Sifah
    Qi Xia
    Kwame Opuni-Boachie Obour Agyekum
    Sandro Amofa
    Jianbin Gao
    Ruidong Chen
    Hu Xia
    James C. Gee
    Xiaojiang Du
    Mohsen Guizani
    The Journal of Supercomputing, 2018, 74 : 4945 - 4964
  • [3] Chain-based big data access control infrastructure
    Sifah, Emmanuel Boateng
    Xia, Qi
    Agyekum, Kwame Opuni-Boachie Obour
    Amofa, Sandro
    Gao, Jianbin
    Chen, Ruidong
    Xia, Hu
    Gee, James C.
    Du, Xiaojiang
    Guizani, Mohsen
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (10): : 4945 - 4964
  • [4] Improvement of QR Code Access Control System Based on Lamport Hash Chain
    Park, Hyeongmin
    Kim, Taeeun
    Kim, Gaeul
    Jang, Wonyoung
    Lee, Kyungroul
    Lee, Sun-Young
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2019, 2020, 994 : 824 - 833
  • [5] Block chain-based access control protocol in Internet of Drones
    Perumalla S.
    Chatterjee S.
    Kumar A.P.S.
    International Journal of Computers and Applications, 2022, 44 (09) : 847 - 862
  • [6] A Study on Hash Chain-based Hadoop Security Scheme
    Jung, Young-Ae
    Woo, Si-Jae
    Yeo, Sang-Soo
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 1831 - 1835
  • [7] A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain
    Omran, Esraa
    Grandison, Tyrone
    Nelson, David
    Bokma, Albert
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2013, 7 (03) : 36 - 52
  • [8] Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain
    Alshahrani, Mohammed
    Traore, Issa
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 : 156 - 175
  • [9] Block Chain-Based Data Audit and Access Control Mechanism in Service Collaboration
    Wang, Chao
    Chen, Shizhan
    Feng, Zhiyong
    Jiang, Yanan
    Xue, Xiao
    2019 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (IEEE ICWS 2019), 2019, : 214 - 218
  • [10] Smart Home Beyond the Home: A Case for Community-Based Access Control
    Tabassum, Madiha
    Kropczynski, Jess
    Wisniewski, Pamela
    Lipford, Heather Richter
    PROCEEDINGS OF THE 2020 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'20), 2020,