Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

General Research Article

Software-Defined Security Architecture for a Smart Home Networks Using Token Sharing Mechanism

Author(s): Utkarsh Saxena*, J.S Sodhi and Yaduveer Singh

Volume 14, Issue 5, 2021

Published on: 31 October, 2019

Page: [1658 - 1668] Pages: 11

DOI: 10.2174/2213275912666191031102747

Price: $65

Abstract

Background: Several approaches were proposed earlier to provide a secure infrastructure dependent communication in a smart home network. Some used overlay networks, some used lightweight encryption techniques, and some used honey pot techniques. However, all the approaches are vulnerable to network attacks due to the dependency on the device and server, and due to centralization, there exists a higher chance of attacks.

Objective: To develop a security architecture that is more resilient to cyber-attacks and less dependent on any complex network parameter, i.e. an encryption algorithm or an overlay network.

Methods: Authentication module along with squid performs token generation, and monitoring module helps devices to communicate with each other. The integrity protection module performs data integrity and the expiration of token is performed by the access module with the clock. Our approach meets with all the security aspects of a smart home network.

Results: The analysis of our secure architecture showed that this architecture provides more flexibility, robustness in terms of Load Balancing, Network Lifetime maximization, Failure Management, Energy efficiency, Link quality, and heterogeneity of the network as compared to other existing security policies or architecture.

Conclusion: The proposed framework ensures and improves all the security requirements for a smart home network. Token-based authentication is much secure and robust as compared to traditional approaches. This framework is suited for secure communication in a smart home environment, but it lacks for controlling zero-day attacks. In the future, we will improve its resilience against the zero-day attacks and also enhance security features in the current architecture.

Keywords: Smart devices, access control, token sharing, squid authentication, communication, framework.

Graphical Abstract


Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy