Generic placeholder image

Recent Advances in Electrical & Electronic Engineering

Editor-in-Chief

ISSN (Print): 2352-0965
ISSN (Online): 2352-0973

Review Article

Lightweight Privacy Preserving Scheme for IoT based Smart Home

Author(s): Neha Sharma* and Pankaj Dhiman

Volume 17, Issue 8, 2024

Published on: 11 October, 2023

Page: [763 - 777] Pages: 15

DOI: 10.2174/0123520965267339230928061410

Price: $65

Abstract

Background: The Internet of Things (IoT) is the interconnection of physical devices, controllers, sensors and actuators that monitor and share data to another end. In a smart home network, users can remotely access and control home appliances/devices via wireless channels. Due to the increasing demand for smart IoT devices, secure communication also becomes the biggest challenge. Hence, a lightweight authentication scheme is required to secure these devices and maintain user privacy. The protocol proposed is secure against different kinds of attacks and as well as is efficient.

Methods: The proposed protocol offers mutual authentication using shared session key establishment. The shared session key is established between the smart device and the home gateway, ensuring that the communication between the smart devices, home gateway, and the user is secure and no third party can access the information shared.

Results: Informal and formal analysis of the proposed scheme is done using the AVISPA tool. Finally, the results of the proposed scheme also compare with existing security schemes in terms of computation and communication performance cost. The results show that the proposed scheme is more efficient and robust against different types of attacks than the existing protocols.

Conclusion: In the upcoming years, there will be a dedicated network system built inside the home so that the user can have access to the home from anywhere. The proposed scheme offers secure communication between the user, the smart home, and different smart devices. The proposed protocol makes sure that security and privacy are maintained since the smart devices lack computation power which makes them vulnerable to different attacks.

Graphical Abstract

[1]
M. Alshahrani, and I. Traore, "Secure mutual authentication and automated access control for IoT smart home using cumulative keyed-hash chain", J. Inf. Secur. App., vol. 45, pp. 156-175, 2019.
[http://dx.doi.org/10.1016/j.jisa.2019.02.003]
[2]
M. Shuai, L. Xiong, C. Wang, and N. Yu, "A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem", Comput. Commun., vol. 160, pp. 215-227, 2020.
[http://dx.doi.org/10.1016/j.comcom.2020.06.012]
[3]
B. Hale, T. Jager, S. Lauer, and J. Schwenk, "Simple security definitions for and constructions of 0-RTT key exchange", In Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, pp. 20-38
[4]
B.H. Taher, H. Liu, F. Abedi, H. Lu, A.A. Yassin, and A.J. Mohammed, "A secure and lightweight three-factor remote user authentication protocol for future IoT applications", J. Sens., vol. 2021, pp. 1-18, 2021.
[http://dx.doi.org/10.1155/2021/8871204]
[5]
W. Iqbal, H. Abbas, P. Deng, J. Wan, B. Rauf, Y. Abbas, and I. Rashid, "ALAM: Anonymous lightweight authentication mechanism for SDN-enabled smart homes", IEEE Internet Things J., vol. 8, no. 12, pp. 9622-9633, 2021.
[http://dx.doi.org/10.1109/JIOT.2020.3024058]
[6]
J. Wei, X. Chen, J. Wang, X. Hu, and J. Ma, "Enabling (end-to-end) encrypted cloud emails with practical forward secrecy", IEEE Trans. Depend. Secure Comput., vol. 19, no. 4, pp. 2318-2332, 2022.
[http://dx.doi.org/10.1109/TDSC.2021.3055495]
[7]
M. Turkanović, B. Brumen, and M. Hölbl, "A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion", Ad Hoc Netw., vol. 20, pp. 96-112, 2014.
[http://dx.doi.org/10.1016/j.adhoc.2014.03.009]
[8]
A.K. Das, "A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks", Wirel. Pers. Commun., vol. 82, no. 3, pp. 1377-1404, 2015.
[http://dx.doi.org/10.1007/s11277-015-2288-3]
[9]
R. Amin, and G.P. Biswas, "A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks", Ad Hoc Netw., vol. 36, pp. 58-80, 2016.
[http://dx.doi.org/10.1016/j.adhoc.2015.05.020]
[10]
Y. Jiang, Y. Shen, and Q. Zhu, "A lightweight key agreement protocol based on Chinese remainder theorem and ECDH for smart homes", Sensors, vol. 20, no. 5, p. 1357, 2020.
[http://dx.doi.org/10.3390/s20051357] [PMID: 32121637]
[11]
P. Chandrakar, and H. Om, "An efficient two-factor remote user authentication and session key agreement scheme using Rabin cryptosystem", Arab. J. Sci. Eng., vol. 43, no. 2, pp. 661-673, 2018.
[http://dx.doi.org/10.1007/s13369-017-2709-6]
[12]
J. Wei, X. Chen, J. Ma, X. Hu, and K. Ren, "Communication-efficient and fine-grained forward-secure asynchronous messaging", IEEE/ACM Trans. Netw., vol. 29, no. 5, pp. 2242-2253, 2021.
[http://dx.doi.org/10.1109/TNET.2021.3084692]
[13]
M. Roopak, G. Yun Tian, and J. Chambers, "Deep learning models for cyber security in IoT networks", In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) Las Vegas, NV, USA, 2019, pp. 0452-0457
[http://dx.doi.org/10.1109/CCWC.2019.8666588]
[14]
X. Li, M.H. Ibrahim, S. Kumari, A.K. Sangaiah, V. Gupta, and K.K.R. Choo, "Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks", Comput. Netw., vol. 129, pp. 429-443, 2017.
[http://dx.doi.org/10.1016/j.comnet.2017.03.013]
[15]
M. Shuai, N. Yu, H. Wang, and L. Xiong, "Anonymous authentication scheme for smart home environment with provable security", Comput. Secur., vol. 86, pp. 132-146, 2019.
[http://dx.doi.org/10.1016/j.cose.2019.06.002]
[16]
S. Banerjee, V. Odelu, A.K. Das, S. Chattopadhyay, and Y. Park, "An efficient, anonymous and robust authentication scheme for smart home environments", Sensors, vol. 20, no. 4, p. 1215, 2020.
[http://dx.doi.org/10.3390/s20041215] [PMID: 32098448]
[17]
D. Kaur, and D. Kumar, "Cryptanalysis and improvement of a two-factor user authentication scheme for smart home", J. Inf. Secur, vol. 58, p. 102787, 2021.
[http://dx.doi.org/10.1016/j.jisa.2021.102787]
[18]
M. Wazid, A.K. Das, V. Odelu, N. Kumar, and W. Susilo, "Secure remote user authenticated key establishment protocol for smart home environment", IEEE Trans. Depend. Secure Comput., vol. 17, no. 2, pp. 391-406, 2020.
[http://dx.doi.org/10.1109/TDSC.2017.2764083]
[19]
V. Odelu, A.K. Das, and A. Goswami, "A secure biometrics-based multi-server authentication protocol using smart cards", IEEE Trans. Inf. Forensics Security, vol. 10, no. 9, pp. 1953-1966, 2015.
[http://dx.doi.org/10.1109/TIFS.2015.2439964]
[20]
F. Wu, L. Xu, S. Kumari, and X. Li, "An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks", Multimedia Syst., vol. 23, no. 2, pp. 195-205, 2017.
[http://dx.doi.org/10.1007/s00530-015-0476-3]
[21]
V. Sureshkumar, R. Amin, V.R. Vijaykumar, and S.R. Sekar, "Robust secure communication protocol for smart healthcare system with FPGA implementation", Future Gener. Comput. Syst., vol. 100, pp. 938-951, 2019.
[http://dx.doi.org/10.1016/j.future.2019.05.058]
[22]
B. Yu, and H. Li, "Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things", Int. J. Distrib. Sens. Netw., vol. 15, no. 9, 2019.
[http://dx.doi.org/10.1177/1550147719879379]
[23]
S. Zou, Q. Cao, C. Wang, Z. Huang, and G. Xu, "A robust two-factor user authentication scheme-based ECC for smart home in IoT", IEEE Syst. J., vol. 16, no. 3, pp. 4938-4949, 2021.
[24]
P. Kumar, A. Gurtov, J. Iinatti, M. Ylianttila, and M. Sain, "Lightweight and secure session-key establishment scheme in smart home environments", IEEE Sens. J., vol. 16, no. 1, pp. 254-264, 2016.
[http://dx.doi.org/10.1109/JSEN.2015.2475298]
[25]
M. Xu, L. Ma, F. Xia, T. Yuan, J. Qian, and M. Shao, "Design and implementation of a wireless sensor network for smart homes", In UIC-ATC '10: Proceedings of the 2010 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, 2010, pp. 239-243
[http://dx.doi.org/10.1109/UIC-ATC.2010.16]
[26]
S. Hussain, S.A. Chaudhry, O.A. Alomari, M.H. Alsharif, M.K. Khan, and N. Kumar, "Amassing the security: An ECC-based authentication scheme for Internet of drones", IEEE Syst. J., vol. 15, no. 3, pp. 4431-4438, 2021.
[http://dx.doi.org/10.1109/JSYST.2021.3057047]
[27]
J. Budakoti, A.S. Gaur, and C.H. Lung, "IoT gateway middleware for SDN managed IoT", In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) Halifax, NS, Canada, 2018, pp. 154-161
[28]
D. Dolev, and A. Yao, "On the security of public key protocols", IEEE Trans. Inf. Theory, vol. 29, no. 2, pp. 198-208, 1983.
[http://dx.doi.org/10.1109/TIT.1983.1056650]
[29]
AVISPA, "Automated validation of internet security protocols and applications", Available From: https://www.ercim.eu/publication/Ercim_News/enw64/armando.html
[30]
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, and J. Cuéllar, "The AVISPA tool for the automated validation of internet security protocols and applications", In International conference on computer-aided verification Springer Edinburgh, Scotland, July 6–10, 2005, p. 281
[http://dx.doi.org/10.1007/11513988_27]
[31]
D. Von Oheimb, "The high-level protocol specification language HLPSL developed in the EU project AVISPA", In Proceedings of APPSEM 2005 Workshop, September 8-12, Frauenchiemsee, Munich, 2005, pp. 1-17
[32]
X. Li, Q. Wen, W. Li, H. Zhang, and Z. Jin, "A biometric-based password authentication with key exchange scheme using a mobile device for multi-server environment", Appl. Math. Inf. Sci., vol. 9, no. 3, p. 1123, 2015.
[33]
A.A. Almazroi, E.A. Aldhahri, M.A. Al-Shareeda, and S. Manickam, "ECA-VFog: An efficient certificateless authentication scheme for 5G-assisted vehicular fog computing", PLoS One, vol. 18, no. 6, p. e0287291, 2023.
[http://dx.doi.org/10.1371/journal.pone.0287291] [PMID: 37352258]
[34]
P. Kumar, and L. Chouhan, "Design of secure session key using unique addressing and identification scheme for smart home Internet of Things network", Trans. Emerg. Telecommun. Technol., vol. 32, no. 5, p. e3993, 2021.
[http://dx.doi.org/10.1002/ett.3993]
[35]
ZG Al-Mekhlafi, M.A. Al-Shareeda, S. Manickam, B.A. Mohammed, and A. Alreshidi, "Efficient authentication scheme for 5G-enabled vehicularnetworks using fog computing", Sensors, vol. 23, no. 7, p. 3543, 2023.
[http://dx.doi.org/10.3390/s23073543] [PMID: 37050601]
[36]
P. Kumar, and L. Chouhan, "A privacy and session key based authentication scheme for medical IoT networks", Comput. Commun., vol. 166, pp. 154-164, 2021.
[http://dx.doi.org/10.1016/j.comcom.2020.11.017]
[37]
B.A. Mohammed, M.A. Al-Shareeda, S. Manickam, Z.G. Al-Mekhlafi, A. Alreshidi, M. Alazmi, J.S. Alshudukhi, and M. Alsaffar, "FC-PA: Fog computing-based pseudonym authentication scheme in 5G-enabled vehicular networks", IEEE Access, vol. 11, pp. 18571-18581, 2023.
[http://dx.doi.org/10.1109/ACCESS.2023.3247222]
[38]
B.A. Mohammed, M.A. Al-Shareeda, S. Manickam, Z.G. Al-Mekhlafi, A.M. Alayba, and A.A. Sallam, "ANAA-Fog: A novel anonymous authentication scheme for 5G-enabled vehicular fog computing", Mathematics, vol. 11, no. 6, p. 1446, 2023.
[http://dx.doi.org/10.3390/math11061446]
[39]
Z.G. Al-Mekhlafi, M.A. Al-Shareeda, S. Manickam, B.A. Mohammed, A. Alreshidi, M. Alazmi, J.S. Alshudukhi, M. Alsaffar, and A. Alsewari, "Chebyshev polynomial-based fog computing scheme supporting pseudonym revocation for 5G-enabled vehicular networks", Electronics, vol. 12, no. 4, p. 872, 2023.
[40]
P. Kumar, and L. Chouhan, "A secure authentication scheme for IoT application in smart home", Peer-to-Peer Netw. Appl., vol. 14, no. 1, pp. 420-438, 2021.
[http://dx.doi.org/10.1007/s12083-020-00973-8]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy