Abstract
Background: The Internet of Things (IoT) is the interconnection of physical devices, controllers, sensors and actuators that monitor and share data to another end. In a smart home network, users can remotely access and control home appliances/devices via wireless channels. Due to the increasing demand for smart IoT devices, secure communication also becomes the biggest challenge. Hence, a lightweight authentication scheme is required to secure these devices and maintain user privacy. The protocol proposed is secure against different kinds of attacks and as well as is efficient.
Methods: The proposed protocol offers mutual authentication using shared session key establishment. The shared session key is established between the smart device and the home gateway, ensuring that the communication between the smart devices, home gateway, and the user is secure and no third party can access the information shared.
Results: Informal and formal analysis of the proposed scheme is done using the AVISPA tool. Finally, the results of the proposed scheme also compare with existing security schemes in terms of computation and communication performance cost. The results show that the proposed scheme is more efficient and robust against different types of attacks than the existing protocols.
Conclusion: In the upcoming years, there will be a dedicated network system built inside the home so that the user can have access to the home from anywhere. The proposed scheme offers secure communication between the user, the smart home, and different smart devices. The proposed protocol makes sure that security and privacy are maintained since the smart devices lack computation power which makes them vulnerable to different attacks.
Graphical Abstract
[http://dx.doi.org/10.1016/j.jisa.2019.02.003]
[http://dx.doi.org/10.1016/j.comcom.2020.06.012]
[http://dx.doi.org/10.1155/2021/8871204]
[http://dx.doi.org/10.1109/JIOT.2020.3024058]
[http://dx.doi.org/10.1109/TDSC.2021.3055495]
[http://dx.doi.org/10.1016/j.adhoc.2014.03.009]
[http://dx.doi.org/10.1007/s11277-015-2288-3]
[http://dx.doi.org/10.1016/j.adhoc.2015.05.020]
[http://dx.doi.org/10.3390/s20051357] [PMID: 32121637]
[http://dx.doi.org/10.1007/s13369-017-2709-6]
[http://dx.doi.org/10.1109/TNET.2021.3084692]
[http://dx.doi.org/10.1109/CCWC.2019.8666588]
[http://dx.doi.org/10.1016/j.comnet.2017.03.013]
[http://dx.doi.org/10.1016/j.cose.2019.06.002]
[http://dx.doi.org/10.3390/s20041215] [PMID: 32098448]
[http://dx.doi.org/10.1016/j.jisa.2021.102787]
[http://dx.doi.org/10.1109/TDSC.2017.2764083]
[http://dx.doi.org/10.1109/TIFS.2015.2439964]
[http://dx.doi.org/10.1007/s00530-015-0476-3]
[http://dx.doi.org/10.1016/j.future.2019.05.058]
[http://dx.doi.org/10.1177/1550147719879379]
[http://dx.doi.org/10.1109/JSEN.2015.2475298]
[http://dx.doi.org/10.1109/UIC-ATC.2010.16]
[http://dx.doi.org/10.1109/JSYST.2021.3057047]
[http://dx.doi.org/10.1109/TIT.1983.1056650]
[http://dx.doi.org/10.1007/11513988_27]
[http://dx.doi.org/10.1371/journal.pone.0287291] [PMID: 37352258]
[http://dx.doi.org/10.1002/ett.3993]
[http://dx.doi.org/10.3390/s23073543] [PMID: 37050601]
[http://dx.doi.org/10.1016/j.comcom.2020.11.017]
[http://dx.doi.org/10.1109/ACCESS.2023.3247222]
[http://dx.doi.org/10.3390/math11061446]
[http://dx.doi.org/10.1007/s12083-020-00973-8]