Generic placeholder image

International Journal of Sensors, Wireless Communications and Control

Editor-in-Chief

ISSN (Print): 2210-3279
ISSN (Online): 2210-3287

Research Article

An Intelligent Cryptographic Approach for Preserving the Privacy and Security of Smart Home IoT Applications

Author(s): TN Chitti* and Maharajan Kalianandi

Volume 14, Issue 3, 2024

Published on: 29 April, 2024

Page: [226 - 235] Pages: 10

DOI: 10.2174/0122103279298505240415070056

Price: $65

Abstract

Background: Today, computer networks are everywhere, and we utilize the Internet to access our home network. IoT networks connect home appliances and provide remote instructions. Access to any tool over an uncertain network attracts assaults. User authentication might be password- or biometric-based. Data security across a secure network like the Internet is difficult when authenticating a device. Hashing is used for validation and confidentiality in several encryption and decryption schemes. Classic cryptographic security methods require a lot of memory, processing power, and power. They cannot work with low-resource IoT devices.

Methods: Automatic Device-to-Device communiqué opens up new applications, yet network machines and devices have limited resources. A remote-access home device authentication mechanism is proposed in this research. A new, lightweight encryption approach based on Deoxyribonucleic- Acid (DNA) sequences is developed to make IoT device connections easy and secure. Home network and appliance controller devices use authentication tools. DNA sequences are random therefore we utilized them to create a secure secret key.

Results: Efficiency and strength are advantages of the proposed method. Our method prevents replay, server spoofing, and man-in-the-middle attacks. The suggested method protects network users and devices.

Conclusion: Meanwhile, we model the system and find that the network's delay, throughput, and energy consumption don't degrade considerably.

Graphical Abstract

[1]
Kumar V, Malik N, Singla J, Jhanjhi NZ, Amsaad F, Razaque A. Light weight authentication scheme for smart home iot devices. Cryptography 2022; 6(3): 37.
[http://dx.doi.org/10.3390/cryptography6030037]
[2]
Nyangaresi VO. Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography. J Systems Archit 2022; 133: 102763.
[http://dx.doi.org/10.1016/j.sysarc.2022.102763]
[3]
Hassan A. An effective lightweight cryptographic algorithm to secure internet of things devices. Proceedings of the Future Technologies Conference (FTC) Springer, Cham 24 October 2021. vol 1: 403-19.
[http://dx.doi.org/10.1007/978-3-030-89906-6_27]
[4]
Nimmy K, Sankaran S, Achuthan K, Calyam P. Lightweight and privacy-preserving remote user authentication for smart homes. IEEE Access 2022; 10: 176-90.
[http://dx.doi.org/10.1109/ACCESS.2021.3137175]
[5]
Jan SU, Abbasi IA, Alqarni MA. LMAS-SHS: A lightweight mutual authentication scheme for smart home surveillance. IEEE Access 2022; 10: 52791-803.
[http://dx.doi.org/10.1109/ACCESS.2022.3174558]
[6]
Rahman Z, Yi X, Billah M, Sumi M, Anwar A. Enhancing AES using chaos and logistic map-based key generation technique for securing IoT-based smart home. Electronics 2022; 11(7): 1083.
[http://dx.doi.org/10.3390/electronics11071083]
[7]
Haseeb-ur-rehman RMA, Liaqat M, Aman AHM, et al. LR-AKAP: A lightweight and robust security protocol for smart home environments. Sensors 2022; 22(18): 6902.
[http://dx.doi.org/10.3390/s22186902] [PMID: 36146250]
[8]
Abu-Tair M, Djahel S, Perry P, et al. Towards secure and privacy-preserving IoT enabled smart home: architecture and experimental study. Sensors 2020; 20(21): 6131.
[http://dx.doi.org/10.3390/s20216131] [PMID: 33126629]
[9]
Thabit F, Can O, Alhomdy S, Al-Gaphari GH, Jagtap S. A novel effective lightweight homomorphic cryptographic algorithm for data security in cloud computing. Int J Intell Networks 2022; 3: 16-30.
[10]
Hammi B, Zeadally S, Khatoun R, Nebhen J. Survey on smart homes: Vulnerabilities, risks, and countermeasures. Comput Secur 2022; 117: 102677.
[http://dx.doi.org/10.1016/j.cose.2022.102677]
[11]
Xia Y, Qi R, Ji S, Shen J, Miao T, Wang H. PUF-assisted lightweight group authentication and key agreement protocol in smart home. Wirel Commun Mob Comput 2022; 2022: 1-15.
[http://dx.doi.org/10.1155/2022/7537764]
[12]
Nyangaresi VO. A formally validated authentication algorithm for secure message forwarding in smart home networks. SN Computer Science 2022; 3(5): 364.
[http://dx.doi.org/10.1007/s42979-022-01269-9]
[13]
Lo’ai , Tawalbeh , Alicea M, Alsmadi I. New and efficient lightweight cryptography algorithm for mobile and web applications. Procedia Comput Sci 2022; 203: 111-8.
[http://dx.doi.org/10.1016/j.procs.2022.07.016]
[14]
Tekiner E, Acar A, Uluagac AS. A lightweight IoT cryptojacking detection mechanism in heterogeneous smart home networks. Proc of the ISOC Network and Distributed System Security Symposium (NDSS) 2022.
[http://dx.doi.org/10.14722/ndss.2022.24208]
[15]
Thammarat C, Techapanupreeda C. Secure key establishment protocol for smart homes based on symmetric cryptography. 2022 International Conference on Information Networking (ICOIN). Jejusi, Korea, Republic of, 12-15 January. 2022; pp. 46-51.
[http://dx.doi.org/10.1109/ICOIN53446.2022.9687197]
[16]
Bhuyan M, Kashihara S, Fall D, Taenaka Y, Kadobayashi Y. A survey on blockchain, SDN and NFV for the smart-home security. Internet of Things 2022; 100588.
[17]
Wu TY, Kong F, Wang L, Chen YC, Kumari S, Pan JS. Toward smart home authentication using puf and edge-computing paradigm. Sensors 2022; 22(23): 9174.
[http://dx.doi.org/10.3390/s22239174] [PMID: 36501875]
[18]
Chauhan JA, Patel AR, Parikh S, Modi N. An Analysis of Lightweight Cryptographic Algorithms for IoT-Applications. International Conference on Advancements in Smart Computing and Information Security. Cham: Springer Nature Switzerland.. 2022; pp. 201-16.
[http://dx.doi.org/10.1007/978-3-031-23095-0_15]
[19]
Al-Begain K, Khan M, Alothman B, Joumaa C, Alrashed E. A DDoS detection and prevention system for iot devices and its application to smart home environment. Appl Sci 2022; 12(22): 11853.
[http://dx.doi.org/10.3390/app122211853]
[20]
Jammula M, Vakamulla VM, Kondoju SK. Performance evaluation of lightweight cryptographic algorithms for heterogeneous IoT environment. J Interconnect Netw 2022; 22 (Suppl. 01): 2141031.
[http://dx.doi.org/10.1142/S0219265921410310]
[21]
Nassiri Abrishamchi MA, Zainal A, Ghaleb FA, Qasem SN, Albarrak AM. Smart home privacy protection methods against a passive wireless Snooping side-channel attack. Sensors 2022; 22(21): 8564.
[http://dx.doi.org/10.3390/s22218564] [PMID: 36366261]
[22]
Chatterjee K, Chaudhary RRK, Singh A. A lightweight block cipher technique for IoT based E-healthcare system security. Multimedia Tools Appl 2022; 81(30): 43551-80.
[http://dx.doi.org/10.1007/s11042-022-13106-5]
[23]
Kim JTS. Analyses of open security issues for smart home and sensor network based on internet of things. IoT Appl. Comput 2022; pp. 179-96.
[24]
Garg S, Nayak S, Bavani Sankar AB, Maity S. Applications of Identity-Based Cryptography in Smart Home and Healthcare: A Recent Review. Cyber Security in Intelligent Computing and Communications 2022; pp. 227-41.
[25]
Al-Khasawneh MA, Uddin I, Shah SAA, Khasawneh AM, Abualigah L, Mahmoud M. An improved chaotic image encryption algorithm using Hadoop-based MapReduce framework for massive remote sensed images in parallel IoT applications. Cluster Comput 2022; 25(2): 999-1013.
[http://dx.doi.org/10.1007/s10586-021-03466-2]
[26]
Nyangaresi VO, Abduljabbar ZA, Mutlaq KAA, et al. Energy efficient dynamic symmetric key based protocol for secure traffic exchanges in smart homes. Appl Sci 2022; 12(24): 12688.
[http://dx.doi.org/10.3390/app122412688]
[27]
Hussain S, Alabrah A, Ullah SS, Khattak H, Alfakih TM, Ullah I. An efficient online/offline signcryption scheme for Internet of Things in smart home. Wirel Commun Mob Comput 2022; 2022.
[28]
Tanveer M, Abbas G, Abbas ZH, Bilal M, Mukherjee A, Kwak KS. LAKE-6SH: Lightweight user authenticated key exchange for 6LoWPAN-based smart homes. IEEE Internet Things J 2022; 9(4): 2578-91.
[http://dx.doi.org/10.1109/JIOT.2021.3085595]
[29]
Reshi IA, Sholla S. Challenges for security in iot, emerging solutions, and research directions. Int J Comput Digit Syst 2022; 12(4): 1231-41.
[http://dx.doi.org/10.12785/ijcds/120198]
[30]
Merzeh H, Kara M. GDPR compliance IoT authentication model for smart home environment. Intell Autom Soft Comput 2022; 31(3): 1953-70.
[31]
Rana M, Mamun Q, Islam R. Lightweight cryptography in IoT networks: A survey. Future Gener Comput Syst 2022; 129: 77-89.
[http://dx.doi.org/10.1016/j.future.2021.11.011]
[32]
Lata N, Kumar R. DSIT: A dynamic lightweight cryptography algorithm for securing image in IoT communication. Int J Image Graph 2022; 2350035.
[33]
Kurniawan RAZ, Wahjuni S, Neyman SN. Secure communication protocol for arduino-based iot using lightweight cryptography. Int J Adv Sci Eng Inf Technol 2022; 12(2): 453-9.
[http://dx.doi.org/10.18517/ijaseit.12.2.8601]
[34]
Yang J, Sun L. A comprehensive survey of security issues of smart home system: “Spear” and “shields,” theory and practice. IEEE Access 2022; 10: 124167-92.
[http://dx.doi.org/10.1109/ACCESS.2022.3224806]
[35]
Illy P, Kaddoum G, Kaur K, Garg S. ML-based IDPS enhancement with complementary features for home IoT networks. IEEE Trans Netw Serv Manag 2022; 19(2): 772-83.
[http://dx.doi.org/10.1109/TNSM.2022.3141942]
[36]
Mondal B, Singh JP. A lightweight image encryption scheme based on chaos and diffusion circuit. Multimedia Tools Appl 2022; 81(24): 34547-71.
[http://dx.doi.org/10.1007/s11042-021-11657-7]
[37]
Naser NM, Naif JR. A systematic review of ultra-lightweight encryption algorithms. Int J Nonlinear Anal Appl 2022; 13(1): 3825-51.
[38]
Lata N, Kumar R. Communication technologies, smart home solution and security trends in Internet of Things. J Algebr Stat 2022; 13(1): 42-61.
[39]
Suresh Kumar K, Prabakaran D, Senthil Kumaran R, Yamuna I. Privacy and security of smart systems. Intelligent Green Technologies for Sustainable Smart Cities 2022; pp. 291-315.
[40]
Bhardwaj A, Kaushik K, Alshehri M, Mohamed AAB, Keshta I. ISF: Security analysis and assessment of smart home IoT-based firmware. ACM Trans Sens Netw 2022.
[41]
Abinaya M, Prabakeran S. Lightweight Block Cipher for Resource Constrained IoT Environment—An Survey, Performance, Cryptanalysis and Research Challenges. IoT Based Control Networks and Intelligent Systems Proceedings of 3rd ICICNIS 2022. 2022; 347-65.
[42]
Goulart A, Chennamaneni A, Torre D, Hur B, Al-Aboosi FY. On wide-area IoT networks, lightweight security and their applications—a practical review. Electronics 2022; 11(11): 1762.
[http://dx.doi.org/10.3390/electronics11111762]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy