Skip to main content

2018 | OriginalPaper | Buchkapitel

An RSA-Based User Authentication Scheme for Smart-Homes Using Smart Card

verfasst von : Maninder Singh Raniyal, Isaac Woungang, Sanjay Kumar Dhurandher

Erschienen in: Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of Things (IoT) is an emerging paradigm which enables physical objects to operate over the Internet, collect and share the data that describe the real physical world. One of its greatest opportunity and application still lies ahead in the form of smart home, known as push-button automated home. In this ubiquitous environment, due to the most likely heterogeneity of objects, communication, topology, security protocols, and the computationally limited nature of IoT objects, conventional authentication schemes may not comply with IoT security requirements since they are considered impractical, weak, or outdated. Focusing only on the issue of remote authentication in a smart home environment, in the presence of security threats, this paper proposes the design of a RSA-based two-factor user Authentication scheme for Smart-Home using Smart Card (denoted RSA-ASH-SC scheme). An informal security analysis of the proposed RSA-ASH-SC scheme is proposed as well as a study of its performance in terms of convergence speed, showing that the RSA-ASH-SC scheme is about 50% faster than the Om and Kumari scheme, and about 15 times faster than selected RSA variants in terms of RSA decryption speed when the RSA key length is 2048. The RSA-ASH-SC scheme is also shown to maintain the anonymity of the user using a one-time token.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Miraz, M.H., Ali, M., Excell, P.S., Picking, R.: A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT). In: Proceedings of IEEE Internet Technologies and Applications (ITA), 8–11 September 2015, Glyndwr University, Wrexham, North East Wales, UK, pp. 219–224 (2015) Miraz, M.H., Ali, M., Excell, P.S., Picking, R.: A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT). In: Proceedings of IEEE Internet Technologies and Applications (ITA), 8–11 September 2015, Glyndwr University, Wrexham, North East Wales, UK, pp. 219–224 (2015)
5.
Zurück zum Zitat Yang, C.C., Wang, R.C., Chang, T.Y.: An improvement of the Yang-Shieh password authentication schemes. Appl. Math. Comput. 162, 1391–1396 (2005)MathSciNetMATH Yang, C.C., Wang, R.C., Chang, T.Y.: An improvement of the Yang-Shieh password authentication schemes. Appl. Math. Comput. 162, 1391–1396 (2005)MathSciNetMATH
6.
Zurück zum Zitat Gaikwad, P.P., Gabhane, J.P., Golait, S.S.: 3-level secure kerberos authentication for smart home systems using IoT. In: Proceedings of 1st IEEE International Conference on Next Generation Computing Technologies (NGCT), 4–5 September 2015, Dehradun, India, pp. 262–268 (2015) Gaikwad, P.P., Gabhane, J.P., Golait, S.S.: 3-level secure kerberos authentication for smart home systems using IoT. In: Proceedings of 1st IEEE International Conference on Next Generation Computing Technologies (NGCT), 4–5 September 2015, Dehradun, India, pp. 262–268 (2015)
8.
Zurück zum Zitat Om, H., Reddy, M.: RSA based remote password authentication using smart card. J. Discrete Math. Sci. Cryptography 15(2), 105–111 (2012)MathSciNetCrossRef Om, H., Reddy, M.: RSA based remote password authentication using smart card. J. Discrete Math. Sci. Cryptography 15(2), 105–111 (2012)MathSciNetCrossRef
9.
Zurück zum Zitat Wang, X., Zhang, W.: An efficient and secure biometric remote user authentication scheme using smart cards. In: Proceedings of Pacific-Asia Workshop on Computational Intelligence and Industrial Application (PACIIA 2008), 19–20 December 2008, Wuhan, China, pp. 913–917 (2008). https://doi.org/10.1109/paciia.2008.382 Wang, X., Zhang, W.: An efficient and secure biometric remote user authentication scheme using smart cards. In: Proceedings of Pacific-Asia Workshop on Computational Intelligence and Industrial Application (PACIIA 2008), 19–20 December 2008, Wuhan, China, pp. 913–917 (2008). https://​doi.​org/​10.​1109/​paciia.​2008.​382
11.
Zurück zum Zitat Om, H., Kumari, S.: Comment and modification of RSA based remote password authentication using smart card. J. Discrete Math. Sci. Cryptography 625–635 (2017)MathSciNetCrossRef Om, H., Kumari, S.: Comment and modification of RSA based remote password authentication using smart card. J. Discrete Math. Sci. Cryptography 625–635 (2017)MathSciNetCrossRef
12.
Zurück zum Zitat Yang, W.H., Shieh, S.P.: Password authentication schemes with smart cards. Comput. Secur. 18(8), 727–733 (1999)CrossRef Yang, W.H., Shieh, S.P.: Password authentication schemes with smart cards. Comput. Secur. 18(8), 727–733 (1999)CrossRef
13.
Zurück zum Zitat Chan, C.K., Cheng, L.M.: Cryptanalysis of a timestamp-based password authentication scheme. Comput. Secur. 21(I), 74–76 (2002)CrossRef Chan, C.K., Cheng, L.M.: Cryptanalysis of a timestamp-based password authentication scheme. Comput. Secur. 21(I), 74–76 (2002)CrossRef
14.
Zurück zum Zitat Sun, H.M., Yeh, H.T.: Further cryptanalysis of a password authentication scheme with smart cards. IEICE Trans. Commun. E86-B(4), 1412–1415 (2003) Sun, H.M., Yeh, H.T.: Further cryptanalysis of a password authentication scheme with smart cards. IEICE Trans. Commun. E86-B(4), 1412–1415 (2003)
15.
Zurück zum Zitat Fan, L., Li, J.H., Zhu, H.W.: An enhancement of timestamp based password authentication scheme. Comput. Secur. 21, 665–667 (2002)CrossRef Fan, L., Li, J.H., Zhu, H.W.: An enhancement of timestamp based password authentication scheme. Comput. Secur. 21, 665–667 (2002)CrossRef
16.
Zurück zum Zitat Shen, J.J., Lin, C.W., Hwang, M.S.: Security enhancement for the timestamp-based password authentication scheme using smart cards. Comput. Secur. 22(7), 591–595 (2003)CrossRef Shen, J.J., Lin, C.W., Hwang, M.S.: Security enhancement for the timestamp-based password authentication scheme using smart cards. Comput. Secur. 22(7), 591–595 (2003)CrossRef
17.
Zurück zum Zitat Liu, Y., Zhou, A.M., Gao, M.X.: A new mutual authentication scheme based on nonce and smart cards. Comput. Commun. 31(10), 2205–2209 (2008)CrossRef Liu, Y., Zhou, A.M., Gao, M.X.: A new mutual authentication scheme based on nonce and smart cards. Comput. Commun. 31(10), 2205–2209 (2008)CrossRef
18.
Zurück zum Zitat Chien, H.Y., Jan, J.K., Tseng, Y.M.: An efficient and practical solution to remote authentication: smart card. Comput. Secur. 21(4), 372–375 (2002)CrossRef Chien, H.Y., Jan, J.K., Tseng, Y.M.: An efficient and practical solution to remote authentication: smart card. Comput. Secur. 21(4), 372–375 (2002)CrossRef
19.
Zurück zum Zitat Hsu, C.L.: Security of Chien et al.’s remote user authentication scheme using smart cards. Comput. Stand. Interfaces (2003) Hsu, C.L.: Security of Chien et al.’s remote user authentication scheme using smart cards. Comput. Stand. Interfaces (2003)
21.
Zurück zum Zitat Paixao, C.A.M., Filho, D.L.G.: An efficient variant of the RSA cryptosystem. Eprint Archive (2003) Paixao, C.A.M., Filho, D.L.G.: An efficient variant of the RSA cryptosystem. Eprint Archive (2003)
22.
Zurück zum Zitat Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MathSciNetCrossRef Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MathSciNetCrossRef
23.
Zurück zum Zitat Garg, D., Verma, S.: Improvement over public key cryptographic algorithm. In: IEEE International Advance Computing Conference (IACC 2009), Patiala, India, March 2009 Garg, D., Verma, S.: Improvement over public key cryptographic algorithm. In: IEEE International Advance Computing Conference (IACC 2009), Patiala, India, March 2009
27.
Zurück zum Zitat Collins, T., Hopkins, D., Langford, S., Sabin, M.: Public Key Cryptographic Apparatus and Method. US Patent #5848159, January 1997 Collins, T., Hopkins, D., Langford, S., Sabin, M.: Public Key Cryptographic Apparatus and Method. US Patent #5848159, January 1997
29.
Metadaten
Titel
An RSA-Based User Authentication Scheme for Smart-Homes Using Smart Card
verfasst von
Maninder Singh Raniyal
Isaac Woungang
Sanjay Kumar Dhurandher
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-03712-3_2