Skip to main content
Top

2023 | OriginalPaper | Chapter

42. A Secure Authentication Scheme for Smart Home Based on Trusted Execution Environment

Authors : Houpeng Hu, Jiaxiang Ou, Bin Qian, Yi Luo, Yanhong Xiao, Zerui Chen

Published in: Advances in Smart Vehicular Technology, Transportation, Communication and Applications

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the rapid growth of the smart home, remote control of devices within a smart home environment has become a primary and essential function. However, there are significant security vulnerabilities in the process of remote control. This paper proposes a secure authentication scheme based on a trusted execution environment for smart home remote control. The proposed scheme generates a session key between smart home devices and users. This session key ensures that a user can securely control devices remotely and resist various well-known attacks. We also utilize the Real-or-Random model to demonstrate our scheme is provably secure. Besides, our work has lower computation and communication costs than other related methods.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Amintoosi, H., Nikooghadam, M., Kumari, S., Kumar, S., Chen, C.M.: TAMA: three-factor authentication for multi-server architecture. Hum.-Centric Comput. Inf. Sci. 11 (2021) Amintoosi, H., Nikooghadam, M., Kumari, S., Kumar, S., Chen, C.M.: TAMA: three-factor authentication for multi-server architecture. Hum.-Centric Comput. Inf. Sci. 11 (2021)
2.
go back to reference Banerjee, S., Odelu, V., Das, A.K., Chattopadhyay, S., Park, Y.: An efficient, anonymous and robust authentication scheme for smart home environments. Sensors 20(4), 1215 (2020) Banerjee, S., Odelu, V., Das, A.K., Chattopadhyay, S., Park, Y.: An efficient, anonymous and robust authentication scheme for smart home environments. Sensors 20(4), 1215 (2020)
3.
go back to reference Bao, Z., Shi, W., Kumari, S., Kong, Z.Y., Chen, C.M.: Lockmix: a secure and privacy-preserving mix service for bitcoin anonymity. Int. J. Inf. Secur. 19(3), 311–321 (2020) Bao, Z., Shi, W., Kumari, S., Kong, Z.Y., Chen, C.M.: Lockmix: a secure and privacy-preserving mix service for bitcoin anonymity. Int. J. Inf. Secur. 19(3), 311–321 (2020)
4.
go back to reference Chen, C.M., Deng, X., Gan, W., Chen, J., Islam, S.: A secure blockchain-based group key agreement protocol for IoT. J. Supercomput. 77(8), 9046–9068 (2021)CrossRef Chen, C.M., Deng, X., Gan, W., Chen, J., Islam, S.: A secure blockchain-based group key agreement protocol for IoT. J. Supercomput. 77(8), 9046–9068 (2021)CrossRef
5.
go back to reference Chen, C.M., Xiang, B., Wang, K.H., Yeh, K.H., Wu, T.Y.: A robust mutual authentication with a key agreement scheme for session initiation protocol. Appl. Sci. 8(10), 1789 (2018) Chen, C.M., Xiang, B., Wang, K.H., Yeh, K.H., Wu, T.Y.: A robust mutual authentication with a key agreement scheme for session initiation protocol. Appl. Sci. 8(10), 1789 (2018)
6.
go back to reference Chen, Y.Q., Zhou, B., Zhang, M., Chen, C.M.: Using IoT technology for computer-integrated manufacturing systems in the semiconductor industry. Appl. Soft Comput. 89, 106065 (2020) Chen, Y.Q., Zhou, B., Zhang, M., Chen, C.M.: Using IoT technology for computer-integrated manufacturing systems in the semiconductor industry. Appl. Soft Comput. 89, 106065 (2020)
7.
go back to reference Dey, S., Hossain, A.: Session-key establishment and authentication in a smart home network using public key cryptography. IEEE Sens. Lett. 3(4), 1–4 (2019)CrossRef Dey, S., Hossain, A.: Session-key establishment and authentication in a smart home network using public key cryptography. IEEE Sens. Lett. 3(4), 1–4 (2019)CrossRef
8.
go back to reference Fakroon, M., Alshahrani, M., Gebali, F., Traore, I.: Secure remote anonymous user authentication scheme for smart home environment. Internet Things 9, 100158 (2020) Fakroon, M., Alshahrani, M., Gebali, F., Traore, I.: Secure remote anonymous user authentication scheme for smart home environment. Internet Things 9, 100158 (2020)
9.
go back to reference Gomez, C., Paradells, J.: Wireless home automation networks: a survey of architectures and technologies. IEEE Commun. Mag. 48(6), 92–101 (2010)CrossRef Gomez, C., Paradells, J.: Wireless home automation networks: a survey of architectures and technologies. IEEE Commun. Mag. 48(6), 92–101 (2010)CrossRef
10.
go back to reference Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (IoT): a vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 29(7), 1645–1660 (2013)CrossRef Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (IoT): a vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 29(7), 1645–1660 (2013)CrossRef
11.
go back to reference Jeong, J., Chung, M.Y., Choo, H.: Integrated OTP-based user authentication scheme using smart cards in home networks. In: Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), pp. 294–294. IEEE (2008) Jeong, J., Chung, M.Y., Choo, H.: Integrated OTP-based user authentication scheme using smart cards in home networks. In: Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), pp. 294–294. IEEE (2008)
12.
go back to reference Kim, H.J., Kim, H.S.: \({{\rm AUTH}}_{{\rm HOTP}}\)-HOTP based authentication scheme over home network environment. In: International Conference on Computational Science and Its Applications, pp. 622–637. Springer (2011) Kim, H.J., Kim, H.S.: \({{\rm AUTH}}_{{\rm HOTP}}\)-HOTP based authentication scheme over home network environment. In: International Conference on Computational Science and Its Applications, pp. 622–637. Springer (2011)
13.
go back to reference Kim, J.E., Boulos, G., Yackovich, J., Barth, T., Beckel, C., Mosse, D.: Seamless integration of heterogeneous devices and access control in smart homes. In: 2012 Eighth International Conference on Intelligent Environments, pp. 206–213. IEEE (2012) Kim, J.E., Boulos, G., Yackovich, J., Barth, T., Beckel, C., Mosse, D.: Seamless integration of heterogeneous devices and access control in smart homes. In: 2012 Eighth International Conference on Intelligent Environments, pp. 206–213. IEEE (2012)
14.
go back to reference Kumar, P., Gurtov, A., Iinatti, J., Ylianttila, M., Sain, M.: Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sens. J. 16(1), 254–264 (2015)CrossRef Kumar, P., Gurtov, A., Iinatti, J., Ylianttila, M., Sain, M.: Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sens. J. 16(1), 254–264 (2015)CrossRef
15.
go back to reference Kumari, A., Kumar, V., Abbasi, M.Y., Kumari, S., Chaudhary, P., Chen, C.M.: CSEF: cloud-based secure and efficient framework for smart medical system using ECC. IEEE Access 8, 107838–107852 (2020)CrossRef Kumari, A., Kumar, V., Abbasi, M.Y., Kumari, S., Chaudhary, P., Chen, C.M.: CSEF: cloud-based secure and efficient framework for smart medical system using ECC. IEEE Access 8, 107838–107852 (2020)CrossRef
16.
go back to reference Li, Y.: Design of a key establishment protocol for smart home energy management system. In: 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks, pp. 88–93. IEEE (2013) Li, Y.: Design of a key establishment protocol for smart home energy management system. In: 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks, pp. 88–93. IEEE (2013)
17.
go back to reference Li, Z., Miao, Q., Chaudhry, S.A., Chen, C.M.: A provably secure and lightweight mutual authentication protocol in fog-enabled social internet of vehicles. Int. J. Distrib. Sens. Netw. 18(6), 15501329221104332 (2022) Li, Z., Miao, Q., Chaudhry, S.A., Chen, C.M.: A provably secure and lightweight mutual authentication protocol in fog-enabled social internet of vehicles. Int. J. Distrib. Sens. Netw. 18(6), 15501329221104332 (2022)
18.
go back to reference Liu, S., Chen, C.M.: Comments on “a secure and lightweight drones-access protocol for smart city surveillance”. IEEE Trans. Intell. Transp. Syst. (2022) Liu, S., Chen, C.M.: Comments on “a secure and lightweight drones-access protocol for smart city surveillance”. IEEE Trans. Intell. Transp. Syst. (2022)
19.
go back to reference Mei, Q., Xiong, H., Chen, Y.C., Chen, C.M.: Blockchain-enabled privacy-preserving authentication mechanism for transportation cps with cloud-edge computing. IEEE Trans. Eng. Manag. (2022) Mei, Q., Xiong, H., Chen, Y.C., Chen, C.M.: Blockchain-enabled privacy-preserving authentication mechanism for transportation cps with cloud-edge computing. IEEE Trans. Eng. Manag. (2022)
20.
go back to reference Naoui, S., Elhdhili, M.H., Saidane, L.A.: Novel smart home authentication protocol LRP-shap. In: 2019 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–6. IEEE (2019) Naoui, S., Elhdhili, M.H., Saidane, L.A.: Novel smart home authentication protocol LRP-shap. In: 2019 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–6. IEEE (2019)
21.
go back to reference Renuka, K., Kumar, S., Kumari, S., Chen, C.M.: Cryptanalysis and improvement of a privacy-preserving three-factor authentication protocol for wireless sensor networks. Sensors 19(21), 4625 (2019) Renuka, K., Kumar, S., Kumari, S., Chen, C.M.: Cryptanalysis and improvement of a privacy-preserving three-factor authentication protocol for wireless sensor networks. Sensors 19(21), 4625 (2019)
22.
go back to reference Santoso, F.K., Vun, N.C.: Securing iot for smart home system. In: 2015 International Symposium on Consumer Electronics (ISCE), pp. 1–2. IEEE (2015) Santoso, F.K., Vun, N.C.: Securing iot for smart home system. In: 2015 International Symposium on Consumer Electronics (ISCE), pp. 1–2. IEEE (2015)
23.
go back to reference Shuai, M., Yu, N., Wang, H., Xiong, L.: Anonymous authentication scheme for smart home environment with provable security. Comput. Secur. 86, 132–146 (2019)CrossRef Shuai, M., Yu, N., Wang, H., Xiong, L.: Anonymous authentication scheme for smart home environment with provable security. Comput. Secur. 86, 132–146 (2019)CrossRef
24.
go back to reference Vaidya, B., Park, J.H., Yeo, S.S., Rodrigues, J.J.: Robust one-time password authentication scheme using smart card for home network environment. Comput. Commun. 34(3), 326–336 (2011)CrossRef Vaidya, B., Park, J.H., Yeo, S.S., Rodrigues, J.J.: Robust one-time password authentication scheme using smart card for home network environment. Comput. Commun. 34(3), 326–336 (2011)CrossRef
25.
go back to reference Xiong, H., Hou, Y., Huang, X., Zhao, Y., Chen, C.M.: Heterogeneous signcryption scheme from IBC to PKI with equality test for WBANs. IEEE Syst. J. (2021) Xiong, H., Hou, Y., Huang, X., Zhao, Y., Chen, C.M.: Heterogeneous signcryption scheme from IBC to PKI with equality test for WBANs. IEEE Syst. J. (2021)
26.
go back to reference Yavari, M., Safkhani, M., Kumari, S., Kumar, S., Chen, C.M.: An improved blockchain-based authentication protocol for IoT network management. Secur. Commun. Netw. 2020 (2020) Yavari, M., Safkhani, M., Kumari, S., Kumar, S., Chen, C.M.: An improved blockchain-based authentication protocol for IoT network management. Secur. Commun. Netw. 2020 (2020)
27.
go back to reference Yu, B., Li, H.: Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor internet of things. Int. J. Distrib. Sens. Netw. 15(9), 1550147719879379 (2019) Yu, B., Li, H.: Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor internet of things. Int. J. Distrib. Sens. Netw. 15(9), 1550147719879379 (2019)
Metadata
Title
A Secure Authentication Scheme for Smart Home Based on Trusted Execution Environment
Authors
Houpeng Hu
Jiaxiang Ou
Bin Qian
Yi Luo
Yanhong Xiao
Zerui Chen
Copyright Year
2023
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-0848-6_43

Premium Partner