Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 5/2023

05-08-2023

Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications

Authors: K. Swapna Sudha, N. Jeyanthi

Published in: Peer-to-Peer Networking and Applications | Issue 5/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the modern era, smart home technology is considered as the most growing application of Internet of Things (IoT) as they facilitate users for control home devices remotely. Anonymous and efficient authentication approaches in smart home environments are essential for attaining secure communication as the home and user communication channel is highly vulnerable and insecure. In this paper, Merkle Hash Tree and Strongly Constrained Discrete Hashing Function-based Authentication (MHS-SCDHF-AS) that integrates the transaction history and physical context awareness is proposed for enabling security for Smart Home IoT applications. This MHS-SCDHF-AS prevents the problem of clock synchronization and does not utilize a verification table both during the authentication process. This Strongly Constrained Discrete Hashing Functionis a supervised hashing method which overcomes the limitations of large quantization errors and suboptimal binary codes. It is also capable of learning binary codes and significant in resisting the transmission loss as each information used for verification contains its authentication data in itself. The computation cost and communication cost of the proposed MHS-SCDHF-AS is identified to be lesser than the benchmarked authentication schemes considered for investigation. The formal, informal and model checking-based security investigation of the proposed MHS-SCDHF-AS is also confirmed to be superior over the baseline authentication schemes used for smart home environments.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Agrawal D, Bhagwat R, Bandopadhyay R, Kunapareddi V, Burden E, Halse S, Wisniewski P, Kropczynski J (2020) Enhancing Smart Home Security using Co-Monitoring of IoT Devices. Companion of the 2020 ACM International Conference on Supporting Group Work 2(1):34–48 Agrawal D, Bhagwat R, Bandopadhyay R, Kunapareddi V, Burden E, Halse S, Wisniewski P, Kropczynski J (2020) Enhancing Smart Home Security using Co-Monitoring of IoT Devices. Companion of the 2020 ACM International Conference on Supporting Group Work 2(1):34–48
2.
go back to reference Yang H, Lee W, Lee H (2018) IoT Smart Home Adoption: The Importance of Proper Level Automation. J Sens 2018(1):1–11MathSciNet Yang H, Lee W, Lee H (2018) IoT Smart Home Adoption: The Importance of Proper Level Automation. J Sens 2018(1):1–11MathSciNet
3.
go back to reference Kim JT (2017) Analyses of a secure authentication scheme for a smart home system based on internet on things. 2017 International Conference on Applied System Innovation (ICASI) 9(1):100158 Kim JT (2017) Analyses of a secure authentication scheme for a smart home system based on internet on things. 2017 International Conference on Applied System Innovation (ICASI) 9(1):100158
4.
go back to reference Domb M (2019) Smart Home Systems Based on Internet of Things. IoT and Smart Home Automation [Working Title] 1(1):45–59 Domb M (2019) Smart Home Systems Based on Internet of Things. IoT and Smart Home Automation [Working Title] 1(1):45–59
5.
go back to reference Banerjee A, Sufyanf F, Nayel MS, Sagar S (2018) Centralized framework for controlling heterogeneous appliances in a smart home environment. 2018 International Conference on Information and Computer Technologies (ICICT) 1(1):23–33 Banerjee A, Sufyanf F, Nayel MS, Sagar S (2018) Centralized framework for controlling heterogeneous appliances in a smart home environment. 2018 International Conference on Information and Computer Technologies (ICICT) 1(1):23–33
6.
go back to reference Wilson G, Pereyda C, Raghunath N, De la Cruz G, Goel S, Nesaei S, Minor B, Schmitter-Edgecombe M, Taylor ME, Cook DJ (2019) Robot-enabled support of daily activities in smart home environments. Cogn Syst Res 54(1):258–272CrossRef Wilson G, Pereyda C, Raghunath N, De la Cruz G, Goel S, Nesaei S, Minor B, Schmitter-Edgecombe M, Taylor ME, Cook DJ (2019) Robot-enabled support of daily activities in smart home environments. Cogn Syst Res 54(1):258–272CrossRef
7.
go back to reference Gebrie MT, Abie H (2017) Risk-based adaptive authentication for internet of things in smart home eHealth. Proceedings of the 11th European Conference on Software Architecture Companion Proceedings - ECSA '17 1(1):22–32 Gebrie MT, Abie H (2017) Risk-based adaptive authentication for internet of things in smart home eHealth. Proceedings of the 11th European Conference on Software Architecture Companion Proceedings - ECSA '17 1(1):22–32
8.
go back to reference Hussain S, Chaudhry SA (2019) Comments on Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment. IEEE Internet Things J 6(6):10936–10940CrossRef Hussain S, Chaudhry SA (2019) Comments on Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment. IEEE Internet Things J 6(6):10936–10940CrossRef
9.
go back to reference Alshahrani M, Traore I, Woungang I (2019) Anonymous mutual IoT interdevice authentication and key agreement scheme based on the ZigBee technique. Internet of Things 7(1):100061CrossRef Alshahrani M, Traore I, Woungang I (2019) Anonymous mutual IoT interdevice authentication and key agreement scheme based on the ZigBee technique. Internet of Things 7(1):100061CrossRef
10.
go back to reference Gaikwad PP, Gabhane JP, Golait SS (2015) A survey based on Smart Homes system using Internet-of-Things. 2015 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC) 1(1):45–56 Gaikwad PP, Gabhane JP, Golait SS (2015) A survey based on Smart Homes system using Internet-of-Things. 2015 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC) 1(1):45–56
11.
go back to reference Chuang Y, Lo N, Yang C, Tang S (2018) A Lightweight Continuous Authentication Protocol for the Internet of Things. Sensors 18(4):1104CrossRef Chuang Y, Lo N, Yang C, Tang S (2018) A Lightweight Continuous Authentication Protocol for the Internet of Things. Sensors 18(4):1104CrossRef
12.
go back to reference Kim Y-P, Yoo S, Yoo C (2015) DAoT: Dynamic and energy-aware authentication for smart home appliances in Internet of Things. IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV 2(2):196–197 Kim Y-P, Yoo S, Yoo C (2015) DAoT: Dynamic and energy-aware authentication for smart home appliances in Internet of Things. IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV 2(2):196–197
13.
go back to reference Ali W, Dustgeer G, Awais M, Shah MA (2017) IoT based smart home: Security challenges, security requirements and solutions. 23rd International Conference on Automation and Computing (ICAC), Huddersfield 1(2):1–6 Ali W, Dustgeer G, Awais M, Shah MA (2017) IoT based smart home: Security challenges, security requirements and solutions. 23rd International Conference on Automation and Computing (ICAC), Huddersfield 1(2):1–6
14.
go back to reference Lin C, He D, Kumar N, Huang X, Vijayakumar P, Choo KR (2020) HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes. IEEE Internet Things J 7(2):818–829CrossRef Lin C, He D, Kumar N, Huang X, Vijayakumar P, Choo KR (2020) HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes. IEEE Internet Things J 7(2):818–829CrossRef
15.
go back to reference Poh GS, Gope P, Ning J (2018) PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment. IEEE Trans Dependable Secure Comput 3(3):213–2239 Poh GS, Gope P, Ning J (2018) PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment. IEEE Trans Dependable Secure Comput 3(3):213–2239
16.
go back to reference Peter S, Gopal RK (2016) Multi-level authentication system for smart home-security analysis and implementation, International Conference on Inventive Computation Technologies (ICICT). Coimbatore 3(1):1–7 Peter S, Gopal RK (2016) Multi-level authentication system for smart home-security analysis and implementation, International Conference on Inventive Computation Technologies (ICICT). Coimbatore 3(1):1–7
17.
go back to reference Kim JT (2017) Analyses of secure authentication scheme for smart home system based on internet on things 2017 International Conference on Applied System Innovation (ICASI), Sapporo, 2017, pp 335–336 Kim JT (2017) Analyses of secure authentication scheme for smart home system based on internet on things 2017 International Conference on Applied System Innovation (ICASI), Sapporo, 2017, pp 335–336
18.
go back to reference Naoui S, Elhdhili MH, Saidane LA (2019) Novel Smart Home Authentication Protocol LRP-SHAP, IEEE Wireless Communications and Networking Conference (WCNC). Marrakesh, Morocco 2(1):1–6 Naoui S, Elhdhili MH, Saidane LA (2019) Novel Smart Home Authentication Protocol LRP-SHAP, IEEE Wireless Communications and Networking Conference (WCNC). Marrakesh, Morocco 2(1):1–6
19.
go back to reference Ren H, Song Y, Yang S, Situ F (2016) Secure smart home: A voiceprint and internet based authentication system for remote accessing,11th International Conference on Computer Science & Education (ICCSE), Nagoya 3(2):247–251 Ren H, Song Y, Yang S, Situ F (2016) Secure smart home: A voiceprint and internet based authentication system for remote accessing,11th International Conference on Computer Science & Education (ICCSE), Nagoya 3(2):247–251
20.
go back to reference Ashibani DK, Mahmoud QH (2017) A context-aware authentication service for smart homes, 14th IEEE Annual Consumer Communications & Networking Conference (CCNC). Las Vegas, NV 5(2):588–589 Ashibani DK, Mahmoud QH (2017) A context-aware authentication service for smart homes, 14th IEEE Annual Consumer Communications & Networking Conference (CCNC). Las Vegas, NV 5(2):588–589
21.
go back to reference Wazid M, Das AK, Odelu V, Kumar N, Susilo W (2020) Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. IEEE Trans Dependable Secure Comput 17(2):391–406CrossRef Wazid M, Das AK, Odelu V, Kumar N, Susilo W (2020) Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. IEEE Trans Dependable Secure Comput 17(2):391–406CrossRef
22.
go back to reference Lyu Q, Zheng N, Liu H, Gao C, Chen S, Liu J (2019) Remotely Access “My” Smart Home in Private: An Anti-Tracking Authentication and Key Agreement Scheme. IEEE Access 7(2):41835–41851CrossRef Lyu Q, Zheng N, Liu H, Gao C, Chen S, Liu J (2019) Remotely Access “My” Smart Home in Private: An Anti-Tracking Authentication and Key Agreement Scheme. IEEE Access 7(2):41835–41851CrossRef
23.
go back to reference Dey S, Hossain A (2019) Session-Key Establishment and Authentication in a Smart Home Network Using Public Key Cryptography. IEEE Sensors Letters 3(4):1–4CrossRef Dey S, Hossain A (2019) Session-Key Establishment and Authentication in a Smart Home Network Using Public Key Cryptography. IEEE Sensors Letters 3(4):1–4CrossRef
24.
go back to reference Alshahrani M, Traore I (2019) Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain. Journal of Information Security and Applications 45(1):156–175CrossRef Alshahrani M, Traore I (2019) Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain. Journal of Information Security and Applications 45(1):156–175CrossRef
25.
go back to reference Fakroon M, Alshahrani M, Gebali F, Traore I (2020) Secure remote anonymous user authentication scheme for smart home environment. Internet of Things 9(1):100158CrossRef Fakroon M, Alshahrani M, Gebali F, Traore I (2020) Secure remote anonymous user authentication scheme for smart home environment. Internet of Things 9(1):100158CrossRef
Metadata
Title
Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications
Authors
K. Swapna Sudha
N. Jeyanthi
Publication date
05-08-2023
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 5/2023
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01527-4

Other articles of this Issue 5/2023

Peer-to-Peer Networking and Applications 5/2023 Go to the issue

Premium Partner