You are currently viewing a new version of our website. To view the old version click .
Mathematics
  • Article
  • Open Access

30 April 2023

Toward a Secure Smart-Home IoT Access Control Scheme Based on Home Registration Approach

,
,
,
and
1
College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, China
2
Department of Computer Science, University of California, Davis, CA 001313, USA
3
Department of Mathematics, Chaudhary Charan Singh University, Meerut 250004, India
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Recent Advances in Security, Privacy, and Applied Cryptography

Abstract

The extensive application of the Internet of Things (IoT) and artificial intelligence technology has greatly promoted the construction and development of smart cities. Smart home as the foundation of smart cities can optimize home lifestyles. However, users access the smart home system through public channels, and the transmitted information is vulnerable to attack by attackers, and the privacy and data security of the home user will be difficult to be guaranteed. Therefore, how to protect users’ data and privacy security becomes critical. In this paper, we design a provably secure authentication scheme for the smart home environment, which ensures that only legitimate users can use smart devices. We use the informal model to verify the security of the scheme and formally analyze the security and correctness of the scheme through the Real or Random model. Finally, through the comparison of security and performance analysis, it is proven that our scheme has higher security under similar performance.

1. Introduction

The Internet of things (IoT) [,], cloud computing [,], big data [,], artificial intelligence [,], 5G and other technologies have promoted the construction and development of smart city. Smart city [] covers all fields of life, such as smart transportation [,], smart healthcare [], smart home, smart grid, etc., which are an indispensable part of smart city. As the foundation of smart city, smart home [,] is also the field closest to people’s daily life. It can provide an information exchange function for families. People can operate and monitor smart home devices through the Internet and know what happens at home any time, improving people’s comfort in life and optimizing people’s lifestyles. The smart home environment includes various smart devices, such as refrigerators, cameras, curtains, etc. People can control smart devices through smartphones or tablets to enjoy their services. For example, users can view the camera remotely to understand what is happening at home; the users can control the temperature of the air conditioner through the smart phone.
A typical smart home architecture shown in Figure 1 consists of four entities: registration authority (RA), gateway, smart device, and users. RA is a trusted entity that mainly authorizes the gateway as the home registration center. Gateway is a semi-trusted entity that helps users to communicate with smart home devices and is responsible for registration. Smart device refers to all kinds of smart home appliances in the family, such as smart refrigerators, smart air conditioners, etc., where they are semi-trusted entities, and are connected to the gateway by wireless networks to provide users with various services. Only family members can register with the gateway to become legal users. In this architecture, users need to connect the home devices via the gateway, and then operate the home devices through the smart home APP or voice assistant, such as adjusting the indoor temperature, switching lights, adjusting curtains, playing music, etc. Although the smart home has changed people’s lives, it faces many security threats and challenges. For example, since smart home devices are connected to the Internet, malicious attackers can access users’ private information by intercepting transmitted messages via open channels. Therefore, ensuring a secure smart-home IoT access control scheme is very important.
Figure 1. The architecture of smart home.
At present, some scholars protect users’ privacy through differential privacy [], quick response (QR) code [] and other technologies, and many scholars have proposed many authentication and key agreement (AKA) schemes [,,,,,,,,] to protect the confidentiality and security of transmitted information, but most of their schemes have various security problems, such as unable to achieve mutual authentication, unable to resist offline password guessing (OPG) attacks, insider attacks, impersonation attacks, etc. In order to protect and improve the security of information, Intel has proposed a new set of CPU instruction extensions called software guard extensions (SGX) [,] technology. It is a kind of hardware that can create a trusted execution environment (TEE) to protect code and data, which even high-level system software cannot access. The system will allocate a pre-reserved physical memory area for SGX technology, which is called enclave page cache (EPC), and the code and data are stored in a secure environment, called enclave. The application protected by SGX is divided into two parts: trusted part and untrusted part. The trusted part will run in the safe memory and conduct integrity measurement when loaded into Enclave to ensure the integrity and security of data. The program access address is in the Enclave and the physical address is in the EPC. Because the two achieve access control through a unique mapping relationship, it can ensure that external programs cannot access the enclave memory. SGX provides automatic generation functions Ecall and Ocall. Some privacy data is stored in Enclave memory through Ecall function. After confidential calculation is completed in Enclave, the calculated results are returned through Ocall function.
To ensure the secure transmission of remote control data, we propose a scheme based on SGX, which can help our scheme effectively resist insider attacks. Our main contributions are as below:
(1)
We propose a new framework that features the ability to be registered within a family. Different from the past, we authorize the smart gateway as a home registration center by the registration authority (RA), so that users and smart devices can complete registration at home, which also facilitates the addition of future members and devices. This process can be completed only at home.
(2)
According to our survey, this is the first paper to apply SGX to smart home environments. Using SGX can be effective to prevent insider attacks.
(3)
We demonstrate the security of the proposed scheme using Real-Or-Random (RoR) model and informal security analysis. Furthermore, we compare the proposed scheme with other existing schemes, and the results reveal that our scheme offers higher security with similar performance.
The remainder of the paper is arranged as follows. Section 2 is related work, Section 3 is the proposed scheme, the security analysis is in Section 4, and Section 5 is the performance comparison. Our conclusion is in Section 6.

3. The Proposed Scheme

In this section, we introduce the proposed scheme in detail, the network model of this scheme is shown in Figure 2. The proposed scheme includes three phases: authorization gateway, registration, and access and control. The notations used in the paper are listed in Abbreviations.
Figure 2. Network model of smart home.

3.1. Authorization Gateway Phase

R A selects I D k , r k , computes the temporary identity P I D k = h ( I D k     r k ) of G W , and transmits { I D k , P I D k } to G W ; G W stores { P I D k } in memory. Then, G W selects F p , G , P , x. Then, G W computes X = x · P , stores { ( P I D k , I D k , x ) } in SGX, and publish { E ( F p ) , G , P , X } .

3.2. Registration Phases

At this phase, users and smart devices register with the gateway as a legal entity, and all registration information is transmitted on the secure channel.

3.2.1. User Registration Phase

(1)
U i chooses identity I D i , password P W i and biometrics B i , and then transmits the I D i to the G W ;
(2)
G W selects random number a i , computes H I D i = h ( I D i     a i ) , and sends H I D i to U i ;
(3)
U i calculates G e n ( B i ) = ( σ i , τ i ) , A u t h i = h ( I D i     P W i     σ i ) , and stores A u t h i , H I D i , τ i in their own mobile device. Table 2 shows the detailed process.
Table 2. User registration phase.

3.2.2. Smart Device Registration Phase

(1)
D j chooses its own identity S I D j and transmits it to the G W ;
(2)
G W selects random number r j , computes P I D j = h ( S I D j     r j ) , stores P I D j in memory, and stores { ( P I D j , I D j ) } . Finally, it sends P I D j to D j ;
(3)
D j stores P I D j in its own memory.

3.3. Access and Control Phase

The G W assists the U i and the D j in completing identity authentication and establishing a session key. Messages between devices are also transmitted through public channels. The detailed process is shown in Table 3.
Table 3. Login and authentication phase.
(1)
U i enters I D i , P W i , B i , calculates σ i = R e p ( B i , τ i ) , A u t h i = h ( I D i     P W i     σ i ) , and verifies A u t h i = ? A u t h i . If the verification passes, this shows that the U i is legitimate; Otherwise, the session terminates. U i selects d 1 , d 2 , T 1 , computes C 1 = d 1 · P , C 2 = d 1 · x , C 3 = d 2 C 2 S I D j , C 4 = I D i h ( S I D j     d 2 ) , V 1 = h ( C 2     I D i     T 1 ) . At last, U i transmits message M 1 = { P I D k , P I D j , C 1 , C 3 , V 1 , T 1 } to G W .
(2)
When the G W obtains message M 1 , it validates the timestamp’s correctness. Next, G W sends P I D j , P I D k to the SGX interface. SGX match S I D j and x according to P I D j , P I D k . Then, G W computes C 2 = x · C 1 , d 2 = C 3 C 2 S I D j , I D i = C 4 h ( S I D j     d 2 ) , V 1 = h ( C 2     I D i     T 1 ) , and verifies V 1 = ? V 1 . If the verification passes, G W selects T 2 , computes C 5 = I D i d 2 h ( S I D j     T 2 ) , V 2 = h ( S I D j d 2 T 2 ) , and sends message M 2 = C 5 , V 2 , T 2 to the S j .
(3)
Upon receiving the M 2 , S j verifies the timestamp | T T 2 | Δ T , then computes I D i d 2 = C 5 h ( S I D j     T 2 ) , V 2 = h ( I D i d 2     T 2 ) , and verifies V 2 = ? V 2 . If the verification is successful, it selects T 3 , d 3 , and computes S K j i = h ( S I D j d 3     I D i d 2 ) , C 6 = d 3 h ( I D i d 2     S I D j ) , V 3 = h ( S I D j     T 3 ) , V 4 = h ( S K j i     d 3     S I D j ) , and transmits the M 3 = C 6 , V 3 , T 3 , V 4 to G W .
(4)
When G W receives the M 3 , it verifies the T 3 . Next, G W computes V 3 = h ( S I D j     T 3 ) , and verifies V 3 = ? V 3 . If the verification is successful, it proves that S j is a legitimate device. Then it selects the timestamp T 4 , and then send M 4 = { C 6 , V 4 , T 4 } to the U i .
(5)
After receiving the message M 4 , U i computes d 3 = C 6 h ( I D i d 2     S I D j ) , S K i j = h ( S I D j d 3     I D i d 2 ) , V 4 = h ( S K i j     d 3     S I D j ) , and verifies V 4 = ? V 4 . If the two values are the same, U i will use the S K i j to transmit information with S j .

4. Security Analysis

4.1. Formal Analysis

We use RoR model to formally analyze the scheme to prove the security of the proposed scheme. The steps of proof will be described in detail below.

RoR Model

RoR model [,] simulates the probability of an attacker cracking the scheme in polynomial time through different rounds of games and judges the security of the proposed scheme by whether the attacker can calculate the session key.
Our proposed agreement has three participants: U i , G W , and D j . We define Π U i x , Π g w y , and Π d j z to represent the user instance, the gateway instance, and the smart device instance, respectively. Based on the ROR model, A needs to follow the following capabilities in each game.
(1)
E x e c u t e ( O ) : This query is a passive attack and can enable A to eavesdrop on messages sent by entities, where O = { Π U i x , Π G W y , Π D j z }.
(2)
S e n d ( O , M i ) : A can send the message M i send it to O and obtain the response from O.
(3)
H a s h ( s t r i n g ) : This query means that A can obtain the hash of a certain string.
(4)
C o r r u p t M o b i l e d e v i c e ( Π U i x ) : A executing this query can obtain data in the mobile device.
(5)
T e s t ( O ) : A flips a coin c to guess the real session key. In the case of c = 1 , the A can obtain the session key, otherwise the attacker obtains a random string.
Theorem 1.
In RoR model, A can break the proposed scheme in polynomial time is A d v A P ( ξ ) = q h 2 | H a s h | + 2 A d v A E C D H P ( ξ ) + q s 2 l 1 | D | . Here, | H a s h | indicates the range space of the hash function; A d v A E C D H P ( ξ ) indicates the advantage of cracking elliptic curve Diffie-Hellman problem (ECDHP); q s refers to the S e n d query; l indicates the bit length of biological information; | D | refers to the space size of the password dictionary.
Proof. 
We defined 4 games G M 0 - G M 3 to simulate A ’s attack process. During the proof process, s u c c A G M i ( ξ ) is defined as the probability that A can successfully compute the session key in each game, A d v A P indicates that the A can break the advantage of scheme P . The following is the specific process of the game.
G M 0 : In G M 0 , A needs to select a bit c to start the game simulating the real attack. So we have
A d v A P ( ξ ) = | 2 P r [ S u c c A G M 0 ( ξ ) ] 1 | .
G M 1 : G M 1 adds the E x e c u t e ( ) query to G M 0 . At G M 1 , A intercepts the M 1 = { P I D k , P I D j , C 1 , C 3 , C 4 , V 1 , T 1 } , M 2 = { C 5 , V 2 , T 2 } , M 3 = { C 6 , V 3 , V 4 , T 3 } and M 4 = { C 6 , V 4 , T 4 } . When this query ends, A will execute T e s t ( ) query to compute the session key S K i j = { S I D j d 3     I D i d 2 } . S I D j , d 3 , I D i and d 2 are confidential to A . Therefore, there is no difference between G M 1 and G M 0 .
P r [ S u c c A G M 1 ( ξ ) ] = P r [ S u c c A G M 0 ( ξ ) ] .
G M 2 : G M 2 adds S e n d ( ) and H a s h ( ) operations to the game. A wants to tamper with the message stolen on the public channel, but the authentication values V 1 , V 2 , V 3 , V 4 are all based on hash functions, and the authentication values are composed of random numbers and dot product. Since random numbers are different, hash functions do not collide. In addition, since the A cannot obtain the x of G W and cannot solve the ECDHP, the A cannot calculate C 2 * = x · C 1 . Therefore, based on A d v A E C D H P ( t ) and birthday paradox, we can obtain
| P r [ S u c c A G M 2 ( ξ ) ] P r [ S u c c A G M 1 ( ξ ) ] | q h 2 2 | H a s h | + A d v A E C D H P ( t ) .
G M 3 : G M 3 adds C o r r u p t M o b i l e d e v i c e ( ) operation, which can be used by A to obtain user information { V 1 , H I D i , τ i } . In addition, A selects a low entropy password based on the password dictionary to guess the correct password of U i , and the probability that A would correctly predict the biological key is 1 2 . Suppose the system allows the A to enter a limited number of wrong passwords, we have
| P r [ S u c c A G M 3 ( ξ ) ] P r [ S u c c A G M 2 ( ξ ) ] | q s 2 l | D | .
Finally, A guesses bit b through the T e s t ( ) operation to win the game. So we can obtain
P r [ S u c c A G M 3 ( ξ ) ] = 1 2 .
According to G M 0 G M 3 , we have
A d v A P ( ξ ) 2 = | P r [ S u c c A G M 0 ( ξ ) ] 1 2 | = | P r [ S u c c A G M 0 ( ξ ) ] P r [ S u c c A G M 3 ( ξ ) ] | = | P r [ S u c c A G M 1 ( ξ ) ] P r [ S u c c A G M 3 ( ξ ) ] | i = 0 2 | P r [ S u c c A G M i + 1 ( ξ ) ] P r [ S u c c A G M i ( ξ ) ] | = q h 2 2 | H a s h | + A d v A E C D H P ( ξ ) + q s 2 l | D |
Therefore, we can obtain
A d v A P ( ξ ) = q h 2 | H a s h | + 2 A d v A E C D H P ( ξ ) + q s 2 l 1 | D |

4.2. Informal Analysis

4.2.1. Impersonation Attack

Suppose that A attempts to impersonate a legitimate user and communicate with other entities communicate to establish a session key. Because R A is only responsible for registration and does not store any entity information, he cannot impersonate users by obtaining R A information. If A obtains the information { P I D k , P I D j } stored in the gateway and intercepts the information { P I D k , P I D j , C 1 , C 3 , V 1 , T 1 } on the public channel to compute V 1 = h ( C 2     I D i     T 1 ) , but because it cannot obtain { x , S I D j } , he cannot compute C 2 = x · C 1 , and I D i = C 4 h ( S I D j     d 2 ) , so he cannot successfully compute V 1 , and he cannot be authenticated through the gateway. Therefore, A cannot impersonate a legitimate user. In the same way, A tries to become a legitimate smart device, but because he cannot obtain the S I D j , he cannot compute the V 3 = h ( S I D j     T 3 ) , so he cannot successfully compute V 3 , and he cannot be authenticated through the gateway. So our scheme is immune to impersonate attack.

4.2.2. Session Key Disclosure (SKD) Attack

Suppose A intercepts the messages M 1 M 4 , and attempts to calculate S K = h ( S I D j d 3     I D i     d 2 ) , but the x , S I D j are private and A cannot obtain these values. Therefore, A cannot compute C 2 = x · C 1 , d 2 = C 3 C 2 S I D j , and I D i = C 4 h ( S I D j     d 2 ) through values of P I D j , C 1 , C 6 . Obviously, he cannot calculate S K . Thus, our scheme is immune to SKD attack.

4.2.3. Smart Device Stolen (SDS) Attack

Suppose A obtains the P S I D j stored in the smart home device, intercepts C 1 and C 4 , and tries to compute C 2 = x · C 1 , I D i = C 4 h ( S I D j     d 2 ) , because the smart device only stores the pseudo identity P I D j of the device, the attacker cannot obtain x , d 2 , so he cannot compute C 2 , I D i , so he cannot calculate the S K = h ( S I D j d 3     I D i     d 2 ) . Thus, our scheme can resist the SDS attack.

4.2.4. Privacy and Anonymity

A can identify the real identity of U i and D j according to the intercepted public channel information. In our proposed scheme, we use hash function and random number to hide the real identity of U i and D j , thus providing anonymity for them. In each session, because the random number is different, even if A can intercept the pseudo identity of U i and D j , he cannot identify the real identity of their real identities. Therefore, our scheme can protect the entity’s privacy from being disclosed.

4.2.5. Mutual Authentication

The gateway authenticates user and smart device using V 1 and V 3 , respectively. Although A can eavesdrop on these two values, A cannot correctly compute and change the verification value because he cannot obtain x , S I D j , and cannot compute C 2 = x · C 1 , I D i = C 4 h ( S I D j     d 2 ) . Similarly, although the verification value V 3 is transmitted on the public channel, A cannot obtain the S I D j . He cannot correctly calculate and change V 3 . As long as a changes any of the verification values, it will be detected immediately and the session will be terminated. So our scheme can realize mutual authentication.

5. Security and Performance Comparison

We use the proposed scheme to compare the existing schemes [,,] in terms of security, computing cost and communication cost, and the detailed introduction and comparison results are described below.

5.1. Security Comparison

The proposed scheme is compared with the three schemes regarding security, and the comparison results are listed in Table 4. Shuai et al.’s scheme [] is unable to withstand OPG, insider, and SKD attacks. The scheme of Yu et al. [] cannot realize mutual authentication; Kaur et al. [] cannot withstand impersonation attack and violated mutual authentication. The proposed scheme and Zou et al.’s scheme [] can resist common attack.
Table 4. Comparisons of security.

5.2. Computation Costs Comparison

We use an IQOO9 mobile phone to emulate U i and S j and a Lenovo desktop computer to emulate the G W . The mobile phone’s processor is a snapdragon 8-core processor with 12G of running memory and the Lenovo desktop computer’s CPU is the Intel(R) Core(TM)i5-8500 CPU@ 3.00 GHz with 16G of running memory. The software used on the computer is IntelliJ idea 2020.3, and the program is written using JAVA and cryptographic library JPBC-2.0.0 []. In Table 5, we select four main operations: hash function T h , point scalar multiplication T m , symmetric decryption T d e , and symmetric encryption T d n . We ran various operations 100 times on the mobile phone and computer to take the average running time. In Table 6, we based on the results in Table 5 to show the comparison of computation costs between our and recently proposed schemes [,,,]. For example, our scheme requires 7 T h + 2 T m for U i . The cost is 7 × 0.0023 + 2 × 0.6349 = 1.2859 ms.
Table 5. Computation costs of complex operations.
Table 6. Computation costs.
In Table 6, and Figure 3, the costs of [,,] for U i are less than our scheme. Our scheme requires an additional 0.1971 ms than [] and 0.0023 ms than [,]. In fact, the two values are reasonable in practice. More importantly, the three schemes have some security weaknesses mentioned in Table 4. Overall, our scheme provides both security and efficiency for U i .
Figure 3. The computation cost of users [,,,].
In Table 6, and Figure 4, the costs of [,,] for S j are less than our scheme. Our scheme requires an additional 0.0069 ms than [,] and 0.0023 ms than []. In fact, the two values are reasonable in practice. More importantly, the three schemes have some security weaknesses mentioned in Table 4. Overall, our scheme provides both security and efficiency for S j .
Figure 4. The computation cost of smart devices [,,,].

5.3. Communication Costs Comparison

In Table 7, we show the communication costs between our and recently proposed schemes [,,,]. Note that the lengths of symmetric encryption and decryption | E | , hash functions | H | , timestamp T, integer | Z p * | , identify | I D | and ECC | G | are defined by 256 bits, 256 bits, 128 bits, 160 bits, 32 bits, and 320 bits, respectively. Here, the total communication costs of our scheme are computed by 2 | I D | + | G | + 5 | Z p * | + 3 | T | + 5 | H | = 2 × 32 + 320 + 5 × 160 + 3 × 128 + 5 × 256 = 2348 bits. The communication costs of Shuai et al.’s scheme [] requires 3 | Z p * | + 4 | H | + | G | = 3 × 128 + 4 × 256 + 5 × 320 = 1824 bits, Kaur et al.’s scheme [] requires 5 | Z p * | + 4 | H | + | G | + 3 | T | = 5 × 128 + 4 × 256 + 320 + 3 × 128 = 2400 bits, Yu et al.’s scheme [] requires 4 | Z p * | + 4 | H | + 3 | T | = 4 × 128 + 4 × 256 + 3 × 128 = 2048 bits, Zou et al.’s scheme [] requires 3 | I D | + 3 | G | + 2 | Z p * | + 3 | T | + 10 | H | = 3 × 32 + 3 × 320 + 2 × 160 + 3 × 128 + 10 × 256 = 3944 bits. Finally, the results in Table 7 are depicted in Figure 5. It can be seen that Zou et al.’s scheme [] has the highest communication cost, Shuai et al.’s scheme [] has the lowest communication cost, and our scheme is lower than Zou et al.’s scheme [], slightly higher than Kaur et al.’s scheme [].
Table 7. Communication costs.
Figure 5. The results of communication costs [,,,].

6. Conclusions

As the foundation of smart cities, smart homes are closer to people’s lives, so ensuring the security of data transfers between entities is critical. In this paper, we propose an AKA scheme suitable for smart home environments and use the combination of SGX and gateway to prevent insider attacks effectively. Moreover, we also prove the proposed scheme’s security through informal security analysis and the RoR model. Finally, we compare the proposed scheme with existing schemes regarding security, computation, and communication costs. Based on the comparison results, our scheme performs better and is more suitable for this environment. In the future, smart home authentication schemes should incorporate multiple approaches such as multi-factor authentication and biometrics. Additionally, users should set strong passwords for smart home devices and limit the number of people who can access smart devices. We will continue to improve the smart home authentication scheme to meet the growing security needs.

Author Contributions

Conceptualization, T.-Y.W.; methodology, T.-Y.W. and Q.M.; software, Y.-C.C.; formal analysis, S.K.; investigation, C.-M.C.; writing—original draft preparation, T.-Y.W., Q.M., Y.-C.C., S.K. and C.-M.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The data is included in the article.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
IoTInternet of Things
SGXSoftware guard extensions
TEETrusted execution environment
EPCEnclave page cache
RORReal-or-random
AKAAuthentication and key agreement
OPGOffline password guessing
SKDSession key disclosure
PFSPerfect froward secrecy
SDSSmart device stolen
NotationsMeanings
U i The i-th user
I D i Identity of U i
P W i U i ’s password
P I D i Pseudo identity of U i
R A The registration authority
xRA’s secret key
G W The gateway
I D k The k-th user
P I D k G W ’s pseudo identity
D j The j-th smart device
S I D j D j ’s identity
P I D j D j ’s pseudo identity
S K i j , S K j i The session key

References

  1. Wu, T.Y.; Guo, X.; Chen, Y.C.; Kumari, S.; Chen, C.M. SGXAP: SGX-Based Authentication Protocol in IoV-Enabled Fog Computing. Symmetry 2022, 14, 1393. [Google Scholar] [CrossRef]
  2. Mei, Q.; Yang, M.; Chen, J.; Wang, L.; Xiong, H. Expressive Data Sharing and Self-Controlled Fine-Grained Data Deletion in Cloud-Assisted IoT. IEEE Trans. Dependable Secur. Comput. 2022; early access. [Google Scholar] [CrossRef]
  3. Zhang, J.; Li, M.; Chen, Z.; Lin, B. Computation offloading for object-oriented applications in a UAV-based edge-cloud environment. J. Supercomput. 2022, 78, 10829–10853. [Google Scholar] [CrossRef]
  4. Wu, T.Y.; Meng, Q.; Kumari, S.; Zhang, P. Rotating behind Security: A Lightweight Authentication Protocol Based on IoT-Enabled Cloud Computing Environments. Sensors 2022, 22, 3858. [Google Scholar] [CrossRef] [PubMed]
  5. Wang, S.; Chen, Z.; Zhu, W.; Wang, F.Y. Deep random walk of unitary invariance for large-scale data representation. Inf. Sci. 2021, 554, 1–14. [Google Scholar] [CrossRef]
  6. Cheng, H.; Shi, Y.; Wu, L.; Guo, Y.; Xiong, N. An intelligent scheme for big data recovery in Internet of Things based on multi-attribute assistance and extremely randomized trees. Inf. Sci. 2021, 557, 66–83. [Google Scholar] [CrossRef]
  7. Pan, J.S.; Lv, J.X.; Yan, L.J.; Weng, S.W.; Chu, S.C.; Xue, J.K. Golden eagle optimizer with double learning strategies for 3D path planning of UAV in power inspection. Math. Comput. Simul. 2022, 193, 509–532. [Google Scholar] [CrossRef]
  8. Zou, W.; Guo, L.; Huang, P.; Lin, G.; Mei, H. Linear time algorithm for computing min-max movement of sink-based mobile sensors for line barrier coverage. Concurr. Comput. Pract. Exp. 2022, 34, e6175. [Google Scholar] [CrossRef]
  9. Hundera, N.W.; Jin, C.; Geressu, D.M.; Aftab, M.U.; Olanrewaju, O.A.; Xiong, H. Proxy-based public-key cryptosystem for secure and efficient IoT-based cloud data sharing in the smart city. Multimed. Tools Appl. 2022, 81, 29673–29697. [Google Scholar] [CrossRef]
  10. Chaudhry, S.A. Combating identity de-synchronization: An improved lightweight symmetric key based authentication scheme for IoV. J. Netw. Intell. 2021, 6, 12. [Google Scholar]
  11. Wu, T.; Guo, X.; Chen, Y.; Kumari, S.; Chen, C. Amassing the security: An enhanced authentication protocol for drone communications over 5G networks. Drones 2021, 6, 10. [Google Scholar] [CrossRef]
  12. Wu, T.Y.; Meng, Q.; Yang, L.; Kumari, S.; Nia, M.P. Amassing the Security: An Enhanced Authentication and Key Agreement Protocol for Remote Surgery in Healthcare Environment. Comput. Model. Eng. Sci. 2023, 134, 317–341. [Google Scholar] [CrossRef]
  13. Shuai, M.; Yu, N.; Wang, H.; Xiong, L. Anonymous authentication scheme for smart home environment with provable security. Comput. Secur. 2019, 86, 132–146. [Google Scholar] [CrossRef]
  14. Kong, H.; Lu, L.; Yu, J.; Chen, Y.; Tang, F. Continuous authentication through finger gesture interaction for smart homes using WiFi. IEEE Trans. Mob. Comput. 2020, 20, 3148–3162. [Google Scholar] [CrossRef]
  15. Zhao, J.; Chen, Y.; Zhang, W. Differential privacy preservation in deep learning: Challenges, opportunities and solutions. IEEE Access 2019, 7, 48901–48911. [Google Scholar] [CrossRef]
  16. Pan, J.S.; Sun, X.X.; Chu, S.C.; Abraham, A.; Yan, B. Digital watermarking with improved SMS applied for QR code. Eng. Appl. Artif. Intell. 2021, 97, 104049. [Google Scholar] [CrossRef]
  17. Yu, S.; Jho, N.; Park, Y. Lightweight three-factor-based privacy-preserving authentication scheme for iot-enabled smart homes. IEEE Access 2021, 9, 126186–126197. [Google Scholar] [CrossRef]
  18. Zou, S.; Cao, Q.; Wang, C.; Huang, Z.; Xu, G. A robust two-factor user authentication scheme-based ECC for smart home in IoT. IEEE Syst. J. 2021, 16, 4938–4949. [Google Scholar] [CrossRef]
  19. Kaur, D.; Kumar, D. Cryptanalysis and improvement of a two-factor user authentication scheme for smart home. J. Inf. Secur. Appl. 2021, 58, 102787. [Google Scholar] [CrossRef]
  20. Ge, M.; Kumari, S.; Chen, C.M. AuthPFS: A Method to Verify Perfect Forward Secrecy in Authentication Protocols. J. Netw. Intell. 2022, 7, 734–750. [Google Scholar]
  21. Pirayesh, J.; Giaretta, A.; Conti, M.; Keshavarzi, P. A PLS-HECC-based device authentication and key agreement scheme for smart home networks. Comput. Netw. 2022, 216, 109077. [Google Scholar] [CrossRef]
  22. Guo, Y.; Zhang, Z.; Guo, Y. SecFHome: Secure remote authentication in fog-enabled smart home environment. Comput. Netw. 2022, 207, 108818. [Google Scholar] [CrossRef]
  23. Nyangaresi, V.O. Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography. J. Syst. Archit. 2022, 133, 102763. [Google Scholar] [CrossRef]
  24. Yakubu, B.M.; Khan, M.I.; Khan, A.; Jabeen, F.; Jeon, G. Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home. Digit. Commun. Netw. 2023; in press. [Google Scholar] [CrossRef]
  25. Sun, H.; Xiao, S. DNA-X: Dynamic network authentication using SGX. In Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, Guiyang, China, 16–19 March 2018; pp. 110–115. [Google Scholar] [CrossRef]
  26. Liu, X.; Guo, Z.; Ma, J.; Song, Y. A secure authentication scheme for wireless sensor networks based on DAC and Intel SGX. IEEE Internet Things J. 2021, 9, 3533–3547. [Google Scholar] [CrossRef]
  27. Jeong, J.; Chung, M.Y.; Choo, H. Integrated OTP-based user authentication scheme using smart cards in home networks. In Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), Waikoloa, HI, USA, 7–10 January 2008; p. 294. [Google Scholar] [CrossRef]
  28. Vaidya, B.; Park, J.H.; Yeo, S.S.; Rodrigues, J.J. Robust one-time password authentication scheme using smart card for home network environment. Comput. Commun. 2011, 34, 326–336. [Google Scholar] [CrossRef]
  29. Kim, H.J.; Kim, H.S. AUTH HOTP-HOTP based authentication scheme over home network environment. In Proceedings of the International Conference on Computational Science and Its Applications, Santander, Spain, 20–23 June 2011; Springer: Berlin/Heidelberg, Germany, 2011; Volume 6784, pp. 622–637. [Google Scholar]
  30. Li, Y. Design of a key establishment protocol for smart home energy management system. In Proceedings of the 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks, Madrid, Spain, 5–7 June 2013; pp. 88–93. [Google Scholar] [CrossRef]
  31. Han, K.; Kim, J.; Shon, T.; Ko, D. A novel secure key paring protocol for RF4CE ubiquitous smart home systems. Pers. Ubiquitous Comput. 2013, 17, 945–949. [Google Scholar] [CrossRef]
  32. Santoso, F.K.; Vun, N.C. Securing IoT for smart home system. In Proceedings of the 2015 International Symposium on Consumer Electronics (ISCE), Madrid, Spain, 24–26 June 2015; pp. 1–2. [Google Scholar] [CrossRef]
  33. Kumar, P.; Gurtov, A.; Iinatti, J.; Ylianttila, M.; Sain, M. Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sens. J. 2015, 16, 254–264. [Google Scholar] [CrossRef]
  34. Ashibani, Y.; Mahmoud, Q.H. An efficient and secure scheme for smart home communication using identity-based signcryption. In Proceedings of the 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC), San Diego, CA, USA, 10–12 December 2017; pp. 1–7. [Google Scholar] [CrossRef]
  35. Wazid, M.; Das, A.K.; Odelu, V.; Kumar, N.; Susilo, W. Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans. Dependable Secur. Comput. 2017, 17, 391–406. [Google Scholar] [CrossRef]
  36. Chifor, B.C.; Bica, I.; Patriciu, V.V.; Pop, F. A security authorization scheme for smart home Internet of Things devices. Future Gener. Comput. Syst. 2018, 86, 740–749. [Google Scholar] [CrossRef]
  37. Ghosh, N.; Chandra, S.; Sachidananda, V.; Elovici, Y. SoftAuthZ: A context-aware, behavior-based authorization framework for home IoT. IEEE Internet Things J. 2019, 6, 10773–10785. [Google Scholar] [CrossRef]
  38. Dey, S.; Hossain, A. Session-key establishment and authentication in a smart home network using public key cryptography. IEEE Sens. Lett. 2019, 3, 1–4. [Google Scholar] [CrossRef]
  39. Gaba, G.S.; Kumar, G.; Monga, H.; Kim, T.H.; Kumar, P. Robust and lightweight mutual authentication scheme in distributed smart environments. IEEE Access 2020, 8, 69722–69733. [Google Scholar] [CrossRef]
  40. Naoui, S.; Elhdhili, M.E.; Saidane, L.A. Lightweight and secure password based smart home authentication protocol: LSP-SHAP. J. Netw. Syst. Manag. 2019, 27, 1020–1042. [Google Scholar] [CrossRef]
  41. Poh, G.S.; Gope, P.; Ning, J. PrivHome: Privacy-preserving authenticated communication in smart home environment. IEEE Trans. Dependable Secur. Comput. 2019, 18, 1095–1107. [Google Scholar] [CrossRef]
  42. Irshad, A.; Usman, M.; Chaudhry, S.A.; Bashir, A.K.; Jolfaei, A.; Srivastava, G. Fuzzy-in-the-loop-driven low-cost and secure biometric user access to server. IEEE Trans. Reliab. 2020, 70, 1014–1025. [Google Scholar] [CrossRef]
  43. Banerjee, S.; Odelu, V.; Das, A.K.; Chattopadhyay, S.; Park, Y. An efficient, anonymous and robust authentication scheme for smart home environments. Sensors 2020, 20, 1215. [Google Scholar] [CrossRef] [PubMed]
  44. Fadi, A.T.; Deebak, B.D. Seamless authentication: For IoT-big data technologies in smart industrial application systems. IEEE Trans. Ind. Inform. 2020, 17, 2919–2927. [Google Scholar]
  45. Alzahrani, B.A.; Barnawi, A.; Albarakati, A.; Irshad, A.; Khan, M.A.; Chaudhry, S.A. SKIA-SH: A Symmetric Key-Based Improved Lightweight Authentication Scheme for Smart Homes. Wirel. Commun. Mob. Comput. 2022, 2022, 8669941. [Google Scholar] [CrossRef]
  46. Abdalla, M.; Fouque, P.A.; Pointcheval, D. Password-based authenticated key exchange in the three-party setting. In Proceedings of the International Workshop on Public Key Cryptography, Les Diablerets, Switzerland, 23–26 January 2005; Springer: Berlin/Heidelberg, Germany, 2005; Volume 3386, pp. 65–84. [Google Scholar]
  47. Wu, T.Y.; Meng, Q.; Yang, L.; Guo, X.; Kumari, S. A provably secure lightweight authentication protocol in mobile edge computing environments. J. Supercomput. 2022, 78, 13893–13914. [Google Scholar] [CrossRef]
  48. Xiang, A.; Zheng, J. A situation-aware scheme for efficient device authentication in smart grid-enabled home area networks. Electronics 2020, 9, 989. [Google Scholar] [CrossRef]
  49. De Caro, A.; Iovino, V. jPBC: Java pairing based cryptography. In Proceedings of the 2011 IEEE Symposium on Computers and Communications (ISCC), Kerkyra, Greece, 28 June–1 July 2011; pp. 850–855. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.