Cargando…
Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks
In smart home environments, the interaction between a remote user and devices commonly occurs through a gateway, necessitating the need for robust user authentication. Despite numerous state-of-the-art user-authentication schemes proposed over the years, these schemes still suffer from security vuln...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10459229/ https://www.ncbi.nlm.nih.gov/pubmed/37631804 http://dx.doi.org/10.3390/s23167268 |
_version_ | 1785097360037117952 |
---|---|
author | Asghar, Iqra Khan, Muhammad Ayaz Ahmad, Tahir Ullah, Subhan Mansoor ul Hassan, Khwaja Buriro, Attaullah |
author_facet | Asghar, Iqra Khan, Muhammad Ayaz Ahmad, Tahir Ullah, Subhan Mansoor ul Hassan, Khwaja Buriro, Attaullah |
author_sort | Asghar, Iqra |
collection | PubMed |
description | In smart home environments, the interaction between a remote user and devices commonly occurs through a gateway, necessitating the need for robust user authentication. Despite numerous state-of-the-art user-authentication schemes proposed over the years, these schemes still suffer from security vulnerabilities exploited by the attackers. One severe physical attack is the node capture attack, which allows adversaries to compromise the security of the entire scheme. This research paper advances the state of the art by conducting a security analysis of user-authentication approaches regarding their vulnerability to node capture attacks resulting in revelations of several security weaknesses. To this end, we propose a secure user-authentication scheme to counter node capture attacks in smart home environments. To validate the effectiveness of our proposed scheme, we employ the BAN logic and ProVerif tool for verification. Lastly, we conduct performance analysis to validate the lightweight nature of our user-authentication scheme, making it suitable for IoT-based smart home environments. |
format | Online Article Text |
id | pubmed-10459229 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-104592292023-08-27 Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks Asghar, Iqra Khan, Muhammad Ayaz Ahmad, Tahir Ullah, Subhan Mansoor ul Hassan, Khwaja Buriro, Attaullah Sensors (Basel) Article In smart home environments, the interaction between a remote user and devices commonly occurs through a gateway, necessitating the need for robust user authentication. Despite numerous state-of-the-art user-authentication schemes proposed over the years, these schemes still suffer from security vulnerabilities exploited by the attackers. One severe physical attack is the node capture attack, which allows adversaries to compromise the security of the entire scheme. This research paper advances the state of the art by conducting a security analysis of user-authentication approaches regarding their vulnerability to node capture attacks resulting in revelations of several security weaknesses. To this end, we propose a secure user-authentication scheme to counter node capture attacks in smart home environments. To validate the effectiveness of our proposed scheme, we employ the BAN logic and ProVerif tool for verification. Lastly, we conduct performance analysis to validate the lightweight nature of our user-authentication scheme, making it suitable for IoT-based smart home environments. MDPI 2023-08-19 /pmc/articles/PMC10459229/ /pubmed/37631804 http://dx.doi.org/10.3390/s23167268 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Asghar, Iqra Khan, Muhammad Ayaz Ahmad, Tahir Ullah, Subhan Mansoor ul Hassan, Khwaja Buriro, Attaullah Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks |
title | Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks |
title_full | Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks |
title_fullStr | Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks |
title_full_unstemmed | Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks |
title_short | Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks |
title_sort | fortifying smart home security: a robust and efficient user-authentication scheme to counter node capture attacks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10459229/ https://www.ncbi.nlm.nih.gov/pubmed/37631804 http://dx.doi.org/10.3390/s23167268 |
work_keys_str_mv | AT asghariqra fortifyingsmarthomesecurityarobustandefficientuserauthenticationschemetocounternodecaptureattacks AT khanmuhammadayaz fortifyingsmarthomesecurityarobustandefficientuserauthenticationschemetocounternodecaptureattacks AT ahmadtahir fortifyingsmarthomesecurityarobustandefficientuserauthenticationschemetocounternodecaptureattacks AT ullahsubhan fortifyingsmarthomesecurityarobustandefficientuserauthenticationschemetocounternodecaptureattacks AT mansoorulhassankhwaja fortifyingsmarthomesecurityarobustandefficientuserauthenticationschemetocounternodecaptureattacks AT buriroattaullah fortifyingsmarthomesecurityarobustandefficientuserauthenticationschemetocounternodecaptureattacks |