Cargando…

Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks

In smart home environments, the interaction between a remote user and devices commonly occurs through a gateway, necessitating the need for robust user authentication. Despite numerous state-of-the-art user-authentication schemes proposed over the years, these schemes still suffer from security vuln...

Descripción completa

Detalles Bibliográficos
Autores principales: Asghar, Iqra, Khan, Muhammad Ayaz, Ahmad, Tahir, Ullah, Subhan, Mansoor ul Hassan, Khwaja, Buriro, Attaullah
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10459229/
https://www.ncbi.nlm.nih.gov/pubmed/37631804
http://dx.doi.org/10.3390/s23167268
_version_ 1785097360037117952
author Asghar, Iqra
Khan, Muhammad Ayaz
Ahmad, Tahir
Ullah, Subhan
Mansoor ul Hassan, Khwaja
Buriro, Attaullah
author_facet Asghar, Iqra
Khan, Muhammad Ayaz
Ahmad, Tahir
Ullah, Subhan
Mansoor ul Hassan, Khwaja
Buriro, Attaullah
author_sort Asghar, Iqra
collection PubMed
description In smart home environments, the interaction between a remote user and devices commonly occurs through a gateway, necessitating the need for robust user authentication. Despite numerous state-of-the-art user-authentication schemes proposed over the years, these schemes still suffer from security vulnerabilities exploited by the attackers. One severe physical attack is the node capture attack, which allows adversaries to compromise the security of the entire scheme. This research paper advances the state of the art by conducting a security analysis of user-authentication approaches regarding their vulnerability to node capture attacks resulting in revelations of several security weaknesses. To this end, we propose a secure user-authentication scheme to counter node capture attacks in smart home environments. To validate the effectiveness of our proposed scheme, we employ the BAN logic and ProVerif tool for verification. Lastly, we conduct performance analysis to validate the lightweight nature of our user-authentication scheme, making it suitable for IoT-based smart home environments.
format Online
Article
Text
id pubmed-10459229
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-104592292023-08-27 Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks Asghar, Iqra Khan, Muhammad Ayaz Ahmad, Tahir Ullah, Subhan Mansoor ul Hassan, Khwaja Buriro, Attaullah Sensors (Basel) Article In smart home environments, the interaction between a remote user and devices commonly occurs through a gateway, necessitating the need for robust user authentication. Despite numerous state-of-the-art user-authentication schemes proposed over the years, these schemes still suffer from security vulnerabilities exploited by the attackers. One severe physical attack is the node capture attack, which allows adversaries to compromise the security of the entire scheme. This research paper advances the state of the art by conducting a security analysis of user-authentication approaches regarding their vulnerability to node capture attacks resulting in revelations of several security weaknesses. To this end, we propose a secure user-authentication scheme to counter node capture attacks in smart home environments. To validate the effectiveness of our proposed scheme, we employ the BAN logic and ProVerif tool for verification. Lastly, we conduct performance analysis to validate the lightweight nature of our user-authentication scheme, making it suitable for IoT-based smart home environments. MDPI 2023-08-19 /pmc/articles/PMC10459229/ /pubmed/37631804 http://dx.doi.org/10.3390/s23167268 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Asghar, Iqra
Khan, Muhammad Ayaz
Ahmad, Tahir
Ullah, Subhan
Mansoor ul Hassan, Khwaja
Buriro, Attaullah
Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks
title Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks
title_full Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks
title_fullStr Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks
title_full_unstemmed Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks
title_short Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks
title_sort fortifying smart home security: a robust and efficient user-authentication scheme to counter node capture attacks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10459229/
https://www.ncbi.nlm.nih.gov/pubmed/37631804
http://dx.doi.org/10.3390/s23167268
work_keys_str_mv AT asghariqra fortifyingsmarthomesecurityarobustandefficientuserauthenticationschemetocounternodecaptureattacks
AT khanmuhammadayaz fortifyingsmarthomesecurityarobustandefficientuserauthenticationschemetocounternodecaptureattacks
AT ahmadtahir fortifyingsmarthomesecurityarobustandefficientuserauthenticationschemetocounternodecaptureattacks
AT ullahsubhan fortifyingsmarthomesecurityarobustandefficientuserauthenticationschemetocounternodecaptureattacks
AT mansoorulhassankhwaja fortifyingsmarthomesecurityarobustandefficientuserauthenticationschemetocounternodecaptureattacks
AT buriroattaullah fortifyingsmarthomesecurityarobustandefficientuserauthenticationschemetocounternodecaptureattacks