Cargando…
Secure user authentication and key agreement scheme for IoT device access control based smart home communications
The upcoming paradigm in Internet of Things (IoT) based applications is to afford effective interactional communication strategies between the devices in the smart home system. With the rapid growth of IoT services, the incorporation of security measures becomes a vital concern. The general issue fa...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer US
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9734632/ http://dx.doi.org/10.1007/s11276-022-03197-1 |
_version_ | 1784846616325259264 |
---|---|
author | Uppuluri, Sirisha Lakshmeeswari, G. |
author_facet | Uppuluri, Sirisha Lakshmeeswari, G. |
author_sort | Uppuluri, Sirisha |
collection | PubMed |
description | The upcoming paradigm in Internet of Things (IoT) based applications is to afford effective interactional communication strategies between the devices in the smart home system. With the rapid growth of IoT services, the incorporation of security measures becomes a vital concern. The general issue faced in the security of the intercommunication between the devices and the users is improper authentication between them. Also, the access control of devices must be ensured with reliable features for establishing secure communication between the users and devices. Hence, we propose a protocol called Modified Honey Encryption using Inverse Sampling-Conditional Probability Model Transform (MHE-IS-CPMT) with Elliptic Curve Cryptography (ECC) to authenticate and perform the key agreement. Here, we employ the following steps: (1) Initialization, (2) Registration, (3) Login and data access Request, (4) Authentication and Session key agreement, and (5) Key update. At the commencement of the session, the users (u), Mobile Users (MU), and the other devices participating in the smart home system are initialized to the Home network head (H). Then, for the registration process, the user and the devices register them into H via the smart gateway (SG) by providing their own identities. The user details and the data about the devices are secured using the MHE-IS-CPMT with the ECC method. Next, during the login process, the registered users connect to the smart home system and send a request to SG to gain access to the devices. After verification, the user is authenticated and the system enables them to acquire the device access control by providing them with the private key of the device. In addition, the proposed system facilitates the secure key change procedure for the legitimate user to update their key whenever required. Hence, the performance of the model is secured against different types of attacks and also obtains more security features than existing methods. |
format | Online Article Text |
id | pubmed-9734632 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Springer US |
record_format | MEDLINE/PubMed |
spelling | pubmed-97346322022-12-12 Secure user authentication and key agreement scheme for IoT device access control based smart home communications Uppuluri, Sirisha Lakshmeeswari, G. Wireless Netw Original Paper The upcoming paradigm in Internet of Things (IoT) based applications is to afford effective interactional communication strategies between the devices in the smart home system. With the rapid growth of IoT services, the incorporation of security measures becomes a vital concern. The general issue faced in the security of the intercommunication between the devices and the users is improper authentication between them. Also, the access control of devices must be ensured with reliable features for establishing secure communication between the users and devices. Hence, we propose a protocol called Modified Honey Encryption using Inverse Sampling-Conditional Probability Model Transform (MHE-IS-CPMT) with Elliptic Curve Cryptography (ECC) to authenticate and perform the key agreement. Here, we employ the following steps: (1) Initialization, (2) Registration, (3) Login and data access Request, (4) Authentication and Session key agreement, and (5) Key update. At the commencement of the session, the users (u), Mobile Users (MU), and the other devices participating in the smart home system are initialized to the Home network head (H). Then, for the registration process, the user and the devices register them into H via the smart gateway (SG) by providing their own identities. The user details and the data about the devices are secured using the MHE-IS-CPMT with the ECC method. Next, during the login process, the registered users connect to the smart home system and send a request to SG to gain access to the devices. After verification, the user is authenticated and the system enables them to acquire the device access control by providing them with the private key of the device. In addition, the proposed system facilitates the secure key change procedure for the legitimate user to update their key whenever required. Hence, the performance of the model is secured against different types of attacks and also obtains more security features than existing methods. Springer US 2022-12-03 2023 /pmc/articles/PMC9734632/ http://dx.doi.org/10.1007/s11276-022-03197-1 Text en © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022, Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Original Paper Uppuluri, Sirisha Lakshmeeswari, G. Secure user authentication and key agreement scheme for IoT device access control based smart home communications |
title | Secure user authentication and key agreement scheme for IoT device access control based smart home communications |
title_full | Secure user authentication and key agreement scheme for IoT device access control based smart home communications |
title_fullStr | Secure user authentication and key agreement scheme for IoT device access control based smart home communications |
title_full_unstemmed | Secure user authentication and key agreement scheme for IoT device access control based smart home communications |
title_short | Secure user authentication and key agreement scheme for IoT device access control based smart home communications |
title_sort | secure user authentication and key agreement scheme for iot device access control based smart home communications |
topic | Original Paper |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9734632/ http://dx.doi.org/10.1007/s11276-022-03197-1 |
work_keys_str_mv | AT uppulurisirisha secureuserauthenticationandkeyagreementschemeforiotdeviceaccesscontrolbasedsmarthomecommunications AT lakshmeeswarig secureuserauthenticationandkeyagreementschemeforiotdeviceaccesscontrolbasedsmarthomecommunications |