Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm
The smart home is a crucial embodiment of the internet of things (IoT), which can facilitate users to access smart home services anytime and anywhere. Due to the limited resources of cloud computing, it cannot meet users’ real-time needs. Therefore, edge computing emerges as the times require, provi...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9740584/ https://www.ncbi.nlm.nih.gov/pubmed/36501875 http://dx.doi.org/10.3390/s22239174 |
_version_ | 1784848100165156864 |
---|---|
author | Wu, Tsu-Yang Kong, Fangfang Wang, Liyang Chen, Yeh-Cheng Kumari, Saru Pan, Jeng-Shyang |
author_facet | Wu, Tsu-Yang Kong, Fangfang Wang, Liyang Chen, Yeh-Cheng Kumari, Saru Pan, Jeng-Shyang |
author_sort | Wu, Tsu-Yang |
collection | PubMed |
description | The smart home is a crucial embodiment of the internet of things (IoT), which can facilitate users to access smart home services anytime and anywhere. Due to the limited resources of cloud computing, it cannot meet users’ real-time needs. Therefore, edge computing emerges as the times require, providing users with better real-time access and storage. The application of edge computing in the smart home environment can enable users to enjoy smart home services. However, users and smart devices communicate through public channels, and malicious attackers may intercept information transmitted through public channels, resulting in user privacy disclosure. Therefore, it is a critical issue to protect the secure communication between users and smart devices in the smart home environment. Furthermore, authentication protocols in smart home environments also have some security challenges. In this paper, we propose an anonymous authentication protocol that applies edge computing to the smart home environment to protect communication security between entities. To protect the security of smart devices, we embed physical unclonable functions (PUF) into each smart device. Real-or-random model, informal security analysis, and ProVerif are adopted to verify the security of our protocol. Finally, we compare our protocol with existing protocols regarding security and performance. The comparison results demonstrate that our protocol has higher security and slightly better performance. |
format | Online Article Text |
id | pubmed-9740584 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-97405842022-12-11 Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm Wu, Tsu-Yang Kong, Fangfang Wang, Liyang Chen, Yeh-Cheng Kumari, Saru Pan, Jeng-Shyang Sensors (Basel) Article The smart home is a crucial embodiment of the internet of things (IoT), which can facilitate users to access smart home services anytime and anywhere. Due to the limited resources of cloud computing, it cannot meet users’ real-time needs. Therefore, edge computing emerges as the times require, providing users with better real-time access and storage. The application of edge computing in the smart home environment can enable users to enjoy smart home services. However, users and smart devices communicate through public channels, and malicious attackers may intercept information transmitted through public channels, resulting in user privacy disclosure. Therefore, it is a critical issue to protect the secure communication between users and smart devices in the smart home environment. Furthermore, authentication protocols in smart home environments also have some security challenges. In this paper, we propose an anonymous authentication protocol that applies edge computing to the smart home environment to protect communication security between entities. To protect the security of smart devices, we embed physical unclonable functions (PUF) into each smart device. Real-or-random model, informal security analysis, and ProVerif are adopted to verify the security of our protocol. Finally, we compare our protocol with existing protocols regarding security and performance. The comparison results demonstrate that our protocol has higher security and slightly better performance. MDPI 2022-11-25 /pmc/articles/PMC9740584/ /pubmed/36501875 http://dx.doi.org/10.3390/s22239174 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Wu, Tsu-Yang Kong, Fangfang Wang, Liyang Chen, Yeh-Cheng Kumari, Saru Pan, Jeng-Shyang Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm |
title | Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm |
title_full | Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm |
title_fullStr | Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm |
title_full_unstemmed | Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm |
title_short | Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm |
title_sort | toward smart home authentication using puf and edge-computing paradigm |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9740584/ https://www.ncbi.nlm.nih.gov/pubmed/36501875 http://dx.doi.org/10.3390/s22239174 |
work_keys_str_mv | AT wutsuyang towardsmarthomeauthenticationusingpufandedgecomputingparadigm AT kongfangfang towardsmarthomeauthenticationusingpufandedgecomputingparadigm AT wangliyang towardsmarthomeauthenticationusingpufandedgecomputingparadigm AT chenyehcheng towardsmarthomeauthenticationusingpufandedgecomputingparadigm AT kumarisaru towardsmarthomeauthenticationusingpufandedgecomputingparadigm AT panjengshyang towardsmarthomeauthenticationusingpufandedgecomputingparadigm |