Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm

The smart home is a crucial embodiment of the internet of things (IoT), which can facilitate users to access smart home services anytime and anywhere. Due to the limited resources of cloud computing, it cannot meet users’ real-time needs. Therefore, edge computing emerges as the times require, provi...

Descripción completa

Detalles Bibliográficos
Autores principales: Wu, Tsu-Yang, Kong, Fangfang, Wang, Liyang, Chen, Yeh-Cheng, Kumari, Saru, Pan, Jeng-Shyang
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9740584/
https://www.ncbi.nlm.nih.gov/pubmed/36501875
http://dx.doi.org/10.3390/s22239174
_version_ 1784848100165156864
author Wu, Tsu-Yang
Kong, Fangfang
Wang, Liyang
Chen, Yeh-Cheng
Kumari, Saru
Pan, Jeng-Shyang
author_facet Wu, Tsu-Yang
Kong, Fangfang
Wang, Liyang
Chen, Yeh-Cheng
Kumari, Saru
Pan, Jeng-Shyang
author_sort Wu, Tsu-Yang
collection PubMed
description The smart home is a crucial embodiment of the internet of things (IoT), which can facilitate users to access smart home services anytime and anywhere. Due to the limited resources of cloud computing, it cannot meet users’ real-time needs. Therefore, edge computing emerges as the times require, providing users with better real-time access and storage. The application of edge computing in the smart home environment can enable users to enjoy smart home services. However, users and smart devices communicate through public channels, and malicious attackers may intercept information transmitted through public channels, resulting in user privacy disclosure. Therefore, it is a critical issue to protect the secure communication between users and smart devices in the smart home environment. Furthermore, authentication protocols in smart home environments also have some security challenges. In this paper, we propose an anonymous authentication protocol that applies edge computing to the smart home environment to protect communication security between entities. To protect the security of smart devices, we embed physical unclonable functions (PUF) into each smart device. Real-or-random model, informal security analysis, and ProVerif are adopted to verify the security of our protocol. Finally, we compare our protocol with existing protocols regarding security and performance. The comparison results demonstrate that our protocol has higher security and slightly better performance.
format Online
Article
Text
id pubmed-9740584
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-97405842022-12-11 Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm Wu, Tsu-Yang Kong, Fangfang Wang, Liyang Chen, Yeh-Cheng Kumari, Saru Pan, Jeng-Shyang Sensors (Basel) Article The smart home is a crucial embodiment of the internet of things (IoT), which can facilitate users to access smart home services anytime and anywhere. Due to the limited resources of cloud computing, it cannot meet users’ real-time needs. Therefore, edge computing emerges as the times require, providing users with better real-time access and storage. The application of edge computing in the smart home environment can enable users to enjoy smart home services. However, users and smart devices communicate through public channels, and malicious attackers may intercept information transmitted through public channels, resulting in user privacy disclosure. Therefore, it is a critical issue to protect the secure communication between users and smart devices in the smart home environment. Furthermore, authentication protocols in smart home environments also have some security challenges. In this paper, we propose an anonymous authentication protocol that applies edge computing to the smart home environment to protect communication security between entities. To protect the security of smart devices, we embed physical unclonable functions (PUF) into each smart device. Real-or-random model, informal security analysis, and ProVerif are adopted to verify the security of our protocol. Finally, we compare our protocol with existing protocols regarding security and performance. The comparison results demonstrate that our protocol has higher security and slightly better performance. MDPI 2022-11-25 /pmc/articles/PMC9740584/ /pubmed/36501875 http://dx.doi.org/10.3390/s22239174 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Wu, Tsu-Yang
Kong, Fangfang
Wang, Liyang
Chen, Yeh-Cheng
Kumari, Saru
Pan, Jeng-Shyang
Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm
title Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm
title_full Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm
title_fullStr Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm
title_full_unstemmed Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm
title_short Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm
title_sort toward smart home authentication using puf and edge-computing paradigm
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9740584/
https://www.ncbi.nlm.nih.gov/pubmed/36501875
http://dx.doi.org/10.3390/s22239174
work_keys_str_mv AT wutsuyang towardsmarthomeauthenticationusingpufandedgecomputingparadigm
AT kongfangfang towardsmarthomeauthenticationusingpufandedgecomputingparadigm
AT wangliyang towardsmarthomeauthenticationusingpufandedgecomputingparadigm
AT chenyehcheng towardsmarthomeauthenticationusingpufandedgecomputingparadigm
AT kumarisaru towardsmarthomeauthenticationusingpufandedgecomputingparadigm
AT panjengshyang towardsmarthomeauthenticationusingpufandedgecomputingparadigm