Improving the Authentication in Smart Home Using One-Time Password and Elliptic-Curve Cryptography

Document Type : Original Article

Authors

Department of Computer, Buinzahra branch, Islamic Azad University, Buinzahra, Iran

Abstract

In smart home, most things interact with each other and with people at home. One of the benefits of smart home is the ability to control and monitor home, remotely. At the same time, smart home is potentially exposed to security problems and violates privacy of individuals. Considering that objects inside the smart home are constantly collecting private information about people's activities, if someone accesses unauthorized objects indoors, he takes control of objects and gives them data Private individuals have access to or damaged objects or disclosure of information. To prevent this, people who intend to use home-made objects must be authenticated before using it. In this paper, we propose a method for improving individual authentication based on a one-use password using smart card and elliptic curve cryptography algorithm in the smart home system. The results of the evaluations indicate improved interoperability between the user and the gateway to counteract the attacking attack compared to existing methods.

Keywords

Main Subjects


[1]   Bugeja, J.; Jacobsson, A.; Davidsson, P. "On Privacy and Security Challenges in Smart Connected Homes";EuropeanIntelligenceand Security Informatics Conference (EISIC), 2016, 172-175.##
[2]   Robles, R. J.; Kim, T.h.; Cook, D.; Das, S. "A Review on Security in Smart Home Development"; IJAST. 2010, 15, 14-29.##
[3]   Saleh, E. ; Abou, A. "An IDS for Detection of Active Attacks Against Rouring in Mobile Ad-Hoc Networks"; Journal of advanced defence science and technology. 2010, 1, 15-22.##
[4]   Ashibani, Y.; Kauling, D.; Mahmoud, Q. H. "A Context-Aware Authentication Framework for Smart Homes"; IEEE 30th Canadian Conf. Electrical and Computer Eng. (CCECE). 2017, 1-5.##
[5]   Frank, M.; Biedert, R.; Ma, E.; Martinovic, I.; Song, D. "Touchalytics: On the Applicability of Touchscreen Input As A Behavioral Biometric for Continuous Authentication"; IEEE Trans. Inf. Forensics Security. 2012, 8, 136-148.##
[6]   Song, T.; Li, R.; Mei, B.; Yu, J.; Xing, X.; Cheng, X. "A Privacy Preserving Communication Protocol for Iot Applications in Smart Homes"; IEEE Internet Things J 2017, 4, 1844-1852.##
[7]   Vandana, C.; Imam, T.; Dubey, S. "Security Issues in Home Automation";  IJSRCSEIT. 2017.##
[8]   Jeong, J.; Chung, M. Y.; Choo, H. "Integrated OTP-based User Authentication Scheme Using Smart Cards in Home Networks"; Proc. 41st Annual Hawaii Int. Conf. System Sciences (HICSS). 2008, 294-294.##
[9]   Vaidya, B.; Park, J. H.; Yeo, S.S.; Rodrigues, J. J. "Robust one-time Password Authentication Scheme Using Smart Card for Home Network Environment";  Comput Commu.n 2011, 34, 326-336.##
[10] Santoso, F. K. ; Vun, N. C. "Securing IoT for smart home system"; Int. Symposium on Consumer Electronics (ISCE). 2015, 1-2.##
[11] Chang, C.-C. ; Le, H.D. "A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad Hoc Wireless Sensor Networks"; IEEE T Wirel Commun. 2015, 15, 357-366.##
[12] Das, A. K.; Kumari, S.; Odelu, V.; Li, X.; Wu, F.; Huang, X. "Provably secure User Authentication and Key Agreement Scheme for Wireless Sensor Networks"; Secur Commun Netw. 2016, 9, 3670-3687.##
[13] Wazid, M.; Das, A. K.; Odelu, V.; Kumar, N.; Susilo, W. "Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment"; IEEE Trans. Depend. Sec. Comput. 2017.##
[14] Kumar, P.; Gurtov, A.; Iinatti, J.; Ylianttila, M.; Sain, M. "Lightweight and secure Session-Key Establishment Scheme in Smart Home Environments"; IEEE Sensors J. 2015, 16, 254-264.##
[15] Li, Y. "Design of a Key Establishment Protocol for Smart Home Energy Management System"; Fifth Int. Conf. Comput. Intell. Commun. Syst. Netw. 2013, 88-93.##
[16] Sierra, JM.; Hernández ,JC.; Alcaide, A.; Torres, J. "Validating the Use of BAN LOGIC"; Int. Conf. Comput. Sci. Appl. 2004,5, 851-858.##
[17] Masoumi, M.; Mahdizadeh, H. “The FPGA Implementation of an Efficient Elliplic Curve Cryptographic Process over GF(2163)”; Advanced Defence Sci.& Tech., 2012, 3, 199-211.##
 [18] Naoui, S.; Elhdhili, M.E.; Saidane, L.A.; “Lightweight and Secure Password Based Smart Home Authentication Protocol: LSP-SHAP”; J NETW SYST MANAG. 2019,  4, 1020-1042.##
[19] Shuai, M.; Yu, N.; Wang, H.; Xiong, L.; “Anonymous Authentication Scheme for Smart Home Environment Provable Security”; COMPUT SECUR. 2019, 132-146.##
[20] Gurabi, M.A.; Alfandi, O.; Bochem, A.; Hogrefe, D.; “Hardware based Two-Factor User Authentication for the Internet of Things”; IWCMC.2018, 4, 1081-1086.##