Abstract

With the information and communication technologies (ICT) and Internet of Things (IoT) gradually advancing, smart homes have been able to provide home services to users. The user can enjoy a high level of comfort and improve his quality of life by using home services provided by smart devices. However, the smart home has security and privacy problems, since the user and smart devices communicate through an insecure channel. Therefore, a secure authentication protocol should be established between the user and smart devices. In 2020, Xiang and Zheng presented a situation-aware protocol for device authentication in smart grid-enabled smart home environments. However, we demonstrate that their protocol can suffer from stolen smart device, impersonation, and session key disclosure attacks and fails to provide secure mutual authentication. Therefore, we propose a secure and lightweight authentication protocol for IoT-based smart homes to resolve the security flaws of Xiang and Zheng’s protocol. We proved the security of the proposed protocol by performing informal and formal security analyses, using the real or random (ROR) model, Burrows–Abadi–Needham (BAN) logic, and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Moreover, we provide a comparison of performance and security properties between the proposed protocol and related existing protocols. We demonstrate that the proposed protocol ensures better security and lower computational costs than related protocols, and is suitable for practical IoT-based smart home environments.

Highlights

  • A Secure and Lightweight Authentication Protocol forJiHyeon Oh 1 , SungJin Yu 1,2 , JoonYoung Lee 1 , SeungHwan Son 1 , MyeongHyun Kim 1 and YoungHo Park 1,3, *

  • With the development of information and communication technologies (ICT) and Internet of Things (IoT), smart home automation systems are receiving a lot of attention.The smart home is a networking environment that connects smart devices (e.g., IoT and sensors) to each other

  • We proved that Xiang and Zheng’s protocol does not perform secure mutual authentication

Read more

Summary

A Secure and Lightweight Authentication Protocol for

JiHyeon Oh 1 , SungJin Yu 1,2 , JoonYoung Lee 1 , SeungHwan Son 1 , MyeongHyun Kim 1 and YoungHo Park 1,3, *.

Introduction
Contributions
Adversary Model
Organization
Related Works
System Model
Review of Xiang and Zheng’s Protocol
Authentication and Key Agreement Phase
Low Security Risk
High Security Risk
Stolen Smart Device Attack
Session Key Disclosure Attack
Mutual Authentication
Proposed Protocol
Smart Device Registration Phase
Mobile User Registration Phase
Password Update Phase
Mobile User Impersonation Attack
Home Gateway Impersonation Attack
Smart Device Impersonation Attack
Replay and MITM Attack
Offline Guessing Attack
Privileged-Insider Attack
Known Session-Secret Temporary Information Attack
7.1.10. Desynchronization Attack
7.1.11. Perfect Forward Secrecy
7.1.13. Anonymity and Untraceability
BAN Logic
Idealized Forms
ROR Model
Security Proof
AVISPA Tool
Specifications of the Proposed Protocol
Result of AVISPA
Performance and Security Analyses
Computational Costs
Communication Costs
Security Properties
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call