Abstract

With the increased number and reduced cost of smart devices, Internet of Things (IoT) applications such as smart home (SHome) are increasingly popular. Owing to the characteristics of IoT environments such as resource constrained devices, existing authentication solutions may not be suitable to secure these environments. As a result, a number of authentication solutions specifically designed for IoT environments have been proposed. This paper provides a critical analysis of existing authentication solutions. The major contributions of the paper are as follows. First, it presents a generic model derived from an SHome use-case scenario. Secondly, based on the model, it performs a threat analysis to identify possible means of attacks. The analysis leads to the specification of a set of desirable security requirements for the design of authentication solutions for SHome. Thirdly, based on the requirements, existing authentication solutions are analysed and some ideas for achieving effective and efficient authentication in IoT environments are proposed.

Highlights

  • S MART Home (SHome) is one of the Internet of Things (IoT) applications [1]

  • Despite the many benefits provided by the SHome, it is typically accompanied by a range of security issues [5]

  • Authentication is the first line of defence in an SHome environment as it is a prerequisite for other security services such as access control, logs and auditing and intrusion detection, etc

Read more

Summary

INTRODUCTION

S MART Home (SHome) is one of the Internet of Things (IoT) applications [1]. SHome applications have recently become more popular due to the increase in the number of affordable smart devices, e.g., Amazon Echo [2]. Owing to the characteristics of IoT, such as the diversity of devices, the existence of resources (data, services and other resources) with different sensitivity levels, and automatic machine to machine (M2M) communications or interactions, existing authentication solutions are not readily applicable [8]. USE-CASE SCENARIO It is anticipated that an SHome will typically house a fair number of IoT or smart devices [38]. These devices are smart, capable of performing some computing (such as sensing environment, processing data or controlling other devices) and communication tasks autonomously. Alice’s son can use the application installed on his smart phone to turn on the TV, the TV can send an alert message to Alice once her favourite show is about to start, the light sensor can send a request to the light control to turn off the lights once it is day time or when Alice’s family has all gone to work and school, and at night when it is time for everybody to go to sleep, a light sensor can send simultaneous requests to all the window shutters to close themselves, and so on

A GENERIC MODEL
ENTITIES AND ROLES
ACCESS DOMAINS
INTERACTIONS
THREAT ANALYSIS
SECURITY REQUIREMENTS
Access decision
VIII. CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.