Abstract

Internet of things (IoT)-enabled smart home means all the home appliances are connected to the internet. All these devices are monitored and controlled using a mobile device, iPhone, or iPad regardless of location or time constraint. In an IoT-based smart home network, associated users and devices need to be recognised otherwise unauthorised access reduce the security and privacy of the smart environment. In this paper, contributions are first proposed as an elliptical curve cryptography-based authentication protocol for fog nodes and users in the IoT-based smart home environment. Secondly, the simulation for security analysis of the proposed authentication protocol using AVISPA tools has been done. Thirdly, BAN logic is used to verify that the devices in the smart home environment have achieved the security goals. Finally, a comparison with some existing works has been done and it has been seen that proposed protocol achieved better security goals in a smart home environment.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call