Skip to main content
placeholder image

Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment

Journal Article


Abstract


  • The Information and Communication Technology (ICT) has been used in wide range of applications, such as smart living,

    smart health and smart transportation. Among all these applications, smart home is most popular, in which the users/residents can

    control the various smart sensor devices of home by using the ICT. However, the smart devices and users communicate over an

    insecure communication channel, i.e., the Internet. There might be the possibility of various types of attacks, such as smart device

    capture attack, user, gateway node and smart device impersonation attacks and privileged-insider attack on a smart home network. An

    illegal user, in this case, can gain access over data sent by the smart devices. Most of the existing schemes reported in the literature

    for the remote user authentication in smart home environment are not secure with respect to the above specified attacks. Thus, there is

    need to design a secure remote user authentication scheme for a smart home network so that only authorized users can have access

    to the smart devices. To mitigate the aforementioned isses, in this paper, we propose a new secure remote user authentication scheme

    for a smart home environment. The proposed scheme is efficient for resource-constrained smart devices with limited resources as it

    uses only one-way hash functions, bitwise XOR operations and symmetric encryptions/decryptions. The security of the scheme is

    proved using the rigorous formal security analysis under the widely-accepted Real-Or-Random (ROR) model. Moreover, the rigorous

    informal security analysis and formal security verification using the broadly-accepted Automated Validation of Internet Security

    Protocols and Applications (AVISPA) tool is also done. Finally, the practical demonstration of the proposed scheme is also performed

    using the widely-accepted NS-2 simulation.

Authors


  •   Wazid, Mohammad (external author)
  •   Das, Ashok Kumar (external author)
  •   Odelu, Vanga (external author)
  •   Kumar, Neeraj (external author)
  •   Susilo, Willy

Publication Date


  • 2020

Citation


  • Wazid, M., Das, A. Kumar., Odelu, V., Kumar, N. & Susilo, W. (2020). Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. IEEE Transactions on Dependable and Secure Computing, 17 (2), 391-406.

Scopus Eid


  • 2-s2.0-85032278998

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers1/1626

Number Of Pages


  • 15

Start Page


  • 391

End Page


  • 406

Volume


  • 17

Issue


  • 2

Place Of Publication


  • United States

Abstract


  • The Information and Communication Technology (ICT) has been used in wide range of applications, such as smart living,

    smart health and smart transportation. Among all these applications, smart home is most popular, in which the users/residents can

    control the various smart sensor devices of home by using the ICT. However, the smart devices and users communicate over an

    insecure communication channel, i.e., the Internet. There might be the possibility of various types of attacks, such as smart device

    capture attack, user, gateway node and smart device impersonation attacks and privileged-insider attack on a smart home network. An

    illegal user, in this case, can gain access over data sent by the smart devices. Most of the existing schemes reported in the literature

    for the remote user authentication in smart home environment are not secure with respect to the above specified attacks. Thus, there is

    need to design a secure remote user authentication scheme for a smart home network so that only authorized users can have access

    to the smart devices. To mitigate the aforementioned isses, in this paper, we propose a new secure remote user authentication scheme

    for a smart home environment. The proposed scheme is efficient for resource-constrained smart devices with limited resources as it

    uses only one-way hash functions, bitwise XOR operations and symmetric encryptions/decryptions. The security of the scheme is

    proved using the rigorous formal security analysis under the widely-accepted Real-Or-Random (ROR) model. Moreover, the rigorous

    informal security analysis and formal security verification using the broadly-accepted Automated Validation of Internet Security

    Protocols and Applications (AVISPA) tool is also done. Finally, the practical demonstration of the proposed scheme is also performed

    using the widely-accepted NS-2 simulation.

Authors


  •   Wazid, Mohammad (external author)
  •   Das, Ashok Kumar (external author)
  •   Odelu, Vanga (external author)
  •   Kumar, Neeraj (external author)
  •   Susilo, Willy

Publication Date


  • 2020

Citation


  • Wazid, M., Das, A. Kumar., Odelu, V., Kumar, N. & Susilo, W. (2020). Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. IEEE Transactions on Dependable and Secure Computing, 17 (2), 391-406.

Scopus Eid


  • 2-s2.0-85032278998

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers1/1626

Number Of Pages


  • 15

Start Page


  • 391

End Page


  • 406

Volume


  • 17

Issue


  • 2

Place Of Publication


  • United States