Abstract
Thanks to the huge progress in miniaturization, communication technologies, and mobile computing, smart homes are becoming increasingly popular. In order to manage the related facilities and provide the expected services, dedicated systems are commonly using Radio Frequency Identification (RFID) devices. However, these devices are still prone to security breaches and consequently pose threats to privacy. Effective solutions are, therefore, urgently needed to address these deficiencies. Within this context, we are proposing in this paper a security authentication scheme based on trust evaluation to detect counterfeit tags and prevent attacks like jamming and cloning. Our scheme, called Trust-Based Authentication (TBA), is particularly using trusts derived from historical transactions between RFID readers and RFID tags as well as trusts obtained from other readers as recommendations. Our simulation results show promising results in terms of replica detection and failure rates.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Asadullah, M., Raza, A.: An overview of home automation systems. In: 2nd International Conference on Robotics and Artificial Intelligence (ICRAI), pp. 27–31 (2016). https://doi.org/10.1109/ICRAI.2016.7791223
Xiao, F., Wang, Z., Ye, N., Wang, R., Li, X.-Y.: One more tag enables fine-grained RFID localization and tracking. IEEE/ACM Trans. Networking (TON) 26(1), 161–174 (2018)
Mitrokotsa, A., Rieback, M.R., Tanenbaum, A.S.: Classifying RFID attacks and defenses. Inf. Syst. Front. 12(5), 491–505 (2010)
Khattab, A., Jeddi, Z., Amini, E., Bayoumi, M.: RFID security threats and basic solutions. In: RFID Security, pp. 27–41. Springer, Cham (2017)
Gandino, F., Montrucchio, B., Rebaudengo, M.: A security protocol for RFID traceability. Int. J. Commun. Syst. 30(6), e3109 (2017)
Fernandes, E., Rahmati, A., Jung, J., Prakash, A.: Security implications of permission models in smart-home application frameworks. IEEE Secur. Priv. 15(2), 24–30 (2017)
Mbarek, B., Ge, M., Pitner, T.: Self-adaptive RFID authentication for Internet of Things. In: International Conference on Advanced Information Networking and Applications, pp. 1094–1105. Springer (2019)
Singh, S., Sharma, P.K., Park, J.H.: SH-SecNet: an enhanced secure network architecture for the diagnosis of security threats in a smart home. Sustainability 9(4), 513 (2017)
Mbarek, B., Meddeb, A., Ben Jaballah, W., Mosbah, M.: A secure electric energy management in smart home. Int. J. Commun. Syst. 30(17) (2017)
Wazid, M., Das, A.K., Odelu, V., Kumar, N., Susilo, W.: Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans. Dependable Secure Comput. (2017). https://doi.org/10.1016/j.jpowsour.2016.09.157
Pirbhulal, S., Zhang, H., Alahi, M.E., Ghayvat, H., Mukhopadhyay, S., Zhang, Y.-T., Wu, W.: A novel secure IoT-based smart home automation system using a wireless sensor network. Sensors 17(1), 69 (2017)
Fortin-Simard, D., Bilodeau, J.-S., Bouchard, K., Gaboury, S., Bouchard, B., Bouzouane, A.: Exploiting passive RFID technology for activity recognition in smart homes. IEEE Intell. Syst. 30(4), 7–15 (2015)
Naija, Y., Beroulle, V., Machhout, M.: Security enhancements of a mutual authentication protocol used in a HF full-fledged RFID tag. J. Electron. Test. 34(3), 291–304 (2018)
Rahman, F., Bhuiyan, M.Z.A., Ahamed, S.I.: A privacy preserving framework for RFID based healthcare systems. Future Gener. Comput. Syst. 72, 339–352 (2017)
Dimitriou, T.: A secure and efficient RFID protocol that could make big brother (partially) obsolete. In: Pervasive Computing and Communications (2006)
Lee, C.H., Kim, K.-H.: Implementation of IoT system using block chain with authentication and data protection. In: International Conference on Information Networking (ICOIN), pp. 936–940. IEEE (2018)
Issariyakul, T., Hossain, E.: Introduction to network simulator 2 (NS2). In: Introduction to Network Simulator NS2, pp. 1–18 (2009). https://doi.org/10.1007/978-0-387-71760-9_2
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Mbarek, B., Jabeur, N., Pitner, T. (2020). Toward Enforcing Security in Smart Homes Using a Trust-Based Scheme. In: Barolli, L., Amato, F., Moscato, F., Enokido, T., Takizawa, M. (eds) Web, Artificial Intelligence and Network Applications. WAINA 2020. Advances in Intelligent Systems and Computing, vol 1150. Springer, Cham. https://doi.org/10.1007/978-3-030-44038-1_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-44038-1_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-44037-4
Online ISBN: 978-3-030-44038-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)