Skip to main content

Toward Enforcing Security in Smart Homes Using a Trust-Based Scheme

  • Conference paper
  • First Online:
Web, Artificial Intelligence and Network Applications (WAINA 2020)

Abstract

Thanks to the huge progress in miniaturization, communication technologies, and mobile computing, smart homes are becoming increasingly popular. In order to manage the related facilities and provide the expected services, dedicated systems are commonly using Radio Frequency Identification (RFID) devices. However, these devices are still prone to security breaches and consequently pose threats to privacy. Effective solutions are, therefore, urgently needed to address these deficiencies. Within this context, we are proposing in this paper a security authentication scheme based on trust evaluation to detect counterfeit tags and prevent attacks like jamming and cloning. Our scheme, called Trust-Based Authentication (TBA), is particularly using trusts derived from historical transactions between RFID readers and RFID tags as well as trusts obtained from other readers as recommendations. Our simulation results show promising results in terms of replica detection and failure rates.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Asadullah, M., Raza, A.: An overview of home automation systems. In: 2nd International Conference on Robotics and Artificial Intelligence (ICRAI), pp. 27–31 (2016). https://doi.org/10.1109/ICRAI.2016.7791223

  2. Xiao, F., Wang, Z., Ye, N., Wang, R., Li, X.-Y.: One more tag enables fine-grained RFID localization and tracking. IEEE/ACM Trans. Networking (TON) 26(1), 161–174 (2018)

    Article  Google Scholar 

  3. Mitrokotsa, A., Rieback, M.R., Tanenbaum, A.S.: Classifying RFID attacks and defenses. Inf. Syst. Front. 12(5), 491–505 (2010)

    Article  Google Scholar 

  4. Khattab, A., Jeddi, Z., Amini, E., Bayoumi, M.: RFID security threats and basic solutions. In: RFID Security, pp. 27–41. Springer, Cham (2017)

    Google Scholar 

  5. Gandino, F., Montrucchio, B., Rebaudengo, M.: A security protocol for RFID traceability. Int. J. Commun. Syst. 30(6), e3109 (2017)

    Article  Google Scholar 

  6. Fernandes, E., Rahmati, A., Jung, J., Prakash, A.: Security implications of permission models in smart-home application frameworks. IEEE Secur. Priv. 15(2), 24–30 (2017)

    Article  Google Scholar 

  7. Mbarek, B., Ge, M., Pitner, T.: Self-adaptive RFID authentication for Internet of Things. In: International Conference on Advanced Information Networking and Applications, pp. 1094–1105. Springer (2019)

    Google Scholar 

  8. Singh, S., Sharma, P.K., Park, J.H.: SH-SecNet: an enhanced secure network architecture for the diagnosis of security threats in a smart home. Sustainability 9(4), 513 (2017)

    Article  Google Scholar 

  9. Mbarek, B., Meddeb, A., Ben Jaballah, W., Mosbah, M.: A secure electric energy management in smart home. Int. J. Commun. Syst. 30(17) (2017)

    Google Scholar 

  10. Wazid, M., Das, A.K., Odelu, V., Kumar, N., Susilo, W.: Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans. Dependable Secure Comput. (2017). https://doi.org/10.1016/j.jpowsour.2016.09.157

  11. Pirbhulal, S., Zhang, H., Alahi, M.E., Ghayvat, H., Mukhopadhyay, S., Zhang, Y.-T., Wu, W.: A novel secure IoT-based smart home automation system using a wireless sensor network. Sensors 17(1), 69 (2017)

    Google Scholar 

  12. Fortin-Simard, D., Bilodeau, J.-S., Bouchard, K., Gaboury, S., Bouchard, B., Bouzouane, A.: Exploiting passive RFID technology for activity recognition in smart homes. IEEE Intell. Syst. 30(4), 7–15 (2015)

    Article  Google Scholar 

  13. Naija, Y., Beroulle, V., Machhout, M.: Security enhancements of a mutual authentication protocol used in a HF full-fledged RFID tag. J. Electron. Test. 34(3), 291–304 (2018)

    Article  Google Scholar 

  14. Rahman, F., Bhuiyan, M.Z.A., Ahamed, S.I.: A privacy preserving framework for RFID based healthcare systems. Future Gener. Comput. Syst. 72, 339–352 (2017)

    Article  Google Scholar 

  15. Dimitriou, T.: A secure and efficient RFID protocol that could make big brother (partially) obsolete. In: Pervasive Computing and Communications (2006)

    Google Scholar 

  16. Lee, C.H., Kim, K.-H.: Implementation of IoT system using block chain with authentication and data protection. In: International Conference on Information Networking (ICOIN), pp. 936–940. IEEE (2018)

    Google Scholar 

  17. Issariyakul, T., Hossain, E.: Introduction to network simulator 2 (NS2). In: Introduction to Network Simulator NS2, pp. 1–18 (2009). https://doi.org/10.1007/978-0-387-71760-9_2

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bacem Mbarek .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mbarek, B., Jabeur, N., Pitner, T. (2020). Toward Enforcing Security in Smart Homes Using a Trust-Based Scheme. In: Barolli, L., Amato, F., Moscato, F., Enokido, T., Takizawa, M. (eds) Web, Artificial Intelligence and Network Applications. WAINA 2020. Advances in Intelligent Systems and Computing, vol 1150. Springer, Cham. https://doi.org/10.1007/978-3-030-44038-1_14

Download citation

Publish with us

Policies and ethics