Abstract
Internet of Things (IoT) is an emerging paradigm which enables physical objects to operate over the Internet, and collect and share the data that describe the real physical world. In this ubiquitous environment, due to the heterogeneity of objects, communication, topology, security protocols, and the computationally limited nature of IoT objects, conventional authentication schemes may not meet the IoT security requirements since they are considered impractical, weak, or outdated. In this paper, a two-factor inter device mutual authentication scheme for smart home is proposed, where in the first level, the key exchange is performed using the Diffie-Hellman protocol and a public key cryptography in order to validate the identity of devices; and the second level relies on the use of infrared communication to distribute the One-Time Passwords (OTPs) among devices for authentication purpose. The HLPSL language is used to model the proposed protocol, and a security analysis is conducted using the SPAN (Security Protocol Animator for AVISPA (SPAN)/AVISPA (Automated Validation of Internet Security Protocol and Applications) tool, showing that the proposed scheme can achieve the goals of secrecy of secret keys and mutual authentication. A proof-of-concept in the form of a hardware design is also proposed using Raspberry-Pi, Linux Infrared Remote Control (LIRC), Infrared circuit and a public-key-infrastructure. Experimentally, it is shown that this hardware design can achieve secure device-to-device authentication.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Dawy, Z., Saad, W., Ghosh, A., Andrews, J.G., Yaacoub, E.: Towards massive machine type cellular communications. IEEE Wirel. Commun. 24(1), 120–128 (2017)
Shivraj, V.L., Rajan, M.A., Singh, M., Balamuralidhar, P.: One time password authentication scheme based on elliptic curves for Internet of Things (IoT). In: Proceedings of IEEE 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW 2015), pp. 1–6, 17–19 February 2015
Madsen, P.: Authentication in the IoT challenges and opportunities. http://www.secureidnews.com/news-item/authentication-in-the-iot-challenges-and-opportunities. Accessed 9 Aug 2017
AVISPA Tool. http://www.avispa-project.org. Accessed 9 Aug 2017
Stobert, E., Biddle, R.: Authentication in the home. In: Workshop on Home Usable Privacy and Security (HUPS), Newcastle, UK, 24 July 2013. http://cups.cs.cmu.edu/soups/2013/HUPS/HUPS13-ElizabethStobert.pdf. Accessed 9 Aug 2017
PureLiFi. http://purelifi.com. Accessed 9 Aug 2017
Tian, Z., Wright, K., Zhou, X.: The DarkLight Rises: Visible Light Communication in the Dark. http://www.cs.dartmouth.edu/~xia/papers/mobicom16-darklight.pdf. Accessed 9 Aug 2017
Schneier, B.: Applied Cryptography Protocols Algorithms and Source Code in C, 2nd edn. Wiley, London (1996). ISBN 978-1-119-09672-6
Saxena, U., Sodhi, J.S., Singh, Y.: Analysis of security attacks in a smart home networks. In: Proceedings of 7th International Conference on Cloud Computing, Data Science and Engineering, Noida, India, 12–13 January 2017, pp. 431–436 (2017)
Kumar, P., Braeken, A., Gurtov, A., Iinatti, J., Ha, P.H.: Anonymous secure framework in connected smart home environments. IEEE Trans. Inf. Forensics Secur. 12(4), 968–979 (2017)
Wilson, P.: Inter-device authentication protocol for the internet of things. M.Sc. thesis, Department of Electrical and Computer Engineering, University of Victoria, B.C, Canada, July 2017
Yao, X., Han, X., Du, X., Zhou, X.: A lightweight multicast authentication mechanism for small scale IoT applications. IEEE Sens. J. 13(10), 3693–3701 (2013)
Benaloh, J., de Mare, M.: One-way accumulators: a decentralized alternative to digital signatures. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 274–285. Springer, Heidelberg (1994). doi:10.1007/3-540-48285-7_24
Hernandez-Ramos, J.L., Pawlowski, M.P., Jara, A.J., Skarmeta, A.F., Ladid, L.: Toward a lightweight authentication and authorization framework for smart objects. IEEE J. Sel. Areas Comm. 33(4), 690–702 (2015)
Hughes, P.: ARM and Sensor Platforms Deliver an Open Source Framework for Sensor Devices, ARM. https://www.arm.com/about/newsroom/arm-and-sensor-platforms-deliver-an-open-source-framework-for-sensor-devices.php. Accessed 9 Aug 2017
Sharaf-Dabbagh, Y., Saad, W.: On the authentication of devices in the Internet of Things. In: Proceedings of the 17th IEEE International Symposium on World Wireless, Mobile Multimedia Networks, Coimbra, Portugal, pp. 1–3, June 2016
Shin, S., Yeh, H., Kim, K.: An effective device and data origin authentication scheme in home networks. In: Proceedings of 9th International Conference and Expo on Emerging Technologies for a Smarter World (CEWIT), November 5–6, Incheon, South Korea, pp. 1–5, September 2012
Kumar, P., Gurtov, A., Iinatti, J., Ylianttila, M., Sain, M.: Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sens. J. 16(1), 254–264 (2016)
Santoso, F.K., Vun, N.C.H.: Securing IoT for smart home system. In: Proceedings of International Symposium on Consumer Electronics (ISCE), Madrid, Spain, pp. 1–2, 24–26 June 2015
Open Source Universal Remote. https://upverter.com/alexbain/f24516375cfae8b9/Open-Source-Universal-Remote/#/. Accessed 9 Aug 2017
Linux Infrared Remote Control. http://www.lirc.org. Accessed 9 Aug 2017
Raspbian Operating System. https://www.raspberrypi.org/downloads/raspbian. Accessed 9 Aug 2017
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Raniyal, M.S., Woungang, I., Dhurandher, S.K. (2017). An Inter-device Authentication Scheme for Smart Homes Using One-Time-Password Over Infrared Channel. In: Traore, I., Woungang, I., Awad, A. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2017. Lecture Notes in Computer Science(), vol 10618. Springer, Cham. https://doi.org/10.1007/978-3-319-69155-8_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-69155-8_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69154-1
Online ISBN: 978-3-319-69155-8
eBook Packages: Computer ScienceComputer Science (R0)