Skip to main content

D2D Authentication Scheme for IoT-enabled Smart Home

  • Conference paper
  • First Online:
Security and Privacy in Social Networks and Big Data (SocialSec 2022)

Abstract

The rapid development of Internet of things (IoT) technology has created a good technical foundation for the establishment of the smart home. However, while a smart home brings convenience to people, it also has many hidden security issues. Smart home is related to the life and property safety of users in this environment. A large number of researchers have made research on the security issues in IoT-enabled smart home systems. With the in-depth development of intelligence, the independent authentication between devices is one of the trends of smart homes in the future. Therefore, device-to-device (D2D) authentication is particularly important for smart home systems. In this paper, a D2D authentication scheme is proposed. The proposed scheme can ensure that two intelligent devices can authenticate each other with the assistance of a home gateway. The security and performance analysis shows that the proposal is secure and efficient for the application in the smart home environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Amraoui, N., Zouari, B.: Securing the operation of smart home systems: a literature review. J. Reliab. Intell. Environ. 8(1), 67ā€“74 (2022). https://doi.org/10.1007/s40860-021-00160-3

    Article  Google Scholar 

  2. Goyal, G., Liu, P., Sural, S.: Securing smart home iot systems with attribute-based access control. In: Gupta, M., Khorsandroo, S., Abdelsalam, M. (eds.) Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, Baltimore, MD, USA, 27 April 2022, pp. 37ā€“46. ACM (2022). https://doi.org/10.1145/3510547.3517920

  3. Guo, Y., Zhang, Z., Guo, Y.: Secfhome: secure remote authentication in fog-enabled smart home environment. Comput. Netw. 207, 108818 (2022). https://doi.org/10.1016/j.comnet.2022.108818

    Article  Google Scholar 

  4. Huang, Z., Zhang, L., Meng, X., Choo, K.R.: Key-free authentication protocol against subverted indoor smart devices for smart home. IEEE Internet Things J. 7(2), 1039ā€“1047 (2020). https://doi.org/10.1109/JIOT.2019.2948622

    Article  Google Scholar 

  5. Huszti, A., KovĆ”cs, S., OlĆ”h, N.: Scalable, password-based and threshold authentication for smart homes. Int. J. Inf. Sec. 21(4), 707ā€“723 (2022). https://doi.org/10.1007/s10207-022-00578-7

    Article  Google Scholar 

  6. Iqbal, W., et al.: ALAM: anonymous lightweight authentication mechanism for SDN-enabled smart homes. IEEE Internet Things J. 8(12), 9622ā€“9633 (2021). https://doi.org/10.1109/JIOT.2020.3024058

    Article  Google Scholar 

  7. Ji, S., Huang, R., Shen, J., Jin, X., Cho, Y.: A certificateless signcryption scheme for smart home networks. Concurr. Comput. Pract. Exp. 33(7), 1 (2021). https://doi.org/10.1002/cpe.5081

    Article  Google Scholar 

  8. Komninos, N., Philippou, E., Pitsillides, A.: Survey in smart grid and smart home security: issues, challenges and countermeasures. IEEE Commun. Surv. Tutorials 16(4), 1933ā€“1954 (2014). https://doi.org/10.1109/COMST.2014.2320093

    Article  Google Scholar 

  9. Lin, C., He, D., Kumar, N., Huang, X., Vijayakumar, P., Choo, K.R.: Homechain: a blockchain-based secure mutual authentication system for smart homes. IEEE Internet Things J. 7(2), 818ā€“829 (2020). https://doi.org/10.1109/JIOT.2019.2944400

    Article  Google Scholar 

  10. Luo, H., Wang, C., Luo, H., Zhang, F., Lin, F., Xu, G.: G2F: a secure user authentication for rapid smart home IoT management. IEEE Internet Things J. 8(13), 10884ā€“10895 (2021). https://doi.org/10.1109/JIOT.2021.3050710

    Article  Google Scholar 

  11. Rizou, S., Egyptiadou, E.A., Ishibashi, Y., Psannis, K.E.: Preserving minorsā€™ data protection in IoT-based smart homes according to GDPR considering cross-border issues. J. Commun. 17(3), 180ā€“187 (2022). https://doi.org/10.12720/jcm.17.3.180-187

  12. Samuel, S.S.I.: A review of connectivity challenges in IoT-smart home. In: 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), pp. 1ā€“4 (2016). https://doi.org/10.1109/ICBDSC.2016.7460395

  13. Shen, J., Wang, C., Li, T., Chen, X., Huang, X., Zhan, Z.: Secure data uploading scheme for a smart home system. Inf. Sci. 453, 186ā€“197 (2018). https://doi.org/10.1016/j.ins.2018.04.048

    Article  Google Scholar 

  14. Xiao, Y., Jia, Y., Liu, C., Alrawais, A., Rekik, M., Shan, Z.: Homeshield: a credential-less authentication framework for smart home systems. IEEE Internet Things J. 7(9), 7903ā€“7918 (2020). https://doi.org/10.1109/JIOT.2020.3003621

    Article  Google Scholar 

  15. Yan, W., Wang, Z., Wang, H., Wang, W., Li, J., Gui, X.: Survey on recent smart gateways for smart home: systems, technologies, and challenges. Trans. Emerg. Telecommun. Technol. 33(6), e4067 (2022). https://doi.org/10.1002/ett.4067

    Article  Google Scholar 

  16. Yang, L., Liu, X., Gong, W.: Secure smart home systems: a blockchain perspective. In: 39th IEEE Conference on Computer Communications, INFOCOM Workshops 2020, Toronto, ON, Canada, July 6ā€“9, 2020, pp. 1003ā€“1008. IEEE (2020). https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162648

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China under Grants No. 61922045, No. 61877034, No. U1836115, No. 61672290, the Natural Science Foundation of Jiangsu Province under Grant No. BK20181408, the Peng Cheng Laboratory Project of Guangdong Province PCL2018KP004, the CICAEET fund, and the PAPD fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haowen Tan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ma, Q., Zhou, T., Tan, H. (2022). D2D Authentication Scheme for IoT-enabled Smart Home. In: Chen, X., Huang, X., Kutyłowski, M. (eds) Security and Privacy in Social Networks and Big Data. SocialSec 2022. Communications in Computer and Information Science, vol 1663. Springer, Singapore. https://doi.org/10.1007/978-981-19-7242-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-7242-3_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-7241-6

  • Online ISBN: 978-981-19-7242-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics