Abstract
The rapid development of Internet of things (IoT) technology has created a good technical foundation for the establishment of the smart home. However, while a smart home brings convenience to people, it also has many hidden security issues. Smart home is related to the life and property safety of users in this environment. A large number of researchers have made research on the security issues in IoT-enabled smart home systems. With the in-depth development of intelligence, the independent authentication between devices is one of the trends of smart homes in the future. Therefore, device-to-device (D2D) authentication is particularly important for smart home systems. In this paper, a D2D authentication scheme is proposed. The proposed scheme can ensure that two intelligent devices can authenticate each other with the assistance of a home gateway. The security and performance analysis shows that the proposal is secure and efficient for the application in the smart home environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Amraoui, N., Zouari, B.: Securing the operation of smart home systems: a literature review. J. Reliab. Intell. Environ. 8(1), 67ā74 (2022). https://doi.org/10.1007/s40860-021-00160-3
Goyal, G., Liu, P., Sural, S.: Securing smart home iot systems with attribute-based access control. In: Gupta, M., Khorsandroo, S., Abdelsalam, M. (eds.) Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, Baltimore, MD, USA, 27 April 2022, pp. 37ā46. ACM (2022). https://doi.org/10.1145/3510547.3517920
Guo, Y., Zhang, Z., Guo, Y.: Secfhome: secure remote authentication in fog-enabled smart home environment. Comput. Netw. 207, 108818 (2022). https://doi.org/10.1016/j.comnet.2022.108818
Huang, Z., Zhang, L., Meng, X., Choo, K.R.: Key-free authentication protocol against subverted indoor smart devices for smart home. IEEE Internet Things J. 7(2), 1039ā1047 (2020). https://doi.org/10.1109/JIOT.2019.2948622
Huszti, A., KovĆ”cs, S., OlĆ”h, N.: Scalable, password-based and threshold authentication for smart homes. Int. J. Inf. Sec. 21(4), 707ā723 (2022). https://doi.org/10.1007/s10207-022-00578-7
Iqbal, W., et al.: ALAM: anonymous lightweight authentication mechanism for SDN-enabled smart homes. IEEE Internet Things J. 8(12), 9622ā9633 (2021). https://doi.org/10.1109/JIOT.2020.3024058
Ji, S., Huang, R., Shen, J., Jin, X., Cho, Y.: A certificateless signcryption scheme for smart home networks. Concurr. Comput. Pract. Exp. 33(7), 1 (2021). https://doi.org/10.1002/cpe.5081
Komninos, N., Philippou, E., Pitsillides, A.: Survey in smart grid and smart home security: issues, challenges and countermeasures. IEEE Commun. Surv. Tutorials 16(4), 1933ā1954 (2014). https://doi.org/10.1109/COMST.2014.2320093
Lin, C., He, D., Kumar, N., Huang, X., Vijayakumar, P., Choo, K.R.: Homechain: a blockchain-based secure mutual authentication system for smart homes. IEEE Internet Things J. 7(2), 818ā829 (2020). https://doi.org/10.1109/JIOT.2019.2944400
Luo, H., Wang, C., Luo, H., Zhang, F., Lin, F., Xu, G.: G2F: a secure user authentication for rapid smart home IoT management. IEEE Internet Things J. 8(13), 10884ā10895 (2021). https://doi.org/10.1109/JIOT.2021.3050710
Rizou, S., Egyptiadou, E.A., Ishibashi, Y., Psannis, K.E.: Preserving minorsā data protection in IoT-based smart homes according to GDPR considering cross-border issues. J. Commun. 17(3), 180ā187 (2022). https://doi.org/10.12720/jcm.17.3.180-187
Samuel, S.S.I.: A review of connectivity challenges in IoT-smart home. In: 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), pp. 1ā4 (2016). https://doi.org/10.1109/ICBDSC.2016.7460395
Shen, J., Wang, C., Li, T., Chen, X., Huang, X., Zhan, Z.: Secure data uploading scheme for a smart home system. Inf. Sci. 453, 186ā197 (2018). https://doi.org/10.1016/j.ins.2018.04.048
Xiao, Y., Jia, Y., Liu, C., Alrawais, A., Rekik, M., Shan, Z.: Homeshield: a credential-less authentication framework for smart home systems. IEEE Internet Things J. 7(9), 7903ā7918 (2020). https://doi.org/10.1109/JIOT.2020.3003621
Yan, W., Wang, Z., Wang, H., Wang, W., Li, J., Gui, X.: Survey on recent smart gateways for smart home: systems, technologies, and challenges. Trans. Emerg. Telecommun. Technol. 33(6), e4067 (2022). https://doi.org/10.1002/ett.4067
Yang, L., Liu, X., Gong, W.: Secure smart home systems: a blockchain perspective. In: 39th IEEE Conference on Computer Communications, INFOCOM Workshops 2020, Toronto, ON, Canada, July 6ā9, 2020, pp. 1003ā1008. IEEE (2020). https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162648
Acknowledgements
This work is supported by the National Natural Science Foundation of China under Grants No. 61922045, No. 61877034, No. U1836115, No. 61672290, the Natural Science Foundation of Jiangsu Province under Grant No. BK20181408, the Peng Cheng Laboratory Project of Guangdong Province PCL2018KP004, the CICAEET fund, and the PAPD fund.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Ā© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ma, Q., Zhou, T., Tan, H. (2022). D2D Authentication Scheme for IoT-enabled Smart Home. In: Chen, X., Huang, X., KutyÅowski, M. (eds) Security and Privacy in Social Networks and Big Data. SocialSec 2022. Communications in Computer and Information Science, vol 1663. Springer, Singapore. https://doi.org/10.1007/978-981-19-7242-3_6
Download citation
DOI: https://doi.org/10.1007/978-981-19-7242-3_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-7241-6
Online ISBN: 978-981-19-7242-3
eBook Packages: Computer ScienceComputer Science (R0)