Skip to main content
Log in

Trust-Based Authentication for Smart Home Systems

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Smart home systems are developed to interconnect and automate household appliances and create ubiquitous home services. Such a system is mainly driven by the communications among Internet-of-Things (IoT) objects along with Radio Frequency IDentification (RFID) technologies, where the RFID techniques in the IoT network are commonly prone to malicious attacks due to the inherent weaknesses of underlying wireless radio communications. Thus, it causes the smart home systems vulnerable to some active attacks such as the jamming and cloning attacks, which in turn threaten to home breach and personal information disclosure. This paper therefore proposes a new trust-based authentication scheme to effectively address two typical attacks, jamming and cloning attacks, in smart home environment. The evaluation shows that our solution can significantly reduce the authentication failure in jamming attacks, increase the detection probability of cloning attacks, and improve the authentication efficiency to manage the authentication delay in a reasonable time.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Al-Sudania, A. R., Zhoub, W., Liuc, B., Almansoorid, A., & Yange, M. (2018). Detecting unauthorized RFID tag carrier for secure access control to a smart building. International Journal of Applied Engineering Research, 13(1), 749–760.

    Google Scholar 

  2. Asadullah, M., & Raza, A. (2016). An overview of home automation systems. In 2016 2nd international conference on robotics and artificial intelligence (ICRAI) (pp. 27–31). https://doi.org/10.1109/ICRAI.2016.7791223.

  3. Benkhelifa, E., Welsh, T., & Hamouda, W. (2018). A critical review of practices and challenges in intrusion detection systems for IoT: Toward universal and resilient systems. IEEE Communications Surveys and Tutorials, 20(4), 3496–3509.

    Article  Google Scholar 

  4. Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys and Tutorials, 18(2), 1153–1176.

    Article  Google Scholar 

  5. Chahid, Y., Benabdellah, M., & Azizi, A. (2017). Internet of things security. In 2017 International conference on wireless technologies, embedded and intelligent systems (WITS), IEEE (pp. 1–6).

  6. Chen, J. L., Chen, M. C., Chen, C. W., & Chang, Y. C. (2007). Architecture design and performance evaluation of RFID object tracking systems. Computer Communications, 30(9), 2070–2086.

    Article  Google Scholar 

  7. Chen, M., & Chen, S. (2015). An efficient anonymous authentication protocol for RFID systems using dynamic tokens. In 2015 IEEE 35th international conference on distributed computing systems, IEEE (pp. 756–757).

  8. Dimitriou, T. (2006). A secure and efficient RFID protocol that could make big brother (partially) obsolete. In Pervasive computing and communications.

  9. Fadlullah, Z. M., Tang, F., Mao, B., Kato, N., Akashi, O., Inoue, T., et al. (2009). State-of-the-art deep learning: Evolving machine intelligence toward tomorrow’s intelligent network traffic control systems. IEEE Communications Surveys and Tutorials, 19(4), 2432–2455.

    Article  Google Scholar 

  10. Felix, C., & Jacob Raglend, I. (2011). Home automation using GSM. In International conference on signal processing, communication, computing and networking technologies (pp. 15–19).

  11. Fernandes, E., Rahmati, A., Jung, J., & Prakash, A. (2017). Security implications of permission models in smart-home application frameworks. IEEE Security and Privacy, 15(2), 24–30.

    Article  Google Scholar 

  12. Fortin-Simard, D., Bilodeau, J. S., Bouchard, K., Gaboury, S., Bouchard, B., & Bouzouane, A. (2015). Exploiting passive RFID technology for activity recognition in smart homes. IEEE Intelligent Systems, 30(4), 7–15.

    Article  Google Scholar 

  13. Ge, M., Bangui, H., & Buhnova, B. (2018). Big data for internet of things: A survey. Future Generation Computer Systems, 87, 601–614.

    Article  Google Scholar 

  14. Issariyakul, T., & Hossain, E. (2009). Introduction to network simulator 2 (NS2). In Introduction to network simulator.

  15. Khattab, A., Jeddi, Z., Amini, E., & Bayoumi, M. (2017). RFID security threats and basic solutions. In RFID Security, Springer (pp. 27–41).

  16. Kumar, P., Gurtov, A., Iinatti, J., Ylianttila, M., & Sain, M. (2016). Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sensors Journal, 16(1), 254–264.

    Article  Google Scholar 

  17. Kumar, P., Braeken, A., Gurtov, A., Iinatti, J., & Ha, P. H. (2017). Anonymous secure framework in connected smart home environments. IEEE Transactions on Information Forensics and Security, 12(4), 968–979.

    Article  Google Scholar 

  18. Liao, Y. P., & Hsiao, C. M. (2014). A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks, 18, 133–146.

    Article  Google Scholar 

  19. Liu, D., & Ning, P. (2004). Multilevel \(\mu\)tesla: Broadcast authentication for distributed sensor networks. ACM Transactions on Embedded Computing Systems (TECS), 3(4), 800–836.

    Article  Google Scholar 

  20. Liu, D., & Ning, P., et al. (2003). Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In NDSS, Citeseer.

  21. Malche, T., & Maheshwary, P. (2017). Internet of things (IoT) for building smart home system. In 2017 International conference on I-SMAC (IoT in social, mobile, analytics and cloud)(I-SMAC), IEEE (pp. 65–70).

  22. Mbarek, B., Meddeb, A., Ben Jaballah, W., & Mosbah, M. (2017). A secure electric energy management in smart home. International Journal of Communication Systems, 30(17), e3347.

    Article  Google Scholar 

  23. Mbarek, B., Ge, M., & Pitner, T. (2019). Self-adaptive RFID authentication for internet of things. In International conference on advanced information networking and applications, Springer (pp. 1094–1105).

  24. Mbarek, B., Ge, M., & Pitner, T. (2020). An efficient mutual authentication scheme for internet of things. Internet of Things, 9, 100160.

    Article  Google Scholar 

  25. Mbarek, B., Ge, M., & Pitner, T. (2020). Enhanced network intrusion detection system protocol for internet of things. In Hung, C., Cerný, T., Shin, D., & Bechini, A. (Eds.), SAC ’20: The 35th ACM/SIGAPP symposium on applied computing, online event, [Brno, Czech Republic], March 30–April 3, 2020, ACM (pp. 1156–1163).

  26. Mbarek, B., Jabeur, N., & Pitner, T. (2020). Toward enforcing security in smart homes using a trust-based scheme. In Workshops of the international conference on advanced information networking and applications, Springer (pp. 149–158).

  27. Mengelkamp, E., Notheisen, B., Beer, C., Dauer, D., & Weinhardt, C. (2018). A blockchain-based smart grid: Towards sustainable local energy markets. Computer Science-Research and Development, 33(1–2), 207–214.

    Article  Google Scholar 

  28. Mocrii, D., Chen, Y., & Musilek, P. (2018). IoT-based smart homes: A review of system architecture, software, communications, privacy and security. Internet of Things, 1, 81–98.

    Article  Google Scholar 

  29. Moessner, M., & Khan, G. N. (2012). Secure authentication scheme for passive C1G2 RFID tags. Computer Networks, 56(1), 273–286.

    Article  Google Scholar 

  30. Molnar, D., & Wagner, D. (2004). Privacy and security in library RFID: Issues, practices, and architectures. In Proceedings of the 11th ACM conference on computer and communications security, 2004 (pp. 210–219).

  31. Naija, Y., Beroulle, V., & Machhout, M. (2018). Security enhancements of a mutual authentication protocol used in a HF full-fledged RFID tag. Journal of Electronic Testing, 34(3), 291–304.

    Article  Google Scholar 

  32. Niu, C., Zhang, H., & Lin, T. (2016). An enhanced Q algorithm based on EPC-C1G2 RFID protocol. In 2016 International conference on modeling, simulation and optimization technologies and applications (MSOTA2016), Atlantis Press.

  33. Perrig, A., Canetti, R., Tygar, J. D., & Song, D. (2002). The TESLA broadcast authentication protocol. RSA Cryptobytes, 5(2), 2–13.

    Google Scholar 

  34. Pirbhulal, S., Zhang, H., Alahi, M. E., Ghayvat, H., Mukhopadhyay, S., Zhang, Y. T., et al. (2017). A novel secure IoT-based smart home automation system using a wireless sensor network. Sensors, 17(1), 69.

    Google Scholar 

  35. Rahman, F., Hoque, M. E., & Ahamed, S. I. (2017). Anonpri: A secure anonymous private authentication protocol for RFID systems. Information Sciences, 379, 195–210.

    Article  Google Scholar 

  36. Salameh, H. A. B., Almajali, S., Ayyash, M., & Elgala, H. (2018). Spectrum assignment in cognitive radio networks for internet-of-things delay-sensitive applications under jamming attacks. IEEE Internet of Things Journal, 5(3), 1904–1913.

    Article  Google Scholar 

  37. Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C., & Belding-Royer, E. M. (2002). A secure routing protocol for ad hoc networks. In 10th IEEE international conference on network protocols, 2002. Proceedings, IEEE (pp. 78–87).

  38. Sarigiannidis, P., Karapistoli, E., & Economides, A. A. (2015). Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information. Expert Systems with Applications, 42(21), 7560–7572.

    Article  Google Scholar 

  39. Shen, J., Gui, Z., Ji, S., Shen, J., Tan, H., & Tang, Y. (2018). Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. Journal of Network and Computer Applications, 106, 117–123.

    Article  Google Scholar 

  40. Singh, S., Sharma, P. K., & Park, J. H. (2017). SH-SecNet: An enhanced secure network architecture for the diagnosis of security threats in a smart home. Sustainability, 9(4), 513–532.

    Article  Google Scholar 

  41. Stojkoska, B. L. R., & Trivodaliev, K. V. (2017). A review of internet of things for smart home: Challenges and solutions. Journal of Cleaner Production, 140, 1454–1464.

    Article  Google Scholar 

  42. Tewari, A., & Gupta, B. (2017). Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. The Journal of Supercomputing, 73(3), 1085–1102.

    Article  Google Scholar 

  43. Tripathy, A. K., Tripathy, P. K., Ray, N. K., & Mohanty, S. P. (2018). iTour: The future of smart tourism: An IoT framework for the independent mobility of tourists in smart cities. IEEE Consumer Electronics Magazine, 7(3), 32–37.

    Article  Google Scholar 

  44. Wazid, M., Das, A. K., Odelu, V., Kumar, N., & Susilo, W. (2017). Secure remote user authenticated key establishment protocol for smart home environment. IEEE Transactions on Dependable and Secure Computing,. https://doi.org/10.1016/jjpowsour201609157.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bacem Mbarek.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mbarek, B., Ge, M. & Pitner, T. Trust-Based Authentication for Smart Home Systems. Wireless Pers Commun 117, 2157–2172 (2021). https://doi.org/10.1007/s11277-020-07965-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07965-0

Keywords

Navigation