Abstract
Smart home systems are developed to interconnect and automate household appliances and create ubiquitous home services. Such a system is mainly driven by the communications among Internet-of-Things (IoT) objects along with Radio Frequency IDentification (RFID) technologies, where the RFID techniques in the IoT network are commonly prone to malicious attacks due to the inherent weaknesses of underlying wireless radio communications. Thus, it causes the smart home systems vulnerable to some active attacks such as the jamming and cloning attacks, which in turn threaten to home breach and personal information disclosure. This paper therefore proposes a new trust-based authentication scheme to effectively address two typical attacks, jamming and cloning attacks, in smart home environment. The evaluation shows that our solution can significantly reduce the authentication failure in jamming attacks, increase the detection probability of cloning attacks, and improve the authentication efficiency to manage the authentication delay in a reasonable time.






Similar content being viewed by others
References
Al-Sudania, A. R., Zhoub, W., Liuc, B., Almansoorid, A., & Yange, M. (2018). Detecting unauthorized RFID tag carrier for secure access control to a smart building. International Journal of Applied Engineering Research, 13(1), 749–760.
Asadullah, M., & Raza, A. (2016). An overview of home automation systems. In 2016 2nd international conference on robotics and artificial intelligence (ICRAI) (pp. 27–31). https://doi.org/10.1109/ICRAI.2016.7791223.
Benkhelifa, E., Welsh, T., & Hamouda, W. (2018). A critical review of practices and challenges in intrusion detection systems for IoT: Toward universal and resilient systems. IEEE Communications Surveys and Tutorials, 20(4), 3496–3509.
Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys and Tutorials, 18(2), 1153–1176.
Chahid, Y., Benabdellah, M., & Azizi, A. (2017). Internet of things security. In 2017 International conference on wireless technologies, embedded and intelligent systems (WITS), IEEE (pp. 1–6).
Chen, J. L., Chen, M. C., Chen, C. W., & Chang, Y. C. (2007). Architecture design and performance evaluation of RFID object tracking systems. Computer Communications, 30(9), 2070–2086.
Chen, M., & Chen, S. (2015). An efficient anonymous authentication protocol for RFID systems using dynamic tokens. In 2015 IEEE 35th international conference on distributed computing systems, IEEE (pp. 756–757).
Dimitriou, T. (2006). A secure and efficient RFID protocol that could make big brother (partially) obsolete. In Pervasive computing and communications.
Fadlullah, Z. M., Tang, F., Mao, B., Kato, N., Akashi, O., Inoue, T., et al. (2009). State-of-the-art deep learning: Evolving machine intelligence toward tomorrow’s intelligent network traffic control systems. IEEE Communications Surveys and Tutorials, 19(4), 2432–2455.
Felix, C., & Jacob Raglend, I. (2011). Home automation using GSM. In International conference on signal processing, communication, computing and networking technologies (pp. 15–19).
Fernandes, E., Rahmati, A., Jung, J., & Prakash, A. (2017). Security implications of permission models in smart-home application frameworks. IEEE Security and Privacy, 15(2), 24–30.
Fortin-Simard, D., Bilodeau, J. S., Bouchard, K., Gaboury, S., Bouchard, B., & Bouzouane, A. (2015). Exploiting passive RFID technology for activity recognition in smart homes. IEEE Intelligent Systems, 30(4), 7–15.
Ge, M., Bangui, H., & Buhnova, B. (2018). Big data for internet of things: A survey. Future Generation Computer Systems, 87, 601–614.
Issariyakul, T., & Hossain, E. (2009). Introduction to network simulator 2 (NS2). In Introduction to network simulator.
Khattab, A., Jeddi, Z., Amini, E., & Bayoumi, M. (2017). RFID security threats and basic solutions. In RFID Security, Springer (pp. 27–41).
Kumar, P., Gurtov, A., Iinatti, J., Ylianttila, M., & Sain, M. (2016). Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sensors Journal, 16(1), 254–264.
Kumar, P., Braeken, A., Gurtov, A., Iinatti, J., & Ha, P. H. (2017). Anonymous secure framework in connected smart home environments. IEEE Transactions on Information Forensics and Security, 12(4), 968–979.
Liao, Y. P., & Hsiao, C. M. (2014). A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks, 18, 133–146.
Liu, D., & Ning, P. (2004). Multilevel \(\mu\)tesla: Broadcast authentication for distributed sensor networks. ACM Transactions on Embedded Computing Systems (TECS), 3(4), 800–836.
Liu, D., & Ning, P., et al. (2003). Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In NDSS, Citeseer.
Malche, T., & Maheshwary, P. (2017). Internet of things (IoT) for building smart home system. In 2017 International conference on I-SMAC (IoT in social, mobile, analytics and cloud)(I-SMAC), IEEE (pp. 65–70).
Mbarek, B., Meddeb, A., Ben Jaballah, W., & Mosbah, M. (2017). A secure electric energy management in smart home. International Journal of Communication Systems, 30(17), e3347.
Mbarek, B., Ge, M., & Pitner, T. (2019). Self-adaptive RFID authentication for internet of things. In International conference on advanced information networking and applications, Springer (pp. 1094–1105).
Mbarek, B., Ge, M., & Pitner, T. (2020). An efficient mutual authentication scheme for internet of things. Internet of Things, 9, 100160.
Mbarek, B., Ge, M., & Pitner, T. (2020). Enhanced network intrusion detection system protocol for internet of things. In Hung, C., Cerný, T., Shin, D., & Bechini, A. (Eds.), SAC ’20: The 35th ACM/SIGAPP symposium on applied computing, online event, [Brno, Czech Republic], March 30–April 3, 2020, ACM (pp. 1156–1163).
Mbarek, B., Jabeur, N., & Pitner, T. (2020). Toward enforcing security in smart homes using a trust-based scheme. In Workshops of the international conference on advanced information networking and applications, Springer (pp. 149–158).
Mengelkamp, E., Notheisen, B., Beer, C., Dauer, D., & Weinhardt, C. (2018). A blockchain-based smart grid: Towards sustainable local energy markets. Computer Science-Research and Development, 33(1–2), 207–214.
Mocrii, D., Chen, Y., & Musilek, P. (2018). IoT-based smart homes: A review of system architecture, software, communications, privacy and security. Internet of Things, 1, 81–98.
Moessner, M., & Khan, G. N. (2012). Secure authentication scheme for passive C1G2 RFID tags. Computer Networks, 56(1), 273–286.
Molnar, D., & Wagner, D. (2004). Privacy and security in library RFID: Issues, practices, and architectures. In Proceedings of the 11th ACM conference on computer and communications security, 2004 (pp. 210–219).
Naija, Y., Beroulle, V., & Machhout, M. (2018). Security enhancements of a mutual authentication protocol used in a HF full-fledged RFID tag. Journal of Electronic Testing, 34(3), 291–304.
Niu, C., Zhang, H., & Lin, T. (2016). An enhanced Q algorithm based on EPC-C1G2 RFID protocol. In 2016 International conference on modeling, simulation and optimization technologies and applications (MSOTA2016), Atlantis Press.
Perrig, A., Canetti, R., Tygar, J. D., & Song, D. (2002). The TESLA broadcast authentication protocol. RSA Cryptobytes, 5(2), 2–13.
Pirbhulal, S., Zhang, H., Alahi, M. E., Ghayvat, H., Mukhopadhyay, S., Zhang, Y. T., et al. (2017). A novel secure IoT-based smart home automation system using a wireless sensor network. Sensors, 17(1), 69.
Rahman, F., Hoque, M. E., & Ahamed, S. I. (2017). Anonpri: A secure anonymous private authentication protocol for RFID systems. Information Sciences, 379, 195–210.
Salameh, H. A. B., Almajali, S., Ayyash, M., & Elgala, H. (2018). Spectrum assignment in cognitive radio networks for internet-of-things delay-sensitive applications under jamming attacks. IEEE Internet of Things Journal, 5(3), 1904–1913.
Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C., & Belding-Royer, E. M. (2002). A secure routing protocol for ad hoc networks. In 10th IEEE international conference on network protocols, 2002. Proceedings, IEEE (pp. 78–87).
Sarigiannidis, P., Karapistoli, E., & Economides, A. A. (2015). Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information. Expert Systems with Applications, 42(21), 7560–7572.
Shen, J., Gui, Z., Ji, S., Shen, J., Tan, H., & Tang, Y. (2018). Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. Journal of Network and Computer Applications, 106, 117–123.
Singh, S., Sharma, P. K., & Park, J. H. (2017). SH-SecNet: An enhanced secure network architecture for the diagnosis of security threats in a smart home. Sustainability, 9(4), 513–532.
Stojkoska, B. L. R., & Trivodaliev, K. V. (2017). A review of internet of things for smart home: Challenges and solutions. Journal of Cleaner Production, 140, 1454–1464.
Tewari, A., & Gupta, B. (2017). Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. The Journal of Supercomputing, 73(3), 1085–1102.
Tripathy, A. K., Tripathy, P. K., Ray, N. K., & Mohanty, S. P. (2018). iTour: The future of smart tourism: An IoT framework for the independent mobility of tourists in smart cities. IEEE Consumer Electronics Magazine, 7(3), 32–37.
Wazid, M., Das, A. K., Odelu, V., Kumar, N., & Susilo, W. (2017). Secure remote user authenticated key establishment protocol for smart home environment. IEEE Transactions on Dependable and Secure Computing,. https://doi.org/10.1016/jjpowsour201609157.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Mbarek, B., Ge, M. & Pitner, T. Trust-Based Authentication for Smart Home Systems. Wireless Pers Commun 117, 2157–2172 (2021). https://doi.org/10.1007/s11277-020-07965-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07965-0