Skip to main content
Log in

Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

In the modern era, smart home technology is considered as the most growing application of Internet of Things (IoT) as they facilitate users for control home devices remotely. Anonymous and efficient authentication approaches in smart home environments are essential for attaining secure communication as the home and user communication channel is highly vulnerable and insecure. In this paper, Merkle Hash Tree and Strongly Constrained Discrete Hashing Function-based Authentication (MHS-SCDHF-AS) that integrates the transaction history and physical context awareness is proposed for enabling security for Smart Home IoT applications. This MHS-SCDHF-AS prevents the problem of clock synchronization and does not utilize a verification table both during the authentication process. This Strongly Constrained Discrete Hashing Functionis a supervised hashing method which overcomes the limitations of large quantization errors and suboptimal binary codes. It is also capable of learning binary codes and significant in resisting the transmission loss as each information used for verification contains its authentication data in itself. The computation cost and communication cost of the proposed MHS-SCDHF-AS is identified to be lesser than the benchmarked authentication schemes considered for investigation. The formal, informal and model checking-based security investigation of the proposed MHS-SCDHF-AS is also confirmed to be superior over the baseline authentication schemes used for smart home environments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Data Availability

Authentication to access the data, authorization to perform transaction, and User verification minimizes unauthorized access. Thereby the number of requests towards the server has been minimized which improves the data availability. Memory requirement is also mitigated and hence the data may not be replaced by new set, data hit rate, which again increases the availability of data on demand.

References

  1. Agrawal D, Bhagwat R, Bandopadhyay R, Kunapareddi V, Burden E, Halse S, Wisniewski P, Kropczynski J (2020) Enhancing Smart Home Security using Co-Monitoring of IoT Devices. Companion of the 2020 ACM International Conference on Supporting Group Work 2(1):34–48

  2. Yang H, Lee W, Lee H (2018) IoT Smart Home Adoption: The Importance of Proper Level Automation. J Sens 2018(1):1–11

    MathSciNet  Google Scholar 

  3. Kim JT (2017) Analyses of a secure authentication scheme for a smart home system based on internet on things. 2017 International Conference on Applied System Innovation (ICASI) 9(1):100158

  4. Domb M (2019) Smart Home Systems Based on Internet of Things. IoT and Smart Home Automation [Working Title] 1(1):45–59

    Google Scholar 

  5. Banerjee A, Sufyanf F, Nayel MS, Sagar S (2018) Centralized framework for controlling heterogeneous appliances in a smart home environment. 2018 International Conference on Information and Computer Technologies (ICICT) 1(1):23–33

  6. Wilson G, Pereyda C, Raghunath N, De la Cruz G, Goel S, Nesaei S, Minor B, Schmitter-Edgecombe M, Taylor ME, Cook DJ (2019) Robot-enabled support of daily activities in smart home environments. Cogn Syst Res 54(1):258–272

    Article  Google Scholar 

  7. Gebrie MT, Abie H (2017) Risk-based adaptive authentication for internet of things in smart home eHealth. Proceedings of the 11th European Conference on Software Architecture Companion Proceedings - ECSA '17 1(1):22–32

  8. Hussain S, Chaudhry SA (2019) Comments on Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment. IEEE Internet Things J 6(6):10936–10940

    Article  Google Scholar 

  9. Alshahrani M, Traore I, Woungang I (2019) Anonymous mutual IoT interdevice authentication and key agreement scheme based on the ZigBee technique. Internet of Things 7(1):100061

    Article  Google Scholar 

  10. Gaikwad PP, Gabhane JP, Golait SS (2015) A survey based on Smart Homes system using Internet-of-Things. 2015 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC) 1(1):45–56

  11. Chuang Y, Lo N, Yang C, Tang S (2018) A Lightweight Continuous Authentication Protocol for the Internet of Things. Sensors 18(4):1104

    Article  Google Scholar 

  12. Kim Y-P, Yoo S, Yoo C (2015) DAoT: Dynamic and energy-aware authentication for smart home appliances in Internet of Things. IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV 2(2):196–197

  13. Ali W, Dustgeer G, Awais M, Shah MA (2017) IoT based smart home: Security challenges, security requirements and solutions. 23rd International Conference on Automation and Computing (ICAC), Huddersfield 1(2):1–6

  14. Lin C, He D, Kumar N, Huang X, Vijayakumar P, Choo KR (2020) HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes. IEEE Internet Things J 7(2):818–829

    Article  Google Scholar 

  15. Poh GS, Gope P, Ning J (2018) PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment. IEEE Trans Dependable Secure Comput 3(3):213–2239

    Google Scholar 

  16. Peter S, Gopal RK (2016) Multi-level authentication system for smart home-security analysis and implementation, International Conference on Inventive Computation Technologies (ICICT). Coimbatore 3(1):1–7

  17. Kim JT (2017) Analyses of secure authentication scheme for smart home system based on internet on things 2017 International Conference on Applied System Innovation (ICASI), Sapporo, 2017, pp 335–336

  18. Naoui S, Elhdhili MH, Saidane LA (2019) Novel Smart Home Authentication Protocol LRP-SHAP, IEEE Wireless Communications and Networking Conference (WCNC). Marrakesh, Morocco 2(1):1–6

    Google Scholar 

  19. Ren H, Song Y, Yang S, Situ F (2016) Secure smart home: A voiceprint and internet based authentication system for remote accessing,11th International Conference on Computer Science & Education (ICCSE), Nagoya 3(2):247–251

  20. Ashibani DK, Mahmoud QH (2017) A context-aware authentication service for smart homes, 14th IEEE Annual Consumer Communications & Networking Conference (CCNC). Las Vegas, NV 5(2):588–589

    Google Scholar 

  21. Wazid M, Das AK, Odelu V, Kumar N, Susilo W (2020) Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. IEEE Trans Dependable Secure Comput 17(2):391–406

    Article  Google Scholar 

  22. Lyu Q, Zheng N, Liu H, Gao C, Chen S, Liu J (2019) Remotely Access “My” Smart Home in Private: An Anti-Tracking Authentication and Key Agreement Scheme. IEEE Access 7(2):41835–41851

    Article  Google Scholar 

  23. Dey S, Hossain A (2019) Session-Key Establishment and Authentication in a Smart Home Network Using Public Key Cryptography. IEEE Sensors Letters 3(4):1–4

    Article  Google Scholar 

  24. Alshahrani M, Traore I (2019) Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain. Journal of Information Security and Applications 45(1):156–175

    Article  Google Scholar 

  25. Fakroon M, Alshahrani M, Gebali F, Traore I (2020) Secure remote anonymous user authentication scheme for smart home environment. Internet of Things 9(1):100158

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Jeyanthi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sudha, K.S., Jeyanthi, N. Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications. Peer-to-Peer Netw. Appl. 16, 2367–2379 (2023). https://doi.org/10.1007/s12083-023-01527-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-023-01527-4

Keywords

Navigation