Abstract
In the modern era, smart home technology is considered as the most growing application of Internet of Things (IoT) as they facilitate users for control home devices remotely. Anonymous and efficient authentication approaches in smart home environments are essential for attaining secure communication as the home and user communication channel is highly vulnerable and insecure. In this paper, Merkle Hash Tree and Strongly Constrained Discrete Hashing Function-based Authentication (MHS-SCDHF-AS) that integrates the transaction history and physical context awareness is proposed for enabling security for Smart Home IoT applications. This MHS-SCDHF-AS prevents the problem of clock synchronization and does not utilize a verification table both during the authentication process. This Strongly Constrained Discrete Hashing Functionis a supervised hashing method which overcomes the limitations of large quantization errors and suboptimal binary codes. It is also capable of learning binary codes and significant in resisting the transmission loss as each information used for verification contains its authentication data in itself. The computation cost and communication cost of the proposed MHS-SCDHF-AS is identified to be lesser than the benchmarked authentication schemes considered for investigation. The formal, informal and model checking-based security investigation of the proposed MHS-SCDHF-AS is also confirmed to be superior over the baseline authentication schemes used for smart home environments.
Similar content being viewed by others
Data Availability
Authentication to access the data, authorization to perform transaction, and User verification minimizes unauthorized access. Thereby the number of requests towards the server has been minimized which improves the data availability. Memory requirement is also mitigated and hence the data may not be replaced by new set, data hit rate, which again increases the availability of data on demand.
References
Agrawal D, Bhagwat R, Bandopadhyay R, Kunapareddi V, Burden E, Halse S, Wisniewski P, Kropczynski J (2020) Enhancing Smart Home Security using Co-Monitoring of IoT Devices. Companion of the 2020 ACM International Conference on Supporting Group Work 2(1):34–48
Yang H, Lee W, Lee H (2018) IoT Smart Home Adoption: The Importance of Proper Level Automation. J Sens 2018(1):1–11
Kim JT (2017) Analyses of a secure authentication scheme for a smart home system based on internet on things. 2017 International Conference on Applied System Innovation (ICASI) 9(1):100158
Domb M (2019) Smart Home Systems Based on Internet of Things. IoT and Smart Home Automation [Working Title] 1(1):45–59
Banerjee A, Sufyanf F, Nayel MS, Sagar S (2018) Centralized framework for controlling heterogeneous appliances in a smart home environment. 2018 International Conference on Information and Computer Technologies (ICICT) 1(1):23–33
Wilson G, Pereyda C, Raghunath N, De la Cruz G, Goel S, Nesaei S, Minor B, Schmitter-Edgecombe M, Taylor ME, Cook DJ (2019) Robot-enabled support of daily activities in smart home environments. Cogn Syst Res 54(1):258–272
Gebrie MT, Abie H (2017) Risk-based adaptive authentication for internet of things in smart home eHealth. Proceedings of the 11th European Conference on Software Architecture Companion Proceedings - ECSA '17 1(1):22–32
Hussain S, Chaudhry SA (2019) Comments on Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment. IEEE Internet Things J 6(6):10936–10940
Alshahrani M, Traore I, Woungang I (2019) Anonymous mutual IoT interdevice authentication and key agreement scheme based on the ZigBee technique. Internet of Things 7(1):100061
Gaikwad PP, Gabhane JP, Golait SS (2015) A survey based on Smart Homes system using Internet-of-Things. 2015 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC) 1(1):45–56
Chuang Y, Lo N, Yang C, Tang S (2018) A Lightweight Continuous Authentication Protocol for the Internet of Things. Sensors 18(4):1104
Kim Y-P, Yoo S, Yoo C (2015) DAoT: Dynamic and energy-aware authentication for smart home appliances in Internet of Things. IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV 2(2):196–197
Ali W, Dustgeer G, Awais M, Shah MA (2017) IoT based smart home: Security challenges, security requirements and solutions. 23rd International Conference on Automation and Computing (ICAC), Huddersfield 1(2):1–6
Lin C, He D, Kumar N, Huang X, Vijayakumar P, Choo KR (2020) HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes. IEEE Internet Things J 7(2):818–829
Poh GS, Gope P, Ning J (2018) PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment. IEEE Trans Dependable Secure Comput 3(3):213–2239
Peter S, Gopal RK (2016) Multi-level authentication system for smart home-security analysis and implementation, International Conference on Inventive Computation Technologies (ICICT). Coimbatore 3(1):1–7
Kim JT (2017) Analyses of secure authentication scheme for smart home system based on internet on things 2017 International Conference on Applied System Innovation (ICASI), Sapporo, 2017, pp 335–336
Naoui S, Elhdhili MH, Saidane LA (2019) Novel Smart Home Authentication Protocol LRP-SHAP, IEEE Wireless Communications and Networking Conference (WCNC). Marrakesh, Morocco 2(1):1–6
Ren H, Song Y, Yang S, Situ F (2016) Secure smart home: A voiceprint and internet based authentication system for remote accessing,11th International Conference on Computer Science & Education (ICCSE), Nagoya 3(2):247–251
Ashibani DK, Mahmoud QH (2017) A context-aware authentication service for smart homes, 14th IEEE Annual Consumer Communications & Networking Conference (CCNC). Las Vegas, NV 5(2):588–589
Wazid M, Das AK, Odelu V, Kumar N, Susilo W (2020) Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. IEEE Trans Dependable Secure Comput 17(2):391–406
Lyu Q, Zheng N, Liu H, Gao C, Chen S, Liu J (2019) Remotely Access “My” Smart Home in Private: An Anti-Tracking Authentication and Key Agreement Scheme. IEEE Access 7(2):41835–41851
Dey S, Hossain A (2019) Session-Key Establishment and Authentication in a Smart Home Network Using Public Key Cryptography. IEEE Sensors Letters 3(4):1–4
Alshahrani M, Traore I (2019) Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain. Journal of Information Security and Applications 45(1):156–175
Fakroon M, Alshahrani M, Gebali F, Traore I (2020) Secure remote anonymous user authentication scheme for smart home environment. Internet of Things 9(1):100158
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Sudha, K.S., Jeyanthi, N. Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications. Peer-to-Peer Netw. Appl. 16, 2367–2379 (2023). https://doi.org/10.1007/s12083-023-01527-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-023-01527-4