scispace - formally typeset
Journal ArticleDOI

A secure authentication scheme for IoT application in smart home

Reads0
Chats0
TLDR
A smart card based secure addressing and authentication (SCSAA) scheme by modifying the standard IPv6 protocol to mitigate the security threats in the IoT network is proposed.
Abstract
The edge-based Internet of Things (IoT) computing provides a new value for the consumer where the smart devices, objects, and appliances connected over the internet. The data generated from the smart IoT devices need to be securely processed. With the increasing rate of smart IoT devices, the existing addressing schemes and security protocols do not guaranty to perform well in all situations. This paper proposed a smart card based secure addressing and authentication (SCSAA) scheme by modifying the standard IPv6 protocol to mitigate the security threats in the IoT network. The proposed scheme has two folds; firstly, this scheme provides a unique way of addressing by assigning unique 64-bit interface identifier (IID) to smart devices/appliances and uniquely authenticates them in IoT network. Secondly, this scheme uses the secret session key to prevent the network from unauthorized access. Additionally, this work also evaluates the informal security analysis, formal security analysis using ROR model and AVISPA tool. The overall security analysis proves that proposed scheme protect the smart home IoT network from various vulnerabilities and attacks.

read more

Citations
More filters
Journal ArticleDOI

Internet of Things Security: Challenges and Key Issues

TL;DR: In this paper, the authors identify the security challenges and key issues that are likely to arise in the IoT environment in order to guide authentication techniques to achieve a secure IoT service and propose a solution to overcome them.
Journal ArticleDOI

A privacy and session key based authentication scheme for medical IoT networks

TL;DR: The SAMA scheme uses the unique addressing and identification method to authenticates the smart medical monitoring devices, so that they can uniquely identifies in medical IoT network and preserves anonymity with the help of session key establishment to secure communication between the user and medical server.
Proceedings ArticleDOI

ECC Based Authentication Scheme for Smart Homes

TL;DR: In this paper, the authors proposed an ECC-based lightweight key management and mutual authentication protocol for the smart home environment, which exhibited the least communication and computation overheads, and had the least impact on both throughput and EED compared with related schemes.
Journal ArticleDOI

Current Research Trends in IoT Security: A Systematic Mapping Study

TL;DR: In this paper, the authors conducted a systematic mapping study of the literature to identify evolving trends in IoT security and determine research subjects, and additionally performed structural topic modeling to identify current research topics and the most promising ones via topic trend estimation.
References
More filters
Proceedings ArticleDOI

Random oracles are practical: a paradigm for designing efficient protocols

TL;DR: It is argued that the random oracles model—where all parties have access to a public random oracle—provides a bridge between cryptographic theory and cryptographic practice, and yields protocols much more efficient than standard ones while retaining many of the advantages of provable security.

IP Version 6 Addressing Architecture

R. Hinden, +1 more
TL;DR: This specification defines the addressing architecture of the IP Version 6 protocol [IPV6], which includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv 6 unicast addresses, anycast addresses, and multicast addressing, and an IPv6 node's required addresses.
Book ChapterDOI

Password-Based authenticated key exchange in the three-party setting

TL;DR: This paper presents a natural generic construction of a three-party protocol, based on any two-party authenticated key exchange protocol, and proves its security without making use of the Random Oracle model, which is the first provably-secure password-based protocol in the three- party setting.

Privacy Extensions for Stateless Address Autoconfiguration in IPv6

TL;DR: An extension to IPv6 stateless address autoconfiguration for interfaces whose interface identifier is derived from an IEEE identifier is described, causing nodes to generate global-scope addresses from interface identifiers that change over time, even in cases where the interface contains an embedded IEEE identifier.
Related Papers (5)