Efficient Authentication Scheme for IoT in Smart Homes

In a smart home, all of the devices can talk to each other and the owner from anywhere in the world, thanks to the internet connection. The term "authentication" is used to describe the procedure of verifying the identity of a user, device, or other entity requesting access to, or interact...

Full description

Saved in:
Bibliographic Details
Published in:2023 International Conference on Power Energy, Environment & Intelligent Control (PEEIC) pp. 312 - 315
Main Authors: Srivastava, Animesh, Saini, Parveen Kumar, Singh, Gulbir, Kumar, Gautam, Dhondiyal, Shiv Ashish
Format: Conference Proceeding
Language:English
Published: IEEE 19-12-2023
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:In a smart home, all of the devices can talk to each other and the owner from anywhere in the world, thanks to the internet connection. The term "authentication" is used to describe the procedure of verifying the identity of a user, device, or other entity requesting access to, or interaction with, the data, systems, and devices that make up an IoT smart home. By denying outsiders entry to the smart home's environs, it helps ensure the household's security and privacy. In this study, we present a fix that uses strong authentication security during the smart home setup procedure. The proposed technique proposed here involves inserting an authentication server in between the RFID tag and the RFID reader. When you log in, the server will carry out the authentication process on your behalf. By fusing the convenience of RFID with the security of elliptic curve encryption, this authentication method provides a robust access control solution for smart homes. This authentication mechanism can protect a smart home system from both jamming and cloning, two of the most common forms of attack. Our method has the potential to significantly reduce the number of failed authentication attempts due to jamming attacks, significantly increase the recognition likelihood of cloning attacks, and significantly recover authentication effectiveness to manage authentication delays in a reasonable amount of time, as shown by the results of the evaluation.
DOI:10.1109/PEEIC59336.2023.10451557