Efficient Authentication Scheme for IoT in Smart Homes

In a smart home, all of the devices can talk to each other and the owner from anywhere in the world, thanks to the internet connection. The term "authentication" is used to describe the procedure of verifying the identity of a user, device, or other entity requesting access to, or interact...

Full description

Saved in:
Bibliographic Details
Published in:2023 International Conference on Power Energy, Environment & Intelligent Control (PEEIC) pp. 312 - 315
Main Authors: Srivastava, Animesh, Saini, Parveen Kumar, Singh, Gulbir, Kumar, Gautam, Dhondiyal, Shiv Ashish
Format: Conference Proceeding
Language:English
Published: IEEE 19-12-2023
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract In a smart home, all of the devices can talk to each other and the owner from anywhere in the world, thanks to the internet connection. The term "authentication" is used to describe the procedure of verifying the identity of a user, device, or other entity requesting access to, or interaction with, the data, systems, and devices that make up an IoT smart home. By denying outsiders entry to the smart home's environs, it helps ensure the household's security and privacy. In this study, we present a fix that uses strong authentication security during the smart home setup procedure. The proposed technique proposed here involves inserting an authentication server in between the RFID tag and the RFID reader. When you log in, the server will carry out the authentication process on your behalf. By fusing the convenience of RFID with the security of elliptic curve encryption, this authentication method provides a robust access control solution for smart homes. This authentication mechanism can protect a smart home system from both jamming and cloning, two of the most common forms of attack. Our method has the potential to significantly reduce the number of failed authentication attempts due to jamming attacks, significantly increase the recognition likelihood of cloning attacks, and significantly recover authentication effectiveness to manage authentication delays in a reasonable amount of time, as shown by the results of the evaluation.
AbstractList In a smart home, all of the devices can talk to each other and the owner from anywhere in the world, thanks to the internet connection. The term "authentication" is used to describe the procedure of verifying the identity of a user, device, or other entity requesting access to, or interaction with, the data, systems, and devices that make up an IoT smart home. By denying outsiders entry to the smart home's environs, it helps ensure the household's security and privacy. In this study, we present a fix that uses strong authentication security during the smart home setup procedure. The proposed technique proposed here involves inserting an authentication server in between the RFID tag and the RFID reader. When you log in, the server will carry out the authentication process on your behalf. By fusing the convenience of RFID with the security of elliptic curve encryption, this authentication method provides a robust access control solution for smart homes. This authentication mechanism can protect a smart home system from both jamming and cloning, two of the most common forms of attack. Our method has the potential to significantly reduce the number of failed authentication attempts due to jamming attacks, significantly increase the recognition likelihood of cloning attacks, and significantly recover authentication effectiveness to manage authentication delays in a reasonable amount of time, as shown by the results of the evaluation.
Author Saini, Parveen Kumar
Srivastava, Animesh
Kumar, Gautam
Dhondiyal, Shiv Ashish
Singh, Gulbir
Author_xml – sequence: 1
  givenname: Animesh
  surname: Srivastava
  fullname: Srivastava, Animesh
  email: er.animesh10@gmail.com
  organization: Graphic Era Hill University,Department of Computer Science & Engineering,Dehradun
– sequence: 2
  givenname: Parveen Kumar
  surname: Saini
  fullname: Saini, Parveen Kumar
  email: parveen.e13339@cumail.in
  organization: Chandigarh University,Department of CSE,Mohali,Punjab
– sequence: 3
  givenname: Gulbir
  surname: Singh
  fullname: Singh, Gulbir
  email: gulbir.rkgit@gmail.com
  organization: MMICT&BM, Maharishi Markandeshwar (Deemed to be University),Mullana, Ambala,Haryana,India
– sequence: 4
  givenname: Gautam
  surname: Kumar
  fullname: Kumar, Gautam
  email: gautam.bopara@gmail.com
  organization: M.M. Institute of Computer Technology & Business Management, Maharishi Markandeshwar (Deemed to be University),Mullana, Ambala,Haryana,India
– sequence: 5
  givenname: Shiv Ashish
  surname: Dhondiyal
  fullname: Dhondiyal, Shiv Ashish
  email: shivashish1234@gmail.com
  organization: Graphic Era (Deemed to be University),Department of Computer Science & Engineering,Dehradun
BookMark eNo1j8FKxDAURSPoQsf5Axf5gda8pEn6lkOpTmFAwXE9ZDLvMQHbSCcu_HsL6urAXRzuuRPXU55ICAmqBlD4-Nr3Q2fRGFdrpU0NqrFgrb8Sa_TYGquM9d7hrXA9c4qJpiI3X-W8MMVQUp7kWzzTSJLzLIe8l2lZxjAXuc0jXe7FDYePC63_uBLvT_2-21a7l-eh2-yqBIClOjIGbsIphAiK2bQcm0CoGh1PClskC6i9suSJXWMdR7AukPekMOojm5V4-PUmIjp8zmm58H34zzE_ZLRE6w
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/PEEIC59336.2023.10451557
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library Online
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798350357769
EndPage 315
ExternalDocumentID 10451557
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i119t-bf9af4adaac10ff38fc4ae9042cd0989e5192705e7ef6456fc156ae77e09c2bf3
IEDL.DBID RIE
IngestDate Wed May 01 11:58:49 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i119t-bf9af4adaac10ff38fc4ae9042cd0989e5192705e7ef6456fc156ae77e09c2bf3
PageCount 4
ParticipantIDs ieee_primary_10451557
PublicationCentury 2000
PublicationDate 2023-Dec.-19
PublicationDateYYYYMMDD 2023-12-19
PublicationDate_xml – month: 12
  year: 2023
  text: 2023-Dec.-19
  day: 19
PublicationDecade 2020
PublicationTitle 2023 International Conference on Power Energy, Environment & Intelligent Control (PEEIC)
PublicationTitleAbbrev PEEIC
PublicationYear 2023
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.9067556
Snippet In a smart home, all of the devices can talk to each other and the owner from anywhere in the world, thanks to the internet connection. The term...
SourceID ieee
SourceType Publisher
StartPage 312
SubjectTerms Access control
Authentication
Cloning
Cryptography
Internet of Things
Jamming
RFID
Scalability
Servers
Smart Home
Smart homes
Title Efficient Authentication Scheme for IoT in Smart Homes
URI https://ieeexplore.ieee.org/document/10451557
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED7RTkyACOItD6wpSezE9lxS0QVVapHYKsc5Sx2aINr8f85OU8TAwGZZPlk--3QPf3cH8GSLKhOKY0zaycYC0caVq0jwaHUhjOUKQ-hiKd8-1Evpy-TEx1wYRAzgM5z4YfjLr1vb-VAZSbjwHUnkCEZSqz5Za0DnJPp5UZbzaU4euoceZHwyLP_VOCXojdnZP3c8h-gnA48tjrrlAk6wuYSiDPUeiIL5yJbH-fQBN7Yk1m-RkQHK5u2KbWhmS2-C-SbouwjeZ-Vq-hof-h7EmzTVe2KWNk6Y2hibJs5x5awwqEm8bJ1opZGsrkwmOUp0BRlAzpITZlBKTLTNKsevYNy0DV4DU0RIHlcltTOiylPDEYU2unahcpu8gcgfev3Zl7ZYD-e9_WP-Dk49az2eI9X3MN5_dfgAo13dPYbb-AbZOoyk
link.rule.ids 310,311,782,786,791,792,798,27934,54767
linkProvider IEEE
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED7RMsAEiCDeeGBNycOJ47mkakWpKjVIbJHjnKUOTRFt_z9nhxQxMLBZlk-Wzz7dw9_dATzqtIp4FqNP2kn7HFH7lalI8Gh1ypWOM3Shi4WYvWfPuS2T4-9zYRDRgc9wYIfuL79e650NlZGEc9uRRPTgMOEiFW26VofPCeTTPM8nw4R8dAs-iOJBR_CrdYrTHKOTf-55Ct5PDh6b77XLGRxgcw5p7io-EAWzsS2L9GlDbmxBzF8hIxOUTdYFW9LMil4Fs23QNx68jfJiOPa_Ox_4yzCUW2KXVIarWikdBsbEmdFcoSQB03UgM4lkd0UiSFCgSckEMprcMIVCYCB1VJn4AvrNusFLYBkRks9VCWkUr5JQxYhcKlkbV7tNXIFnD11-tMUtyu6813_MP8DRuHidltPJ7OUGji2bLbojlLfQ337u8A56m3p3727mC3TEj_U
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+International+Conference+on+Power+Energy%2C+Environment+%26+Intelligent+Control+%28PEEIC%29&rft.atitle=Efficient+Authentication+Scheme+for+IoT+in+Smart+Homes&rft.au=Srivastava%2C+Animesh&rft.au=Saini%2C+Parveen+Kumar&rft.au=Singh%2C+Gulbir&rft.au=Kumar%2C+Gautam&rft.date=2023-12-19&rft.pub=IEEE&rft.spage=312&rft.epage=315&rft_id=info:doi/10.1109%2FPEEIC59336.2023.10451557&rft.externalDocID=10451557