Efficient Authentication Scheme for IoT in Smart Homes
In a smart home, all of the devices can talk to each other and the owner from anywhere in the world, thanks to the internet connection. The term "authentication" is used to describe the procedure of verifying the identity of a user, device, or other entity requesting access to, or interact...
Saved in:
Published in: | 2023 International Conference on Power Energy, Environment & Intelligent Control (PEEIC) pp. 312 - 315 |
---|---|
Main Authors: | , , , , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
19-12-2023
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | In a smart home, all of the devices can talk to each other and the owner from anywhere in the world, thanks to the internet connection. The term "authentication" is used to describe the procedure of verifying the identity of a user, device, or other entity requesting access to, or interaction with, the data, systems, and devices that make up an IoT smart home. By denying outsiders entry to the smart home's environs, it helps ensure the household's security and privacy. In this study, we present a fix that uses strong authentication security during the smart home setup procedure. The proposed technique proposed here involves inserting an authentication server in between the RFID tag and the RFID reader. When you log in, the server will carry out the authentication process on your behalf. By fusing the convenience of RFID with the security of elliptic curve encryption, this authentication method provides a robust access control solution for smart homes. This authentication mechanism can protect a smart home system from both jamming and cloning, two of the most common forms of attack. Our method has the potential to significantly reduce the number of failed authentication attempts due to jamming attacks, significantly increase the recognition likelihood of cloning attacks, and significantly recover authentication effectiveness to manage authentication delays in a reasonable amount of time, as shown by the results of the evaluation. |
---|---|
AbstractList | In a smart home, all of the devices can talk to each other and the owner from anywhere in the world, thanks to the internet connection. The term "authentication" is used to describe the procedure of verifying the identity of a user, device, or other entity requesting access to, or interaction with, the data, systems, and devices that make up an IoT smart home. By denying outsiders entry to the smart home's environs, it helps ensure the household's security and privacy. In this study, we present a fix that uses strong authentication security during the smart home setup procedure. The proposed technique proposed here involves inserting an authentication server in between the RFID tag and the RFID reader. When you log in, the server will carry out the authentication process on your behalf. By fusing the convenience of RFID with the security of elliptic curve encryption, this authentication method provides a robust access control solution for smart homes. This authentication mechanism can protect a smart home system from both jamming and cloning, two of the most common forms of attack. Our method has the potential to significantly reduce the number of failed authentication attempts due to jamming attacks, significantly increase the recognition likelihood of cloning attacks, and significantly recover authentication effectiveness to manage authentication delays in a reasonable amount of time, as shown by the results of the evaluation. |
Author | Saini, Parveen Kumar Srivastava, Animesh Kumar, Gautam Dhondiyal, Shiv Ashish Singh, Gulbir |
Author_xml | – sequence: 1 givenname: Animesh surname: Srivastava fullname: Srivastava, Animesh email: er.animesh10@gmail.com organization: Graphic Era Hill University,Department of Computer Science & Engineering,Dehradun – sequence: 2 givenname: Parveen Kumar surname: Saini fullname: Saini, Parveen Kumar email: parveen.e13339@cumail.in organization: Chandigarh University,Department of CSE,Mohali,Punjab – sequence: 3 givenname: Gulbir surname: Singh fullname: Singh, Gulbir email: gulbir.rkgit@gmail.com organization: MMICT&BM, Maharishi Markandeshwar (Deemed to be University),Mullana, Ambala,Haryana,India – sequence: 4 givenname: Gautam surname: Kumar fullname: Kumar, Gautam email: gautam.bopara@gmail.com organization: M.M. Institute of Computer Technology & Business Management, Maharishi Markandeshwar (Deemed to be University),Mullana, Ambala,Haryana,India – sequence: 5 givenname: Shiv Ashish surname: Dhondiyal fullname: Dhondiyal, Shiv Ashish email: shivashish1234@gmail.com organization: Graphic Era (Deemed to be University),Department of Computer Science & Engineering,Dehradun |
BookMark | eNo1j8FKxDAURSPoQsf5Axf5gda8pEn6lkOpTmFAwXE9ZDLvMQHbSCcu_HsL6urAXRzuuRPXU55ICAmqBlD4-Nr3Q2fRGFdrpU0NqrFgrb8Sa_TYGquM9d7hrXA9c4qJpiI3X-W8MMVQUp7kWzzTSJLzLIe8l2lZxjAXuc0jXe7FDYePC63_uBLvT_2-21a7l-eh2-yqBIClOjIGbsIphAiK2bQcm0CoGh1PClskC6i9suSJXWMdR7AukPekMOojm5V4-PUmIjp8zmm58H34zzE_ZLRE6w |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/PEEIC59336.2023.10451557 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library Online IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9798350357769 |
EndPage | 315 |
ExternalDocumentID | 10451557 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i119t-bf9af4adaac10ff38fc4ae9042cd0989e5192705e7ef6456fc156ae77e09c2bf3 |
IEDL.DBID | RIE |
IngestDate | Wed May 01 11:58:49 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i119t-bf9af4adaac10ff38fc4ae9042cd0989e5192705e7ef6456fc156ae77e09c2bf3 |
PageCount | 4 |
ParticipantIDs | ieee_primary_10451557 |
PublicationCentury | 2000 |
PublicationDate | 2023-Dec.-19 |
PublicationDateYYYYMMDD | 2023-12-19 |
PublicationDate_xml | – month: 12 year: 2023 text: 2023-Dec.-19 day: 19 |
PublicationDecade | 2020 |
PublicationTitle | 2023 International Conference on Power Energy, Environment & Intelligent Control (PEEIC) |
PublicationTitleAbbrev | PEEIC |
PublicationYear | 2023 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.9067556 |
Snippet | In a smart home, all of the devices can talk to each other and the owner from anywhere in the world, thanks to the internet connection. The term... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 312 |
SubjectTerms | Access control Authentication Cloning Cryptography Internet of Things Jamming RFID Scalability Servers Smart Home Smart homes |
Title | Efficient Authentication Scheme for IoT in Smart Homes |
URI | https://ieeexplore.ieee.org/document/10451557 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED7RTkyACOItD6wpSezE9lxS0QVVapHYKsc5Sx2aINr8f85OU8TAwGZZPlk--3QPf3cH8GSLKhOKY0zaycYC0caVq0jwaHUhjOUKQ-hiKd8-1Evpy-TEx1wYRAzgM5z4YfjLr1vb-VAZSbjwHUnkCEZSqz5Za0DnJPp5UZbzaU4euoceZHwyLP_VOCXojdnZP3c8h-gnA48tjrrlAk6wuYSiDPUeiIL5yJbH-fQBN7Yk1m-RkQHK5u2KbWhmS2-C-SbouwjeZ-Vq-hof-h7EmzTVe2KWNk6Y2hibJs5x5awwqEm8bJ1opZGsrkwmOUp0BRlAzpITZlBKTLTNKsevYNy0DV4DU0RIHlcltTOiylPDEYU2unahcpu8gcgfev3Zl7ZYD-e9_WP-Dk49az2eI9X3MN5_dfgAo13dPYbb-AbZOoyk |
link.rule.ids | 310,311,782,786,791,792,798,27934,54767 |
linkProvider | IEEE |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED7RMsAEiCDeeGBNycOJ47mkakWpKjVIbJHjnKUOTRFt_z9nhxQxMLBZlk-Wzz7dw9_dATzqtIp4FqNP2kn7HFH7lalI8Gh1ypWOM3Shi4WYvWfPuS2T4-9zYRDRgc9wYIfuL79e650NlZGEc9uRRPTgMOEiFW26VofPCeTTPM8nw4R8dAs-iOJBR_CrdYrTHKOTf-55Ct5PDh6b77XLGRxgcw5p7io-EAWzsS2L9GlDbmxBzF8hIxOUTdYFW9LMil4Fs23QNx68jfJiOPa_Ox_4yzCUW2KXVIarWikdBsbEmdFcoSQB03UgM4lkd0UiSFCgSckEMprcMIVCYCB1VJn4AvrNusFLYBkRks9VCWkUr5JQxYhcKlkbV7tNXIFnD11-tMUtyu6813_MP8DRuHidltPJ7OUGji2bLbojlLfQ337u8A56m3p3727mC3TEj_U |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+International+Conference+on+Power+Energy%2C+Environment+%26+Intelligent+Control+%28PEEIC%29&rft.atitle=Efficient+Authentication+Scheme+for+IoT+in+Smart+Homes&rft.au=Srivastava%2C+Animesh&rft.au=Saini%2C+Parveen+Kumar&rft.au=Singh%2C+Gulbir&rft.au=Kumar%2C+Gautam&rft.date=2023-12-19&rft.pub=IEEE&rft.spage=312&rft.epage=315&rft_id=info:doi/10.1109%2FPEEIC59336.2023.10451557&rft.externalDocID=10451557 |