Acknowledgement
The authors gratefully acknowledge the approval and the support of this research study by grant no. SAT-2018-3-9-F-7828 from the Deanship of Scientific Research at Northern Border University, Arar, K.S.A.
References
- Y., X. Dong, Sun, and W. Chang, "Influence of characteristics of the Internet of Things on consumer purchase intention", Social Behavior and Personality: an international journal, vol. 42, no. 2, pp. 321-330, 2014 https://doi.org/10.2224/sbp.2014.42.2.321
- M. Noack, "Optimization of Two-Way Authentication Protocol in Internet of Things", 2014.
- Pardeep Kumar, An Braeken, Andrei Gurtov, Jari Iinatti, and Phuong Hoai Ha, Anonymous Secure Framework in Connected Smart Home Environments, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 12, NO. 4, APRIL 2017
- Bogdan-Cosmin Chifora Ion Bica, Victor-Valeriu Patriciua, Florin Pop, A security authorization scheme for smart home Internet of Things devices, Future Generation Computer Systems, Volume 86, September 2018, Pages 740-749 https://doi.org/10.1016/j.future.2017.05.048
- Tao, M.; Ota, K.; Dong, M. Ontology-based data semantic management and application in IoT- and cloud-enabled smart homes. Future Gener. Comput. Syst. 2017, 76, 528-539. https://doi.org/10.1016/j.future.2016.11.012
- Qu, C.; Tao, M.; Yuan, R. A Hypergraph-Based Blockchain Model and Application in Internet of Things-Enabled Smart Homes. Sensors 2018, 18, 2784. https://doi.org/10.3390/s18092784
- Bertino, E. Data security and privacy in the IoT. In Proceedings of the 19th International Conference on Extending Database Technology, Bordeaux, France, 15-18 March 2016; pp. 1-3.
- Ala Al-Fuqaha ; Mohsen Guizani ; Mehdi Mohammadi ; Mohammed Aledhari ; Moussa Ayyash, Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications, IEEE Communications Surveys & Tutorials, 2015, Volume: 17 , Issue: 4, 2347 - 2376. https://doi.org/10.1109/COMST.2015.2444095
- Mussab Alaa, A.A. Zaidan, B.B. Zaidan, Mohammed Talal, and M.L.M. Kiah, A review of smart home applications based on Internet of Things, Journal of Network and Computer Applications, Volume 97, 1 November 2017, Pages 48-65. https://doi.org/10.1016/j.jnca.2017.08.017
- Barnana Baruah, Subhasish Dhal, A two-factor authentication scheme against FDM attack in IFTTT based Smart Home System, Computers & Security, Volume 77, August 2018, Pages 21-35 https://doi.org/10.1016/j.cose.2018.03.004
- Kuen-Min Lee ; Wei-Guang Teng ; Ting-Wei Hou, Point-n-Press: An Intelligent Universal Remote Control System for Home Appliances, IEEE Transactions on Automation Science and Engineering, July 2016, ( Volume: 13 , Issue: 3, Page(s): 1308 - 1317. https://doi.org/10.1109/TASE.2016.2539381
- Fernandes, Rahmati, Jung, & Prakash Fernandes E, Rahmati A, Jung J, Prakash A. Decoupled-IFTTT: Constraining privilege in trigger-action platforms forthe internet of things, 2017, arXiv:1707.00405 [cs.CR].
- Min, and Varadharajan, B. Min, V. Varadharajan, Design and analysis of a new feature-distributed malware, Proceedings of the IEEE thirteenth international conference on trust, security and privacy in computing and communications (2014), pp. 457-464.
- K. Bhargavan, A.D. Lavaud, C. Fournet, A. Pironti, P.Y. Strub, Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS Proceedings of the IEEE symposium on security and privacy (2014), pp. 98-113
- J. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute-based encryption, in: 2007 IEEE Symposium on Security and Privacy (SP'07), IEEE, 2007, pp. 321-334.
- F. Stajano, Pico: No more passwords!, in: International Workshop on Security Protocols, Springer, 2011, pp. 49-81.
- Yeh, H.L., Chen, T.H., Liu, P.C., Kim, T.H., Wei, H.W., 2011. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.Sensors 11 (5), 4767-4779. https://doi.org/10.3390/s110504767
- Z. Shelby, K. Hartke, and C. Bormann, The constrained application protocol (CoAP), 2014, https://tools.ietf.org/html/rfc7252.
- M. Sethi, E. Oat, M. Di Francesco, T. Aura, Secure bootstrapping of cloudmanaged ubiquitous displays, in: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, in: UbiComp'14, ACM, New York, NY, USA, 2014, pp. 739-750.
- M. Yoon, J. Baek, A study on framework for developing secure IoT service, in: Advances in Computer Science and Ubiquitous Computing, Springer, 2015, pp. 289-294.
- L. Barreto, A. Celesti, M. Villari, M. Fazio, A. Puliafito, An authentication model for IoT clouds, in: Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, ACM, 2015, pp. 1032-1035.
- H. Tschofenig, Fixing user authentication for the internet of things (IoT), Datenschutz und Datensicherheit-DuD 40 (4) (2016) 222-224. https://doi.org/10.1007/s11623-016-0582-1
- A.F.A. Rahman, M. Daud, M.Z. Mohamad, Securing sensor to cloud ecosystem using internet of things (IoT) security framework, in: Proceedings of the International Conference on Internet of Things and Cloud Computing, ACM, 2016, p. 79.
- T. Abera, N. Asokan, L. Davi, F. Koushanfar, A. Paverd, A.-R. Sadeghi, G. Tsudik, Invited-things, trouble, trust: on building trust in IoT systems, in: Proceedings of the 53rd Annual Design Automation Conference, ACM, 2016, p. 121.
- G. Alpar, L. Batina, L. Batten, V. Moonsamy, A. Krasnova, A. Guellier, I. Natgunanathan, New directions in IoT privacy using attribute-based authentication, in: Proceedings of the ACM International Conference on Computing Frontiers, ACM, 2016, pp. 461-466
- Amin, R., Biswas, G.P., 2016. A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad HocNetw. 36, 58-80.
- Das, A.K., Sutrala, A.K., Kumari, S., Odelu, V., Wazid, M., Li, X., 2016. An efficientmulti-gateway-based three-factor user authentication and key agreementscheme in hierarchical wireless sensor networks. Secur. Commun. Networks 9(13), 2070-2092. https://doi.org/10.1002/sec.1464
- Chifor, B.C., Bica, I., Patriciu, V.V. and Pop, F., 2018. A security authorization scheme for smart home Internet of Things devices. Future Generation Computer Systems, 86, pp.740-749. https://doi.org/10.1016/j.future.2017.05.048
- Mishra, D., Vijayakumar, P., Sureshkumar, V., Amin, R., Islam, SK.H., Gope, P., 2018.Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multimedia Tools Appl.77(14),18295-18325. https://doi.org/10.1007/s11042-017-5376-4
- Wu, F., Li, X., Sangaiah, A.K., Xu, L., Kumari, S., Wu, L., Shen, J., 2018. A lightweightand robust two-factor authentication scheme for personalized healthcaresystems using wireless medical sensor networks. Future Generat. Comp. Syst.82, 727-737. https://doi.org/10.1016/j.future.2017.08.042
- Kazmi, S., Javaid, N., Mughal, M.J., Akbar, M., Ahmed, S.H., Alrajeh, N., 2019. Toward the optimization of metaheuristic algorithms for IoT-enabled smart homestargeting balanced demand and supply of energy. IEEE Access 7, 24267-24281. https://doi.org/10.1109/access.2017.2763624
- Shin, S., Kwon, T., 2019. A lightweight three-factor authentication and keyagreement scheme in wireless sensor networks for smart homes. Sensors 19(9), 2012-2036. https://doi.org/10.3390/s19092012
- Shidik, G., Kusuma, E., Nuraisha, S., Andono, P., 2019. Heuristic vs. Meta heuristic method: improvement of spoofed fingerprint identification in IoT devices. Int.Rev. Modell. Simul. (IREMOS) 12 (3), 168-175 https://doi.org/10.15866/iremos.v12i3.17330
- Alshahrani, M., Traore, I., 2019. Secure mutual authentication and automated accesscontrol for IoT smart home using cumulative keyed-hash chain. J. Inf. SecurityAppl. 45, 156-175.
- Khan, A.A., Kumar, V., Ahmad, M., 2019. An elliptic curve cryptography basedmutual authentication scheme for smart grid communications using biometricapproach. J. King Saud Univ.-Comp. Inf. Sci., 1-8
- Bae, W.I., Kwak, J., 2020. Smart card-based secure authentication protocol in multi-server IoT environment. Multimedia Tools Appl. 79 (23-24), 15793-15811. https://doi.org/10.1007/s11042-017-5548-2
- Naresh, V.S., Reddi, S., Murthy, N.V.E.S., 2020. Provable secure lightweight multiple-shared key agreement based on hyper elliptic curve Diffie-Hellman for wirelesssensor networks. Inf. Sec. J.: Global Perspective 29 (1), 1-13 https://doi.org/10.1080/19393555.2019.1708516
- Santos-Gonzalez, I., Rivero-Garcia, A., Burmester, M., Munilla, J., Caballero-Gil, P.,2020. Secure lightweight password authenticated key exchange for heterogeneous wireless sensor networks. Inf. Syst. 88, 101423-101434 https://doi.org/10.1016/j.is.2019.101423
- Shahidinejad, A., Ghobaei-Arani, M., Souri, A., Shojafar, M., Kumari, S., 2021. Light-edge: A lightweight authentication protocol for IoT devices in an edge-cloudenvironment. IEEE Consum. Electron. Mag. 1-1. https://doi.org/10.1109/MCE.2017.2770231
- Masud, M., Gaba, G.S., Choudhary, K., Hossain, M.S., Alhamid, M.F., Muhammad, G.,2021. Lightweight and anonymity-preserving user authentication scheme forIoT-based healthcare. IEEE Internet Things J. 1-1.
- Silva, D.; Carvalho, L.I.; Soares, J.; Sofia, R.C. A Performance Analysis of Internet of Things Networking Protocols: Evaluating MQTT, CoAP, OPC UA. Appl. Sci. 2021, 11, 4879. https://doi.org/10.3390/app11114879
- OASIS. AMQP Advanced Message Queuing Protocol. 2018. Available online: http://www.amqp.org/ (accessed on 20 Dec. 2021).
- OMG. DDS Data Distribution Service. Available online: http://portals.omg.org/dds/what-is-dds-3/ (accessed on 20 Dec. 2021).
- Hussain et al. "Protocol-aware radio frequency jamming in Wi-Fi and commercial wireless networks." Journal of communications and networks 16.4 (2014): 397-406. https://doi.org/10.1109/JCN.2014.000069
- Pettersson, William. "An Evaluation of IoT Protocol Efficiency and suitability: For smart vehicles, smart homes & industrial scenarios." (2021).
- Dian, F. John, Amirhossein Yousefi, and Sungjoon Lim. "A practical study on Bluetooth Low Energy (BLE) throughput." 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE, 2018.
- Pettersson, William. "An Evaluation of IoT Protocol Efficiency and suitability: For smart vehicles, smart homes & industrial scenarios." (2021).
- Kim, Taehong. "A study of the Z-wave protocol: implementing your own smart home gateway." 2018 3rd International Conference on Computer and Communication Systems (ICCCS). IEEE, 2018.
- Leonardi L, Lo Bello L, Battaglia F, Patti G. Comparative Assessment of the LoRaWAN Medium Access Control Protocols for IoT: Does Listen before Talk Perform Better than ALOHA? Electronics. 2020; 9(4):553. https://doi.org/10.3390/electronics9040553
- Hoyul Choi, Hyunsoo Kwon, Junbeom Hur, ''A Secure OTP Algorithm Using a Smartphone Application', IEEE Seventh International Conference on Ubiquitous and Future Networks ICUFN Aug - 2015, pp. 476-481.
- Kaspersky Report, "Kaspersky IoT cyberattacks report 2021" retrieved from https://www.kaspersky.com/about/press-releases, accessed on 10/12/2021.
- Lei et al. "The insecurity of home digital voice assistants-vulnerabilities, attacks, and countermeasures." 2018 IEEE Conference on Communications and Network Security (CNS). IEEE, 2018.
- Velsquez, Ignacio, Anglica Caro, and Alfonso Rodrguez. "Authentication schemes and methods." Information and Software Technology 94.C (2018): 30-37. https://doi.org/10.1016/j.infsof.2017.09.012
- Pal, Debajyoti, Xiangmin Zhang, and Saeed Siyal. "Prohibitive factors to the acceptance of Internet of Things (IoT) technology in society: A smart-home context using a resistive modelling approach." Technology in Society 66 (2021): 101683. https://doi.org/10.1016/j.techsoc.2021.101683
- Kaur, Damandeep, and Devender Kumar. "Cryptanalysis and improvement of a two-factor user authentication scheme for smart home." Journal of Information Security and Applications 58 (2021): 102787. https://doi.org/10.1016/j.jisa.2021.102787
- Zou et al. "A Robust Two-Factor User Authentication Scheme-Based ECC for Smart Home in IoT." IEEE Systems Journal (2021).
- Yu, Sungjin, Namsu Jho, and Youngho Park. "Lightweight Three-Factor-Based Privacy-Preserving Authentication Scheme for IoT-Enabled Smart Homes." IEEE Access 9 (2021): 126186-126197. https://doi.org/10.1109/ACCESS.2021.3111443
- Shin, Sooyeon, and Taekyoung Kwon. "A lightweight three-factor authentication and key agreement scheme in wireless sensor networks for smart homes." Sensors 19.9 (2019): 2012. https://doi.org/10.3390/s19092012
- Satapathy, Utkalika, et al. "An ECC based lightweight authentication protocol for mobile phone in smart home." IEEE 13th international conference on industrial and information systems (ICIIS). IEEE, 2018.
- Liu, Yunqiang, et al. "An efficient privacy protection solution for smart home application platform." 2016 2nd IEEE International Conference on Computer and Communications (ICCC). IEEE, 2016.
- Batalla, Jordi Mongay, and Franciszek Gonciarz. "Deployment of smart home management system at the edge: mechanisms and protocols." Neural Computing and Applications 31.5 (2019): 1301-1315. https://doi.org/10.1007/s00521-018-3545-7
- Lu, Di, et al. "xTSeH: A trusted platform module sharing scheme towards smart IoT-eHealth devices." IEEE Journal on Selected Areas in Communications 39.2 (2020): 370-383.
- Al-Mutawa, Rihab Fahd, and Fathy Albouraey Eassa. "A smart home system based on internet of things." arXiv preprint arXiv:2009.05328 (2020).