Browse > Article
http://dx.doi.org/10.14400/JDC.2020.18.9.057

Privacy Vulnerability Analysis on Shuai et al.'s Anonymous Authentication Scheme for Smart Home Environment  

Choi, Hae-Won (Department of Innovation Management, DGIST)
Kim, Sangjin (Department of Aeronautical Computer Engineering, Kyungwoon University)
Jung, Young-Seok (Department of Aeronautical Computer Engineering, Kyungwoon University)
Ryoo, Myungchun (Department of Aeronautical Computer Engineering, Kyungwoon University)
Publication Information
Journal of Digital Convergence / v.18, no.9, 2020 , pp. 57-62 More about this Journal
Abstract
Smart home based on Internet of things (IoT) is rapidly emerging as an exciting research and industry field. However, security and privacy have been critical issues due to the open feature of wireless communication channel. As a step towards this direction, Shuai et al. proposed an anonymous authentication scheme for smart home environment using Elliptic curve cryptosystem. They provided formal proof and heuristic analysis and argued that their scheme is secure against various attacks including de-synchronization attack, mobile device loss attack and so on, and provides user anonymity and untraceability. However, this paper shows that Shuai et al.'s scheme does not provide user anonymity nor untraceability, which are very important features for the contemporary IoT network environment.
Keywords
Smart Home; Elliptic Curve Cryptosystem; Authentication; Privacy; Anonymity;
Citations & Related Records
Times Cited By KSCI : 7  (Citation Analysis)
연도 인용수 순위
1 H. Kim. (2017). Data Centric Security and Privacy Research Issues for Intelligent Internet of Things. ICSES Interdisciplinary Transactions on Cloud Computing, IoT, and Big Data, 1(1), 1-2.
2 Y. Kim. (2019). A Study on Smart Contract for Personal Information Protection. Journal of Digital Convergence, 17(3), 215-220.   DOI
3 H. Kim. (2019). Research Issues on Data Centric Security and Privacy Model for Intelligent Internet of Things based Healthcare. ICSES Transactions on Computer Networks and Communications, 5(2), 1-3.
4 B. Vaidya, J. H. Park, S. S. Yeo & J. Rodrigues. (2011). Robust one-time password authentication scheme using smart card for home network environment. Computer Communications, 34, 326-336.   DOI
5 H. J. Kim & H. S. Kim. (2011). Auth hotp-hotp based authentication scheme over home network environment. Lecture Notes in Computer Science, 6784, 622-637.
6 B. Vaidya, D. Makrakis & H. T. Mouftah. (2011). Device authentication mechanism for smart energy home area networks. Proc. of IEEE International Conference on Consumer Electronics, 787-788.
7 I. H. Cho & K. H. Lee. (2019). A Scheme of User Face Recognition using a Moire Phenomenon in IoT Environment. Journal of Digital Convergence, 17(2), 171-176.   DOI
8 F. K. Santoso & N. C. H. Vun. (2015). Securing IoT for smart home system, Proc. of IEEE International Symposium on Consumer Electronics, 1-2.
9 H. W. Choi, S. Kim & M. Ryoo. (2019). Cryptanalysis and Solution on Secure Communication Scheme for Healthcare System using Wearable Devices, Journal of Digital Convergence, 17(2), 187-194.   DOI
10 W. J. Lee, K. W. Kim & H. Kim. (2012). Ticket-Based Authentication Protocol Using Attribute Information over Home Network. IEMEK Journal of Embedded Systems Applications, 7(1), 53-59.   DOI
11 M. Shuai, N. Yu, H. Wang & L. Xiong. (2019). Anonymous authentication scheme for smart home environment with provable security. Computers & Security, 86, 132-146.   DOI
12 T. M. Song & S. H. Jang, (2011), u-Healthcare : Issue and Research Trends, Korea Institute for Health and Social Affairs, pp. 119-129.
13 H. Kim, E. K. Ryu & S. W. Lee, (2011), Security Considerations on Cognitive Radio based on Body Area Networks for u-Healthcare, Journal of Security Engineering, Vol. 10, No. 1, pp. 9-20.
14 S. Y. Mun, Y. M. Yun, T. H. Han, S. E. Lee, H. J. Chang, S. Y. Song&H. C. Kim, (2017),Public Awareness of Digital Healthcare Services, Journal of Digital Convergence, Vol. 18, No. 4, pp. 621-629.
15 J. E. Song, S. H. Kim, M. A. Chung & K. I, Chung, (2007), Security issues and its technology trends in u-Healthcare, Electronics and Telecommunications Trends, Vol. 22, No. 1, pp. 119-129.