Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2021.11.07.021

A Message Communication for Secure Data Communication in Smart Home Environment Based Cloud Service  

Park, Jung-Oh (Division of Paideia, Sungkyul University)
Publication Information
Journal of Convergence for Information Technology / v.11, no.7, 2021 , pp. 21-30 More about this Journal
Abstract
With the development of IoT technology, various cloud computing-based services such as smart cars, smart healthcare, smart homes, and smart farms are expanding. With the advent of a new environment, various problems continue to occur, such as the possibility of exposure of important information such as personal information or company secrets, financial damage cases due to hacking, and human casualties due to malicious attack techniques. In this paper, we propose a message communication protocol for smart home-based secure communication and user data protection. As a detailed process, secure device registration, message authentication protocol, and renewal protocol were newly designed in the smart home environment. By referring to the security requirements related to the smart home service, the stability of the representative attack technique was verified, and as a result of performing a comparative analysis of the performance, the efficiency of about 50% in the communication aspect and 25% in the signature verification aspect was confirmed.
Keywords
Message Protocol; IoT; Smart Home; Device Authrntication; Cloud Service;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 H. J. Mun. (2018). Biometric information and OTP based on Authentication Mechanism using Blockchain. Journal of convergence for Information Technology, 8(3), 85-90. DOI : 10.22156/CS4SMB.2018.8.3.085   DOI
2 B. R. Zebari, A. Abdulazeez, D. Zeebaree, D. Zebari & J. Saeed. (2020). A comprehensive review of dimensionality reduction techniques for feature selection and feature extraction. Journal of Applied Science and Technology Trends, 1(2), 56-70. DOI : 10.38094/jastt1224.   DOI
3 J. H. Han. (2016). Security Requirements for a Smart Home Service, TTAK.KO-10.0963. TTA.
4 V. Sivaraman et al. (2015, October). Network-level security and privacy control for smart-home IoT devices. In 2015 IEEE 11th International conference on wireless and mobile computing, networking and communications (WiMob) (pp. 163-167). IEEE. DOI : 10.1109/WiMOB.2015.7347956   DOI
5 D. H. Kim & J. Kwak. (2015). Design of Improved Authentication Protocol for Sensor Networks in IoT Environment. Journal of the Korea Institute of Information Security & Cryptology, 25(2), 467-478,   DOI
6 B. W. Jin, J. O. Park & M. S. Jun. (2016). Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments. Journal of the Korea Society of Digital Industry and Information Management, 12(1), 35-41. DOI : 10.17662/ksdim.2016.12.1.035   DOI
7 N. Komninos, E. Philippou & A. Pitsillides. (2014). Survey in smart grid and smart home security: Issues, challenges and countermeasures. IEEE Communications Surveys & Tutorials, 16(4), 1933-1954. DOI : 10.1109/COMST.2014.2320093   DOI
8 C. C. Wu, W. B. Lee & W. J. Tsaur. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 12(10), 722-723. DOI : 10.1109/LCOMM.2008.080283   DOI
9 B. Jin, D.Jung, S. Cha & M. Jun. (2016). Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments. Journal of the Korea Society of Digital Industry and Information Management, 12(1), 35-41. DOI : 10.17662/ksdim.2016.12.1.035   DOI
10 Z. N. Rashid, S. R. Zeebaree & A. Shengul, (2019). Design and analysis of proposed remote controlling distributed parallel computing system over the cloud. In 2019 International Conference on Advanced Science and Engineering (ICOASE) (pp. 118-123). IEEE.