Browse > Article
http://dx.doi.org/10.5762/KAIS.2018.19.10.661

Device Mutual Authentication and Key Management Techniques in a Smart Home Environment  

Min, So-Yeon (Dept. of Information and Communication Eng., Seoil University)
Lee, Jae-Seung (Dept. of Computer Science and Eng., Soongsil University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.19, no.10, 2018 , pp. 661-667 More about this Journal
Abstract
Recently, the smart home market is growing due to the development of wireless communication technology and sensor devices, and various devices are being utilized. Such an IoT environment collects various vast amount of device information for intelligent services, receives services based on user information, controls various devices, and provides communication between different types of devices. However, with this growth, various security threats are occurring in the smart home environment. In fact, Proofpoint and HP warned about the cases of damage in a smart home environment and the severity of security vulnerabilities, and cases of infringement in various environments were announced. Therefore, in this paper, we have studied secure mutual authentication method between smart nodes used in smart home to solve security problems that may occur in smart home environment. In the case of the proposed thesis, security evaluations are performed using random numbers and frequently updated session keys and secret keys for well-known vulnerabilities that can occur in IoT environments and sensor devices such as sniffing, spoofing, device mutual authentication, And safety. In addition, it is confirmed that it is superior in security and key management through comparison with existing smart home security protocol.
Keywords
Smart Home; Smart Home Authentication; Smart Home Security; Device Authentication; IoT Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 YOON, Seokung; PARK, Haeryong; YOO, Hyeong Seon. Security issues on smarthome in IoT environment. In: Computer science and its applications. Springer, Berlin, Heidelberg, pp. 691-696, 2015. DOI: https://doi.org/10.1007/978-3-662-45402-2_97
2 ROBLES, Rosslin John, et al. A review on security in smart home development. International Journal of Advanced Science and Technology, 2010.
3 KOMNINOS, Nikos; PHILIPPOU, Eleni; PITSILLIDES, Andreas. Survey in smart grid and smart home security: Issues, challenges and countermeasures. IEEE Communications Surveys & Tutorials, 16.4: 1933-1954, 2014. DOI: https://doi.org/10.1109/comst.2014.2320093   DOI
4 FERNANDES, Earlence; JUNG, Jaeyeon; PRAKASH, Atul. Security analysis of emerging smart home applications. In: 2016 IEEE Symposium on Security and Privacy (SP). IEEE, pp. 636-654, 2016. DOI: https://doi.org/10.1109/sp.2016.44
5 MOWAD, Mohamed Abd El-Latif; FATHY, Ahmed; HAFEZ, Ahmed. Smart home automated control system using android application and microcontroller. International Journal of Scientific & Engineering Research, 5.5: 935-939, 2014.
6 SCHNEPS-SCHNEPPE, Manfred, et al. Wired Smart Home: energy metering, security, and emergency issues. In: Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2012 4th International Congress on. IEEE, pp. 405-410, 2012. DOI: https://doi.org/10.1109/icumt.2012.6459700
7 MANTAS, Georgios; LYMBERO POULOS, Dimitrios; KOMNINOS, Nikos. Security in smart home environment. In: Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications. IGI Global, pp. 170-191, 2011. DOI: https://doi.org/10.4018/978-1-61520-805-0.ch010
8 FADELL, Anthony Michael, et al. Handling security services visitor at a smart-home. U.S. Patent Application No 14/587,835, 2015.
9 SIVARAMAN, Vijay, et al. Network-level security and privacy control for smart-home IoT devices. In: Wireless and Mobile Computing, Networking and Communications (WiMob), 2015 IEEE 11th International Conference on. IEEE, pp. 163-167, 2015. DOI: https://doi.org/10.1109/wimob.2015.7347956
10 YE, Xiaojing; HUANG, Junwei. A framework for cloud-based smart home. In: Computer science and network technology (ICCSNT), 2011 international conference on. IEEE, pp. 894-897. 2011. DOI: https://doi.org/10.1109/iccsnt.2011.6182105
11 JOSE, Arun Cyril; MALEKIAN, Reza. Smart home automation security. SmartCR, 5.4: 269-28, 2015. DOI: https://doi.org/10.6029/smartcr.2015.04.004
12 J.Zhu and J.Ma, A new authentication scheme with anonymity for wireless environments, IEEE Transactions on Communications, Vol. 50, No.1, pp.231-235, 2004. DOI: https://doi.org/10.1109/tce.2004.1277867
13 Farash, Mohammad Sabzinejad, Turkanovic Muhamed, Kumari Saru, and Marko Holbl. "An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment." Ad Hoc Networks 36 152-176, 2016. DOI: https://doi.org/10.1016/j.adhoc.2015.05.014   DOI
14 C.-C.Wu, W.-B.Lee, and W.-J.Tsaur," A secure authentication scheme with anonymity for wireless communications", IEEE Communications Letters,Vol. 12, No.10, pp.722-723, 2008. DOI: https://doi.org/10.1109/lcomm.2008.080283   DOI
15 Qinghua Li and Guohong Cao, "Multicast Authentication in the Smart Grid With One-Time Signature", IEEE Transactions on Smart Grid, 2(4), 2011. DOI: https://doi.org/10.1109/tsg.2011.2138172