Light Weight Authentication Scheme for Smart Home IoT Devices

نویسندگان

چکیده

In today’s world, the use of computer networks is everywhere, and to access home network we Internet. IoT are new range these in which try connect different appliances give commands from a remote place. Access any device over an insecure invites various types attacks. User authentication can be performed using some password or biometric technique. However, when it comes authenticating device, becomes challenging maintain data security secure such as Many encryptions decryption algorithms assert confidentiality, hash code message MAC used for authentication. Traditional cryptographic methods expensive terms computational resources memory, processing capacity, power consumption. They incompatible with Internet Things devices that have limited resources. Although automatic Device-to-Device communication enables potential applications, networks’ machines impose constraints. This paper proposes scheme accessed An controller control appliances. Our prevent attacks replay attacks, server spoofing, man-in-the-middle attack. The proposed maintains confidentiality authenticity user network. At same time, check system simulated environment, results show network’s performance does not degrade much delay, throughput, energy consumed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Rhythm-Based Authentication Scheme for Smart Media Devices

In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. ...

متن کامل

Smart Home Analysis in India:An IOT Perspective

This paper showcases the different technologies available for making one’s home a smarter one. Lately the world has witnessed a great surge in the field of automation. With the increase in living standards of people the demand for smart homes has accentuated. So keeping in mind three main concepts of a smart home that is energy, safety and comfort, the paper brief’s about smart homes as an appl...

متن کامل

Smart Card Authentication for Mobile Devices

While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorized use and access to a device’s contents. This paper describes two novel types of smart card with unconventional form factors, designed to take advantage of common interfaces built into many current handheld devices.

متن کامل

IoT Privacy and Security Challenges for Smart Home Environments

Often the Internet of Things (IoT) is considered as a single problem domain, with proposed solutions intended to be applied across a wide range of applications. However, the privacy and security needs of critical engineering infrastructure or sensitive commercial operations are very different to the needs of a domestic Smart Home environment. Additionally, the financial and human resources avai...

متن کامل

Integrated Fuzzy Control of Temperature, Light and Emergency Conditions for Smart Home Application

Smart home is composed of several controllers with different plants in control. If each controller works independently, without considering the mutual effect of the others in the control process, the whole system could definitely not converge to an optimum desired status and may not ever reach the demanded condition. The function of different controller system may has conflict In some condition...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cryptography

سال: 2022

ISSN: ['2410-387X']

DOI: https://doi.org/10.3390/cryptography6030037