Scalable, password-based and threshold authentication for smart homes

نویسندگان

چکیده

Abstract Smart homes are a special use-case of the IoT paradigm, which is becoming more and important in our lives. Although sensors, devices applications make daily lives easier, they often collect sensitive data, may lead to security problems (e.g., hacked devices, botnets, etc.). In several cases, appropriate mechanisms missing within devices. Therefore, measures have become central topic field IoT. The most essential requirements secure user–device authentication confidentiality transferred data. Passwords widely used factors various areas, such as user authentication, key establishment, also secret sharing. Password-based protocols that resistant typical threats, offline dictionary, man-in-the-middle phishing attacks, generate new session keys. major aim these solutions guarantee high-level security, even if applies single low-entropy human memorable password for all their accounts. We introduce threshold password-based, distributed, mutual authenticated agreement with confirmation protocol smart home environment. proposed scalable robust scheme, forces adversary corrupt $$l-1$$ l - 1 where l threshold, order perform an dictionary attack. designed achieve password-only setting, end-to-end chosen besides user. provide analysis AVISPA. apply on-the-fly model checker constraint-logic-based attack searcher verification bounded numbers sessions. show provides secrecy device manager. Since efficiency crucial aspect, we implemented measure computation communication costs demonstrate solution eligible homes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Scalable Password-Changing Protocol for Smart Grid Device Authentication

In smart grid, the scale of pole devices that monitor the health of power lines is already large, and with the upgrade of the smart grid, the number of these resource-constrained devices is further increasing. These devices are easy targets to security attacks due to wireless access communication and due to weak passwords used to access and read telemetric data by the pole maintenance personnel...

متن کامل

Threshold Password-Based Authentication Using Bilinear Pairings

We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private key from remote servers with knowledge of only his identity and password. He does not carry the smart card storing user’s private information. We note that as a goal of a multi-server roaming system, a protocol has to a...

متن کامل

Cryptanalysis of a smart card based secure password authentication scheme

Recently, Wang and Chang proposed a password authentication scheme is embedded in a smart card. This new verifier authenticates the login password key in without password table adoption. The safety aspects for this protocol were constructed on the basis of intensity factors and discrete logarithm. Nonetheless, in the year of 2008, Yoon et al. pointed out that there was a security loophole withi...

متن کامل

Comments on Five Smart Card Based Password Authentication Protocols

In this paper, we use the ten security requirements proposed by Liao et al. for a smart card based authentication protocol to examine five recent work in this area. After analyses, we found that the protocols of Juang et al.¡s , Hsiang et al.¡s, Kim et al.¡s, and Li et al.¡s all suffer from offline password guessing attack if the smart card is lost, and the protocol of Xu et al.¡s is subjected ...

متن کامل

Improving the Password-Based Authentication against Smart Card Security Breach

Password-based authentications using smart cards are very necessary between login users and a remote server. Smart card security breach threatens the security of password-based authentication schemes with smart cards. A password-based authentication scheme with smart cards against smart card security breach was proposed by C.T. Li et al. recently. However, it is noted that Li et al.'s scheme ne...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Information Security

سال: 2022

ISSN: ['1615-5262', '1615-5270']

DOI: https://doi.org/10.1007/s10207-022-00578-7