Affiliation:
1. Department of Computer Science, College of Computer Science, King Khalid University, Abha 61421, Saudi Arabia
2. Department of Computer Science, University of Management and Technology, Lahore 54770, Pakistan
Abstract
Smart home environments are a vital component of the larger ecosystem within smart cities, aiming to revolutionize residential living through the integration of Internet of Things (IoT) devices and advanced technologies. However, ensuring robust security and preserving privacy in these interconnected ecosystems present significant challenges. During the monitoring and controlling tasks in the smart home environment, diverse commands are exchanged between the IoT device and the user over the public Internet. The public Internet is open and vulnerable to various security attacks, which can corrode the monitoring and controlling operation of the smart home. In addition, conventional security algorithms are inappropriate for IoT devices deployed in the smart home. However, various pernicious security attacks are equally efficacious in the resource-limited smart home environment. Thus, various authenticated encryption schemes are proposed to enable security services in resource-constricted smart home environments. This paper presents a lightweight and efficient authentication framework for a smart home environment by leveraging the features of an authenticated encryption scheme and the hash function called “ESCI-AKA”. ESCI-AKA checks the authenticity of the user at the local device and exchanges three messages among the user, gateway, and smart embedded device for establishing a secure channel for indecipherable communication by setting a session key. In addition, we corroborate the security of the established session key through the random oracle model and informal security analysis. Moreover, the Scyther tool is employed for the security validation of ESCI-AKA. Finally, the performance comparison of ESCI-AKA and other eminent security frameworks explicates that ESCI-AKA requires low computational and communication costs while providing robust security features.
Funder
Deanship of Scientific Research at King Khalid University
Subject
General Mathematics,Engineering (miscellaneous),Computer Science (miscellaneous)
Reference58 articles.
1. Current research on Internet of Things (IoT) security: A survey;Hassan;Comput. Netw.,2019
2. Internet of things (IoT) security dataset evolution: Challenges and future directions;Kaur;Internet Things,2023
3. Security for Smart Cities;Toh;IET Smart Cities,2020
4. Privacy and Security Concerns in the Smart City;Bogoni;Smart Cities,2023
5. Ragothaman, K., Wang, Y., Rimal, B., and Lawrence, M. (2023). Access control for IoT: A survey of existing research, dynamic policies and future directions. Sensors, 23.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献