Abstract
In today’s world, the use of computer networks is everywhere, and to access the home network we use the Internet. IoT networks are the new range of these networks in which we try to connect different home appliances and try to give commands from a remote place. Access to any device over an insecure network invites various types of attacks. User authentication can be performed using some password or biometric technique. However, when it comes to authenticating a device, it becomes challenging to maintain data security over a secure network such as the Internet. Many encryptions and decryption algorithms assert confidentiality, and hash code or message authentication code MAC is used for authentication. Traditional cryptographic security methods are expensive in terms of computational resources such as memory, processing capacity, and power consumption. They are incompatible with the Internet of Things devices that have limited resources. Although automatic Device-to-Device communication enables new potential applications, the limited resources of the networks’ machines and devices impose various constraints. This paper proposes a home device authentication scheme when these are accessed from a remote place. An authentication device is used for the home network and controller device to control home appliances. Our scheme can prevent various attacks such as replay attacks, server spoofing, and man-in-the-middle attack. The proposed scheme maintains the confidentiality and authenticity of the user and devices in the network. At the same time, we check the system in a simulated environment, and the results show that the network’s performance does not degrade much in terms of delay, throughput, and energy consumed.
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Software
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing IoT Devices Using Generative AI Techniques;Advances in Information Security, Privacy, and Ethics;2024-07-26
2. A hybrid encryption approach for efficient and secure data transmission in IoT devices;Journal of Engineering and Applied Science;2024-06-20
3. Blockchain-Enabled Authentication and Key Exchange for Enhancing User Privacy and Data Confidentiality in Smart Homes;2024 6th International Conference on Pattern Analysis and Intelligent Systems (PAIS);2024-04-24
4. Cybersecurity Measures for Logistics Industry;Advances in Information Security, Privacy, and Ethics;2024-02-02
5. Explainable AI for Cybersecurity;Advances in Computational Intelligence and Robotics;2024-01-18