Trust-Based Authentication for Smart Home Systems

Smart home systems are developed to interconnect and automate household appliances and create ubiquitous home services. Such a system is mainly driven by the communications among Internet-of-Things (IoT) objects along with Radio Frequency IDentification (RFID) technologies, where the RFID techniques in the IoT network are commonly prone to malicious attacks due to the inherent weaknesses of underlying wireless radio communications. Thus, it causes the smart home systems vulnerable to some active attacks such as the jamming and cloning attacks, which in turn threaten to home breach and personal information disclosure. This paper therefore proposes a new trust-based authentication scheme to effectively address two typical attacks, jamming and cloning attacks, in smart home environment. The evaluation shows that our solution can significantly reduce the authentication failure in jamming attacks, increase the detection probability of cloning attacks, and improve the authentication efficiency to manage the authentication delay in a reasonable time.

[1]  Mouzhi Ge,et al.  Enhanced network intrusion detection system protocol for internet of things , 2020, SAC.

[2]  Tassos Dimitriou,et al.  A secure and efficient RFID protocol that could make big brother (partially) obsolete , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).

[3]  Kevin Bouchard,et al.  Exploiting Passive RFID Technology for Activity Recognition in Smart Homes , 2015, IEEE Intelligent Systems.

[4]  Ahmed Khattab,et al.  RFID Security Threats and Basic Solutions , 2017 .

[5]  Jiann-Liang Chen,et al.  Architecture design and performance evaluation of RFID object tracking systems , 2007, Comput. Commun..

[6]  Willy Susilo,et al.  Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment , 2020, IEEE Transactions on Dependable and Secure Computing.

[7]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[8]  Sheikh Iqbal Ahamed,et al.  AnonPri: A secure anonymous private authentication protocol for RFID systems , 2017, Inf. Sci..

[9]  Nei Kato,et al.  State-of-the-Art Deep Learning: Evolving Machine Intelligence Toward Tomorrow’s Intelligent Network Traffic Control Systems , 2017, IEEE Communications Surveys & Tutorials.

[10]  Yuxiang Chen,et al.  IoT-based smart homes: A review of system architecture, software, communications, privacy and security , 2018, Internet Things.

[11]  Chih-Ming Hsiao,et al.  A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol , 2014, Ad Hoc Networks.

[12]  Kire Trivodaliev,et al.  A review of Internet of Things for smart home: Challenges and solutions , 2017 .

[13]  Saraju P. Mohanty,et al.  iTour: The Future of Smart Tourism: An IoT Framework for the Independent Mobility of Tourists in Smart Cities , 2018, IEEE Consumer Electronics Magazine.

[14]  Muhammad Asadullah,et al.  An overview of home automation systems , 2016, 2016 2nd International Conference on Robotics and Artificial Intelligence (ICRAI).

[15]  Jian Shen,et al.  Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks , 2018, J. Netw. Comput. Appl..

[16]  Gul N. Khan,et al.  Secure authentication scheme for passive C1G2 RFID tags , 2012, Comput. Networks.

[17]  Mouzhi Ge,et al.  Self-adaptive RFID Authentication for Internet of Things , 2019, AINA.

[18]  Min Chen,et al.  An Efficient Anonymous Authentication Protocol for RFID Systems Using Dynamic Tokens , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.

[19]  Donggang Liu,et al.  Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.

[20]  Carelin Felix,et al.  Home automation using GSM , 2011, 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies.

[21]  Andrei Gurtov,et al.  Anonymous Secure Framework in Connected Smart Home Environments , 2017, IEEE Transactions on Information Forensics and Security.

[22]  Atul Prakash,et al.  Security Implications of Permission Models in Smart-Home Application Frameworks , 2017, IEEE Security & Privacy.

[23]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[24]  Jong Hyuk Park,et al.  SH-SecNet: An enhanced secure network architecture for the diagnosis of security threats in a smart home , 2017 .

[25]  Aref Meddeb,et al.  A secure electric energy management in smart home , 2017, Int. J. Commun. Syst..

[26]  Wanlei Zhou,et al.  Detecting unauthorized RFID tag carrier for secure access control to a smart building , 2018 .

[27]  Yuan-Ting Zhang,et al.  A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network , 2016, Sensors.

[28]  Mohsen Machhout,et al.  Security Enhancements of a Mutual Authentication Protocol Used in a HF Full-Fledged RFID Tag , 2018, Journal of Electronic Testing.

[29]  Moussa Ayyash,et al.  Spectrum Assignment in Cognitive Radio Networks for Internet-of-Things Delay-Sensitive Applications Under Jamming Attacks , 2018, IEEE Internet of Things Journal.

[30]  Andrei Gurtov,et al.  Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments , 2016, IEEE Sensors Journal.

[31]  Abdelmalek Azizi,et al.  Internet of things security , 2017, 2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS).

[32]  Mouzhi Ge,et al.  An Efficient Mutual Authentication Scheme for Internet of Things , 2020, Internet Things.

[33]  Priti Maheshwary,et al.  Internet of Things (IoT) for building smart home system , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[34]  Erhan Guven,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.

[35]  Anastasios A. Economides,et al.  Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information , 2015, Expert Syst. Appl..

[36]  Donggang Liu,et al.  Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.

[37]  Nafaâ Jabeur,et al.  Toward Enforcing Security in Smart Homes Using a Trust-Based Scheme , 2020, AINA Workshops.

[38]  Tao Lin,et al.  An Enhanced Q Algorithm Based on EPC-C1G2 RFID Protocol , 2016 .

[39]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[40]  Mouzhi Ge,et al.  Big Data for Internet of Things: A Survey , 2018, Future Gener. Comput. Syst..

[41]  Christof Weinhardt,et al.  A blockchain-based smart grid: towards sustainable local energy markets , 2017, Computer Science - Research and Development.

[42]  Teerawat Issariyakul,et al.  Introduction to Network Simulator NS2 , 2008 .

[43]  Walaa Hamouda,et al.  A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems , 2018, IEEE Communications Surveys & Tutorials.

[44]  B. B. Gupta,et al.  Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags , 2017, The Journal of Supercomputing.