User Authentication Using Neural Network in Smart Home Networks

Security has been an important issue in the smart home applications. In home networks with distributed architectures that consist of a broad range of wired or wireless devices, it is likely that unauthorized access to some restricted data or devices may occur. Therefore, it becomes important to consider issues of security, authentication and access control. The authentication and authorization of users in smart environments are the key factors in the security of home networks. User authentication has been traditionally based on PIN, password, key, smart card or biometrics. Password-based authentication is widely used to identify legitimate users, because passwords are cheap, easy and reasonably accurate. In conventional password-based authentication methods, passwords store as a password or verification table. These methods use some encryption algorithms to prevent the passwords from being revealed, but they are still vulnerable. In this paper, we train a neural network to store encrypted passwords and use it instead of the password or verification table. This proposed method can solve the security problems in some authentication system and can be used to store the user profiles and access controls in smart home networks.

[1]  Mohammad S. Obaidat,et al.  Dimensionality reduction and feature extraction applications in identifying computer users , 1991, IEEE Trans. Syst. Man Cybern..

[2]  Ralph C. Merkle,et al.  A fast software one-way hash function , 1990, Journal of Cryptology.

[3]  Edwin Weiss,et al.  A user authentication scheme not requiring secrecy in the computer , 1974, Commun. ACM.

[4]  Udi Manber,et al.  A simple scheme to make passwords based on one-way functions much harder to crack , 1996, Comput. Secur..

[5]  John Moody,et al.  Fast Learning in Networks of Locally-Tuned Processing Units , 1989, Neural Computation.

[6]  Daniel Klein,et al.  Foiling the cracker: A survey of, and improvements to, password security , 1992 .

[7]  Min-Shiang Hwang,et al.  A user authentication system using back-propagation network , 2002, Neural Computing & Applications.

[8]  Sugata Sanyal,et al.  A new protocol to counter online dictionary attacks , 2006, Comput. Secur..

[9]  Ralph C. Merkle,et al.  One Way Hash Functions and DES , 1989, CRYPTO.

[10]  Ivan Damgård,et al.  A Design Principle for Hash Functions , 1989, CRYPTO.

[11]  Heekuck Oh,et al.  Neural Networks for Pattern Recognition , 1993, Adv. Comput..

[12]  Ken Thompson,et al.  Password security: a case history , 1979, CACM.

[13]  D. Broomhead,et al.  Radial Basis Functions, Multi-Variable Functional Interpolation and Adaptive Networks , 1988 .

[14]  David S. Broomhead,et al.  Multivariable Functional Interpolation and Adaptive Networks , 1988, Complex Syst..