SeMLAS: An Efficient Secure Multi-Level Authentication Scheme for IoT-Based Smart Home Systems

Smart Home Networks (SHNs) are attracting increasing interest in the research, development, and professional communities, particularly with the fast adoption of Internet of Things (IoT) devices. However, because of the limited processing, storage, and communication capabilities of these devices as well as their proprietary technologies, SHNs are getting vulnerable to numerous security threats that can adversely affect their proper functioning. Granting access to the legitimate users/entities is, therefore, essential to prevent illegitimate users from unauthorized use of the available resources. We argue that current access control schemes are not suitable for IoT-based SHN. We, therefore, propose in this paper a novel Secure Multi-Level Authentication Scheme (SeMLAS) based on software mobile agents. In addition to enabling secure authentication between external peers and nodes at different hierarchical level of the SHN, our scheme can shorten the authentication process and detect malicious nodes via an appropriate use of mobile agents. The performance analysis of the implementation of SeMLAS with the NS2 tool is showing promising results. Indeed, compared with the OTP and TinyPK schemes, SeMLAS is achieving 48% and 24% less in terms of communication overhead and total energy consumption respectively.

[1]  Ioannis G. Askoxylakis,et al.  XSACd - Cross-domain resource sharing & access control for smart environments , 2018, Future Gener. Comput. Syst..

[2]  Vipin Swarup,et al.  Authentication for Mobile Agents , 1998, Mobile Agents and Security.

[3]  Ian T. Downard,et al.  Simulating Sensor Networks in NS-2 , 2004 .

[4]  Li Wei,et al.  Key Management Protocol for WSN Based on ECC , 2010 .

[5]  Qing Chang,et al.  A node authentication protocol based on ECC in WSN , 2010, 2010 International Conference On Computer Design and Applications.

[6]  Xiaojiang Du,et al.  A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications , 2013, IEEE Sensors Journal.

[7]  Yuan-Ting Zhang,et al.  A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network , 2016, Sensors.

[8]  Aref Meddeb,et al.  A secure electric energy management in smart home , 2017, Int. J. Commun. Syst..

[9]  James Newsome,et al.  Access right assignment mechanisms for secure home networks , 2011, Journal of Communications and Networks.

[10]  Shen Guicheng,et al.  Application of Elliptic Curve Cryptography in Node Authentication of Internet of Things , 2013, 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[11]  Robert H. Deng,et al.  Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control , 2018, IEEE Internet of Things Journal.

[12]  P. Balamuralidhar,et al.  One time password authentication scheme based on elliptic curves for Internet of Things (IoT) , 2015, 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW).

[13]  Qiuhua Wang,et al.  A digital memories based user authentication scheme with privacy preservation , 2017, PloS one.

[14]  Ivan Stojmenovic Access Control in Distributed Systems: Merging Theory with Practice , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[15]  Hajar Mousannif,et al.  Access control in the Internet of Things: Big challenges and new opportunities , 2017, Comput. Networks.

[16]  Roksana Boreli,et al.  An experimental study of security and privacy risks with emerging household appliances , 2014, 2014 IEEE Conference on Communications and Network Security.

[17]  Jian Shen,et al.  A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks , 2017, Future Gener. Comput. Syst..