A Lightweight Key Agreement Protocol Based on Chinese Remainder Theorem and ECDH for Smart Homes

Security and efficiency are the two main challenges for designing a smart home system. In this paper, by incorporating Chinese remainder theorem (CRT) into the elliptic curve Diffie–Hellman (ECDH), a lightweight key agreement protocol for smart home systems is constructed. Firstly, one-way hash authentication is used to identify the sensor nodes instead of mutual authentication to reduce the authentication cost. Secondly, the CRT is introduced to enhance the security of the original ECDH key agreement. Security analysis showed that the proposed protocol can validate the data integrity and resist the replay attack, the man-in-middle attack, and other attacks. Performance analysis and experiments showed that the protocol achieves high security with low communication and computation costs, and can be implemented in smart home systems.

[1]  Jian Shen,et al.  A lightweight multi-layer authentication protocol for wireless body area networks , 2018, Future Gener. Comput. Syst..

[2]  Mourad Debbabi,et al.  Communication security for smart grid distribution networks , 2013, IEEE Communications Magazine.

[3]  Francesco Palmieri,et al.  Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes , 2018, Future Gener. Comput. Syst..

[4]  Jongsung Kim,et al.  A secure ECC-based RFID mutual authentication protocol for internet of things , 2016, The Journal of Supercomputing.

[5]  R. G. V. Bramley,et al.  Farmer attitudes to the use of sensors and automation in fertilizer decision-making: nitrogen fertilization in the Australian grains sector , 2018, Precision Agriculture.

[6]  Kuldip Singh,et al.  A secure dynamic identity based authentication protocol for multi-server architecture , 2011, J. Netw. Comput. Appl..

[7]  Antonio Iera,et al.  Energy Efficient IoT Data Collection in Smart Cities Exploiting D2D Communications , 2016, Sensors.

[8]  Pardeep Kumar,et al.  Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.

[9]  Naixue Xiong,et al.  A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks , 2016, Sensors.

[10]  YoungHo Park,et al.  Cryptanalysis and improvement of an efficient two-party authentication key exchange protocol for mobile environment , 2018, 2018 International Conference on Electronics, Information, and Communication (ICEIC).

[11]  Charlie Wilson,et al.  Benefits and risks of smart home technologies , 2017 .

[12]  Michael Scott,et al.  Faster ECC over 픽2521-1 , 2014, IACR Cryptol. ePrint Arch..

[13]  Jian Shen,et al.  Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks , 2018, J. Netw. Comput. Appl..

[14]  Burak Kantarci,et al.  Cloud-centric multi-level authentication as a service for secure public safety device networks , 2016, IEEE Communications Magazine.

[15]  Ravi Kishore Kodali,et al.  ECDH based security model for IoT using ESP8266 , 2016, 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).

[16]  Hannu Tenhunen,et al.  End-to-end security scheme for mobility enabled healthcare Internet of Things , 2016, Future Gener. Comput. Syst..

[17]  Savvas Papagiannidis,et al.  A systematic review of the smart home literature: A user perspective , 2019, Technological Forecasting and Social Change.

[18]  Dao Shun Wang,et al.  A collaborative secret sharing scheme based on the Chinese Remainder Theorem. , 2019, Mathematical biosciences and engineering : MBE.

[19]  Prosanta Gope,et al.  A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks , 2016, IEEE Transactions on Industrial Electronics.

[20]  Jiguo Yu,et al.  A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes , 2016, 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI).

[21]  Antonio F. Gómez-Skarmeta,et al.  DCapBAC: embedding authorization logic into smart things through ECC optimizations , 2016, Int. J. Comput. Math..

[22]  Xiaofeng Yin,et al.  Stochastic Optimal Energy Management of Smart Home With PEV Energy Storage , 2018, IEEE Transactions on Smart Grid.

[23]  Guanhua Zhang,et al.  An efficient privacy protection solution for smart home application platform , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).

[24]  Jian Shen,et al.  Secure data uploading scheme for a smart home system , 2018, Inf. Sci..

[25]  Awais Ahmad,et al.  Real-time secure communication for Smart City in high-speed Big Data environment , 2017, Future Gener. Comput. Syst..

[26]  Ion Bica,et al.  A security authorization scheme for smart home Internet of Things devices , 2017, Future Gener. Comput. Syst..

[27]  Ying Wah Teh,et al.  Mining Personal Data Using Smartphones and Wearable Devices: A Survey , 2015, Sensors.

[28]  Zhibo Pang,et al.  Smart Homes for Elderly Healthcare—Recent Advances and Research Challenges , 2017, Sensors.

[29]  Vineet Sahula,et al.  Lightweight security algorithm for low power IoT devices , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).