Anonymous Secure Framework in Connected Smart Home Environments

The smart home is an environment, where heterogeneous electronic devices and appliances are networked together to provide smart services in a ubiquitous manner to the individuals. As the homes become smarter, more complex, and technology dependent, the need for an adequate security mechanism with minimum individual’s intervention is growing. The recent serious security attacks have shown how the Internet-enabled smart homes can be turned into very dangerous spots for various ill intentions, and thus lead the privacy concerns for the individuals. For instance, an eavesdropper is able to derive the identity of a particular device/appliance via public channels that can be used to infer in the life pattern of an individual within the home area network. This paper proposes an anonymous secure framework (ASF) in connected smart home environments, using solely lightweight operations. The proposed framework in this paper provides efficient authentication and key agreement, and enables devices (identity and data) anonymity and unlinkability. One-time session key progression regularly renews the session key for the smart devices and dilutes the risk of using a compromised session key in the ASF. It is demonstrated that computation complexity of the proposed framework is low as compared with the existing schemes, while security has been significantly improved.

[1]  Davar Pishva,et al.  A TOR-based anonymous communication approach to secure smart home appliances , 2015, 2015 17th International Conference on Advanced Communication Technology (ICACT).

[2]  Helena Szczerbicka,et al.  AIS for misbehavior detection in wireless sensor networks: Performance and design principles , 2007, 2007 IEEE Congress on Evolutionary Computation.

[3]  Uthpala Subodhani Premarathne,et al.  Reliable context-aware multi-attribute continuous authentication framework for secure energy utilization management in smart homes , 2015 .

[4]  Dimitrios Makrakis,et al.  Device authentication mechanism for Smart Energy Home Area Networks , 2011, 2011 IEEE International Conference on Consumer Electronics (ICCE).

[5]  Chuck Yoo,et al.  DAoT: Dynamic and energy-aware authentication for smart home appliances in Internet of Things , 2015, 2015 IEEE International Conference on Consumer Electronics (ICCE).

[6]  Ashok Kumar Das,et al.  A secure and effective biometric‐based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor , 2017, Int. J. Commun. Syst..

[7]  Meng Chang Chen,et al.  An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics , 2014, Expert Syst. Appl..

[8]  Sang Hyuk Son,et al.  The price of security in wireless sensor networks , 2010, Comput. Networks.

[9]  Seoung-Hyeon Lee,et al.  Secure firmware validation and update for consumer devices in home networking , 2016, IEEE Transactions on Consumer Electronics.

[10]  Fengtong Wen,et al.  An Improved Anonymous Authentication Scheme for Telecare Medical Information Systems , 2014, Journal of Medical Systems.

[11]  Jin Kwak,et al.  Secure Data Access Control Scheme for Smart Home , 2015, CSA/CUTE.

[12]  Freddy K. Santoso,et al.  Securing IoT for smart home system , 2015, 2015 International Symposium on Consumer Electronics (ISCE).

[13]  Feng Xia,et al.  Design and Implementation of a Wireless Sensor Network for Smart Homes , 2010, 2010 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing.

[14]  Antorweep Chakravorty,et al.  Privacy Preserving Data Analytics for Smart Homes , 2013, 2013 IEEE Security and Privacy Workshops.

[15]  Theodore Tryfonas,et al.  Life-logging in smart environments: Challenges and security threats , 2012, 2012 IEEE International Conference on Communications (ICC).

[16]  Daniel Mossé,et al.  Seamless Integration of Heterogeneous Devices and Access Control in Smart Homes , 2012, 2012 Eighth International Conference on Intelligent Environments.

[17]  Shuang-Hua Yang,et al.  A zigbee-based home automation system , 2009, IEEE Transactions on Consumer Electronics.

[18]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[19]  Guilin Zheng,et al.  Residential Appliances Identification and Monitoring by a Nonintrusive Method , 2012, IEEE Transactions on Smart Grid.

[20]  An Braeken,et al.  Efficient Anonym Smart Card Based Authentication Scheme for Multi-Server Architecture , 2015 .

[21]  G. W. Hart,et al.  Nonintrusive appliance load monitoring , 1992, Proc. IEEE.

[22]  Arindam Mukherjee,et al.  A Survey of Communications and Networking Technologies for Energy Management in Buildings and Home Automation , 2012, J. Comput. Networks Commun..

[23]  Andrei Gurtov,et al.  Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments , 2016, IEEE Sensors Journal.

[24]  Abdenour Bouzouane,et al.  Correct by Construction Security Approach to Design Fault Tolerant Smart Homes for Disabled People , 2013, EUSPN/ICTH.

[25]  Manik Lal Das,et al.  Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[26]  Ying-Tsung Lee,et al.  An integrated cloud-based smart home management system with community hierarchy , 2016, IEEE Transactions on Consumer Electronics.

[27]  Subhasish Banerjee,et al.  An Improved Smart Card based Anonymous Multi-Server Remote User Authentication Scheme , 2015 .

[28]  Erman Ayday,et al.  Secure Device Authentication Mechanisms for the Smart Grid-Enabled Home Area Networks , 2013 .

[29]  Sebastian Mödersheim,et al.  The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.

[30]  Donald E. Eastlake,et al.  US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.

[31]  Taeshik Shon,et al.  A novel secure key paring protocol for RF4CE ubiquitous smart home systems , 2012, Personal and Ubiquitous Computing.

[32]  Carles Gomez,et al.  Wireless home automation networks: A survey of architectures and technologies , 2010, IEEE Communications Magazine.

[33]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[34]  Yue Li,et al.  Design of a Key Establishment Protocol for Smart Home Energy Management System , 2013, 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks.

[35]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[36]  Won Ryu,et al.  Home appliance control framework based on smart TV set-top box , 2015, IEEE Transactions on Consumer Electronics.