Authentication and Privacy Challenges for Internet of Things Smart Home Environment

Authors:

Riaz Muhammad,Dr.Samad Baseer,

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00018

Keywords:

Internet of Things(IOT),Smart Home Environment (SHE),Version 6 Low Power Wireless Personal Area Network (6LoWPAN),Enhanced Authentication and Key Establishment Scheme for 6LoWPAN (EAKES6Lo),Secure Authentication and Key Establishment Scheme(SAKES),Two Step Authentication(TSA),

Abstract

This study is a very good approach to find the solution of secure authentication for IOT based smart home environment and its appliances. The study aims to compare the different authentication methods with respect to smart home environment and trying to identify its limitation. After analyzing the existing authentication methods its limitation and core issues then targeted the message authentication for SHE. Presently SHE authentication is based on Exchange of six message authentication techniques in Enhance authentication and key establishment scheme 6LOWPAN (EAKES6Lo) which is advance version of secure authentication and key establishment scheme (SAKES). This authentication method cause much high end to end delay, energy consumption, overall throughput of the system, complexity and poor security approach. By simulation of EAKES6Lo and SAKES scheme found some results, in contrast to these results, there may be another solution to access any SHE lights, fans, refrigerators, air condition, geezer, door lock, microwave oven, television and water pump, HVAC control and security alarms etc remotely with better security, better complexity, minimum energy consumption, better key length, better throughput and minor end to end delay named two step authentication (TSA). The proposed model also helps to monitor accessing system by comparing security codes and its complexity.

Refference:

I.Atzori, L., Iera, Antonio,Morabito, Giacomo, The internet of things: A survey. Computer networks, 2010. 54(15): p. 2787-2805.

II.Commission, E., The alliance for internet of things innovation (AIOTI). 2016.

III.Costin Badic ̆ a ̆, M.B., Amelia Badic ̆, a ̆, An Overview of Smart Home Environments: Architectures, Technologies and Applications. 2017: p. 8.

IV.Ding, F.S., A.; Tong, E.;Li,J., A smart gateway architecture for improving effeciency of home network application. 2016.

V.Geoff Mulligan , M.y., Patrick Wetterwal, ColinPatrickO’Flyn, MakingsensornetworksIPv6ready. 2008.

VI.Huichen Lin, N.W.B., IoT Privacy and Security Challenges for Smart Home Environments. 2016(4 July 2016).

VII.Internet, ADVANCE AUTHENTICATION TECHNIQUES.

VIII.Kenji, I.M., T.; Toyoda, K.; Sasase, I, Secure parent node selection scheme in route construction to exclude attacking nodes from rpl network. 2015. 4: p.5.

IX.Komninos, N., Phillppou, E. & Pitsillides, A. , Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures 2014.

X.Madakam, S., R. Ramaswamy, and S. Tripathi, Internet of Things (IoT): A Literature Review. IT Applications Group, 2015 3: p. 164-173.

XI.Mangal Sain, Y.J.K., Hoon Jae Lee, Survey on Security in Internet of things: state of the art and challenges 2014.

XII.Md. Alam Hossain, M.B.H., Md. Shafin Uddin, Shariar Md. Imtiaz MD6 Message Digest Algoritham. Reasearch Gate, 2016.16.

XIII.Rescorla, E.M., N., Datagram Transport Layer Security. Internet Engineering task force, 2012.

XIV.Sandeep Kumar Rao, D.M., Dr. Danish Ali Khan, A Survey on Advanced Encryption Standard 2017.

Riaz Muhammad, Dr.Samad Baseer View Download