Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
A Study On Node Authentication and Identification In IOT Based Smart Homes
Naif Waheb Rajkhan, Jia Song
Pages - 210 - 223 | Revised - 30-11-2020 | Published - 31-12-2020
MORE INFORMATION
KEYWORDS
Internet of Things (IoT), Smart Homes, Node Authentication, Smart Home Devices.
ABSTRACT
Smart home is one of the most popular Internet of Things (IoT) implementations. It is widely used because of the autonomous functions that it provides to homeowners. Smart home is equipped with smart IoT devices that are designed to perform special and specific functions automatically. The IoT smart home network has different types of connections based on the application’s requirements. Any attacks or unauthorized access to IoT smart home system or to the connected devices, could harm the system and may lead to unauthorized access to the homeowner’s information. Therefore, such devices in the smart home system must adopt the best and recent security and privacy standards to better secure the sensitive information about the homeowners. Node/device authentication is a crucial challenge in the security of smart homes. Depend on the types of devices, different node authentication mechanisms are used in smart homes. This paper analyzes the widely used mechanisms for IoT device authentication and identification in smart homes, along with possible threats that are related to them. There are different node authentication challenges at smart home that should be resolved by researchers and smart home devices’ manufacturers. The goal of this paper is to provide an analysis and comparison of the major IoT device authentication mechanisms so that the findings from this research can help other researchers and developers to choose the proper one that best suits the needs of a specific system environment.
A. Albalawi, A. Almrshed, A. Badhib, and S. Alshehri, "A Survey on Authentication Techniques for the Internet of Things," 2019 International Conference on Computer and Information Sciences (ICCIS), Sakaka, Saudi Arabia, 2019, pp. 1-5. DOI: 10.1109/ICCISci.2019.8716401, URL: https://ieeexplore.ieee.org/document/8716401. | |
A. Gai, S. Azam, B. Shanmugam, M. Jonkman and F. De Boer, "Categorization of security threats for smart home appliances," 2018 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, 2018, pp. 1-5. doi: 10.1109/ICCCI.2018.8441213. | |
A. K. Sahu, S. Sharma, D. Puthal, A. Pandey and R. Shit, "Secure Authentication Protocol for IoT Architecture," 2017 International Conference on Information Technology (ICIT), Bhubaneswar, 2017, pp. 220-224. URL: https://ieeexplore.ieee.org/document/8423911. | |
“Lack of security in Internet of Things devices”, ELSEVIER, vol. 2014, no. 8, p. 2, 2014. URL: https://doi.org/10.1016/S1353-4858(14)70075-3. | |
C. H. Lee and K. Kim, "Implementation of IoT system using block chain with authentication and data protection", 2018 International Conference on Information Networking (ICOIN), pp. 936-940, Jan 2018. | |
C. Huth, J. Zibuschka, P. Duplys and T. Güneysu, "Securing systems on the Internet of Things via physical properties of devices and communications," 2015 Annual IEEE Systems Conference (SysCon) Proceedings, Vancouver, BC, 2015, pp. 8-13, doi: 10.1109/SYSCON.2015.7116721. | |
D. Kumar, K. Shen, B. Case, D. Garg, G. Alperovich, D. Kuznetsov, R. Gupta, Z. Durumeric, “All Things Considered: An Analysis of IoT Devices on Home Networks”, 28th USENIX Security Symposium. URL: https://press.avast.com/hubfs/stanford_avast_state_of_iot.pdf. | |
D. Li, W. Peng, W. Deng and F. Gai, "A blockchain-based authentication and security mechanism for iot", 2018 27th International Conference on Computer Communication and Networks (ICCCN), pp. 1-6, July 2018. | |
F. K. Santoso and N. C. H. Vun, "Securing IoT for smart home system," 2015 International Symposium on Consumer Electronics (ISCE), Madrid, 2015, pp. 1-2. URL: https://ieeexplore.ieee.org/document/7177843. | |
Gamundani, Attlee & Phillips, Amelia & Muyingi, Hippolyte. (2018). “An Overview of Potential Authentication Threats and Attacks on Internet of Things (IoT): A Focus on Smart Home Applications”, 10.1109/Cybermatics_2018.2018.00043. URL: https://www.researchgate.net/publication/329140617_An_Overview_of_Potential_Authentica tion_Threats_and_Attacks_on_Internet_of_ThingsIoT_A_Focus_on_Smart_Home_Applications. | |
Hasan and K. Qureshi, "Internet of Things Device Authentication Scheme Using Hardware Serialization," 2018 International Conference on Applied and Engineering Mathematics (ICAEM), Taxila, 2018, pp. 109-114. DOI: 10.1109/ICAEM.2018.8536286, URL: https://ieeexplore.ieee.org/document/8536286. | |
I. Del Pozo and D. Cangrejo, "Creating Smart Environments: Analysis of Improving Security on Smart Homes," 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud), Barcelona, 2018, pp. 303-310.DOI: 10.1109/FiCloud.2018.0005, URL: https://ieeexplore.ieee.org/document/8458028. | |
K. Gupta and S. Shukla, "Internet of Things: Security challenges for next-generation networks," 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), Noida, 2016, pp. 315-318. DOI: 10.1109/ICICCS.2016.7542301, URL: https://ieeexplore.ieee.org/document/7542301. | |
Li, Q. Yan, and V. Chang,” Internet of Things: Security and privacy in a connected world”, ELSEVIER, vol. 78, 3, pp. 931-932, 2018. URL: https://doi.org/10.1016/j.future.2017.09.017. | |
M. A. Jan, P. Nanda, X. He, Z. Tan and R. P. Liu, "A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment," 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, 2014, pp. 205-211. | |
M. Azarmehr, A. Ahmadi and R. Rashidzadeh, "Secure authentication and access mechanism for IoT wireless sensors," 2017 IEEE International Symposium on Circuits and Systems (ISCAS), Baltimore, MD, 2017, pp. 1-4. DOI: 10.1109/ISCAS.2017.805044, URL: https://ieeexplore.ieee.org/document/8050446. | |
M. Conti, A. Dehghantanha, K. Franke and S. Watson,” Internet of Things security and forensics: Challenges and opportunities”, ELSEVIER, vol. 78, 2, pp. 544-546, 2018 URL: https://www.sciencedirect.com/science/article/pii/S0167739X17316667. | |
M. Fagen, M. Yang, A. Tan, L. Randolph, K. Scarfone, “Security Review of Consumer Home Internet of Things (IoT) Products”, Draft NISTIR 8267, URL: https://nvlpubs.nist.gov/nistpubs/ir/2019/NIST.IR.8267-draft.pdf. | |
M. Husamuddin and M. Qayyum, "Internet of Things: A study on security and privacy threats," 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), Abha, 2017, pp. 93-97. DOI: 10.1109/Anti-Cybercrime.2017.7905270 URL: https://ieeexplore.ieee.org/document/7905270. | |
N. Apthorpe, D. Reisman, and N. Feamster, "A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic", Computer Science Dept. Princeton University, pp. 1-6, 2017. | |
R. Liu and Y. Ge, "Smart home system design based on Internet of Things," 2017 12th International Conference on Computer Science and Education (ICCSE), Houston, TX, 2017, pp. 444-448. DOI: 10.1109/ICCSE.2017.8085533, URL: https://ieeexplore.ieee.org/document/8085533. | |
Robinson, S. (2019). “Internet of Things (IoT) - Smart home attacks are a reality, even as the smart home market soars”. URL: https://www.cisco.com/c/en/us/solutions/internet-of- things/smart-home-attacks.html. | |
S. S. I. Samuel, "A review of connectivity challenges in IoT-smart home," 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), Muscat, 2016, pp. 1-4. DOI: 10.1109/ICBDSC.2016.7460395, URL: https://ieeexplore.ieee.org/document/7460395. | |
T. Shah and S. Venkatesan, "Authentication of iot device and iot server using secure vaults", 2018 17th IEEE International Conference On Trust Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pp. 819-824, Aug 2018. | |
V. L. Shivraj, M. A. Rajan, M. Singh and P. Balamuralidhar, "One time password authentication scheme based on elliptic curves for internet of things (iot)", 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW), pp. 1-6, Feb 2015. | |
W. Ali, G. Dustgeer, M. Awais and M. A. Shah, "IoT-based smart home: Security challenges, security requirements and solutions," 2017 23rd International Conference on Automation and Computing (ICAC), Huddersfield, 2017, pp. 1-6.DOI: 10.23919/IConAC.2017.8082057, URL https://ieeexplore.ieee.org/document/8082057. | |
Y. Atwady and M. Hammoudeh, “A Survey on Authentication Techniques for the Internet of Things,” 2017. the International Conference, DOI: 10.1145/3102304.3102312 URL:https://www.researchgate.net/publication/320028921_A_Survey_on_Authentication_Te chniques_for_the_Internet_of_Things. | |
Y. Han and B. Liu, "Interactive smart home design based on Internet of Things," 2017 12th International Conference on Computer Science and Education (ICCSE), Houston, TX, 2017, pp. 449-453. DOI: 10.1109/ICCSE.2017.8085534, URL: https://ieeexplore.ieee.org/document/8085534. | |
Y. Seokung, P. Haeryong, Y. Hyeong, “Security Issues on Smart home in IoT Environment”, 2015. URL: 10.1007/978-3-662-45402-2_97. | |
Z. A. Alizai, N. F. Tareen and I. Jadoon, "Improved IoT device authentication scheme using device capability and digital signatures", 2018 International Conference on Applied and Engineering Mathematics (ICAEM), pp. 1-5, Sept 2018. | |
Zaidan, A.A., Zaidan, B.B. “A review on intelligent process for smart home applications based on IoT: coherent taxonomy, motivation, open challenges, and recommendations”, Artificial Intelligence Review 53, 141–165 (2020). URL: https://link.springer.com/article/10.1007%2Fs10462-018-9648-9. | |
Mr. Naif Waheb Rajkhan
Computer Science Department, University of Idaho, Moscow, ID, 83844 - United States of America
rajk4446@vandals.uidaho.edu
Dr. Jia Song
Computer Science Department, University of Idaho, Moscow, ID, 83844 - United States of America
|
|
|
|
View all special issues >> | |
|
|