Provable Secure Authentication Protocol in Fog-Enabled Smart Home Environment

نویسندگان

چکیده

People can access and obtain services from smart home devices conveniently through fog-enabled environments. The security privacy-preserving authentication protocol play an important role. However, many proposed protocols have one or more flaws. In particular, almost all the existing for cannot resist gateway compromised attacks. adversary not only know user’s identity but also launch impersonation Designing a provable secure that avoids known attacks on homes is challenging. Recently Guo et al. scheme based symmetric polynomials in environment. we found their suffers attack, desynchronization mobile device loss/stolen has no untraceability perfect forward secrecy. Therefore, adopt Physical Unclonable Function (PUF) to Elliptic Curve Diffie–Hellman (ECDH) key exchange achieve secrecy, propose protocol, which provably under random oracle model. According comparisons with some related protocols, better transmission efficiency same computation cost level.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

Secure Login Using Multi-Tier Authentication Schemes in Fog Computing

Security threats are major barriers in authentication process in Fog Computing. Identification of a user through single signon process like simple password-based authentications are no longer considered secure. Different multi-tier authentication schemes exist in literature that overcome the weakness of single sign-on. This paper surveys state-of-the-art multi-tier authentication techniques, th...

متن کامل

Security in Smart Home Environment

Over the last decades the Smart Home development is a continuously evolving field that faces exceptional challenges. However, the recent advances in information and communications technologies have led the Smart Home development in a good level of maturity. A Smart Home is a living environment that incorporates the appropriate technology, called Smart Home technology, to meet the resident goals...

متن کامل

A provable secure access control using smart cards

An access control scheme integrating with user authentication is proposed. Though the scheme is provably secure in request messaging (authentication), there is a flaw in access control. This paper presents an attack on the access control system; and further, an improvement is proposed to remedy this flaw. Our improvement only increases the information size and the cost of computations during re...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sustainability

سال: 2022

ISSN: ['2071-1050']

DOI: https://doi.org/10.3390/su142114367