Provable Secure Authentication Protocol in Fog-Enabled Smart Home Environment
نویسندگان
چکیده
People can access and obtain services from smart home devices conveniently through fog-enabled environments. The security privacy-preserving authentication protocol play an important role. However, many proposed protocols have one or more flaws. In particular, almost all the existing for cannot resist gateway compromised attacks. adversary not only know user’s identity but also launch impersonation Designing a provable secure that avoids known attacks on homes is challenging. Recently Guo et al. scheme based symmetric polynomials in environment. we found their suffers attack, desynchronization mobile device loss/stolen has no untraceability perfect forward secrecy. Therefore, adopt Physical Unclonable Function (PUF) to Elliptic Curve Diffie–Hellman (ECDH) key exchange achieve secrecy, propose protocol, which provably under random oracle model. According comparisons with some related protocols, better transmission efficiency same computation cost level.
منابع مشابه
A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملSecure Login Using Multi-Tier Authentication Schemes in Fog Computing
Security threats are major barriers in authentication process in Fog Computing. Identification of a user through single signon process like simple password-based authentications are no longer considered secure. Different multi-tier authentication schemes exist in literature that overcome the weakness of single sign-on. This paper surveys state-of-the-art multi-tier authentication techniques, th...
متن کاملSecurity in Smart Home Environment
Over the last decades the Smart Home development is a continuously evolving field that faces exceptional challenges. However, the recent advances in information and communications technologies have led the Smart Home development in a good level of maturity. A Smart Home is a living environment that incorporates the appropriate technology, called Smart Home technology, to meet the resident goals...
متن کاملA provable secure access control using smart cards
An access control scheme integrating with user authentication is proposed. Though the scheme is provably secure in request messaging (authentication), there is a flaw in access control. This paper presents an attack on the access control system; and further, an improvement is proposed to remedy this flaw. Our improvement only increases the information size and the cost of computations during re...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sustainability
سال: 2022
ISSN: ['2071-1050']
DOI: https://doi.org/10.3390/su142114367