MyMaster : A Multifactor Authentication Scheme for Smart Home Device

  • EMILLI LIJAU Universiti Malaysia Sarawak
Keywords: multi factor authentication (MFA), IoT, smart home, user authentication, smart device

Abstract

Smart homes are one of the Internet of Things (IoT) applications most significant to enable people to operate intelligent devices on the Internet in their homes. However, when users can access an intelligent home system remotely, they have major privacy and confidentiality difficulties to overcome. Nothing has been done to improve the safety characteristics of an intelligent home with current research on authentication approaches. For example, to address these issues and to develop a reciprocal tracking authentication system with a critical aspect of a deal, we recommend an Internet based Smart Home System (IFTTT) model. As a controller and a safety guard, an IFTTT-Home Gateway provides a user with remote access to a Smart Home System within their company. The system is designed for mutual authentication with security features such as anonymity and full advance security by using Elliptical Curve Encryption, Nonces, XOR or cryptographic Hash functions. We also incorporate multi factor authentication (MFA) into the model to ensure more security and preventing privacy leakage.

References

[1]A Lightweight Mutual Authentication and Key Agreement Scheme for Medi Zheng, L., Song, C., Cao, N., Li, Z., Zhou, W., Chen, J., & Meng, L. (2018). A New Mutual Authentication Protocol in Mobile RFID for Smart Campus. IEEE Access, 6, 60996–61005. https://doi.org/10.1109/access.2018.2875973cal Internet of Things
[2]A Lightweight Mutual Authentication Protocol for V2V Communication in Internet of Vehicles
[3]A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes
[4]A World That Works for You. Accessed: Aug. 11, 2018. [Online]. Available: http://IFTTT.com
[5]B. Ali and A. Awad, ‘‘Cyber and physical security vulnerability assessment for IoT-based smart homes,’’ Sensors, vol. 18, pp. 1–17, Mar. 2018.
[6]B. Barret. Hack Brief: Hacker Strikes Kids, Gadget Maker VTech to Steal 5 Million Accounts. Accessed: Sep. 25, 2018. [Online]. Available: https://www.wired.com/2015/11/vtech-childrens-gadget-maker-hack-5- million-accounts/
[7]B. Baruah and S. Dhal, ‘‘A two-factor authentication scheme against FDM attack in IFTTT based smart home system,’’ Comput. Secur., vol. 77, pp. 21–35, Aug. 2018.
[8]Cao, J., Yu, P., Ma, M., & Gao, W. (2019). Fast Authentication and Data Transfer Scheme for Massive NB-IoT Devices in 3GPP 5G Network. IEEE Internet of Things Journal, 6(2), 1561–1575. https://doi.org/10.1109/jiot.2018.2846803
[9]Cui, Z., Xue, F., Zhang, S., Cai, X., Cao, Y., Zhang, W., & Chen, J. (2020). A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN. IEEE Transactions on Services Computing, 13(2), 241–251. https://doi.org/10.1109/TSC.2020.2964537
[10]Deebak, B. D., & Al-Turjman, F. (2021). Smart Mutual Authentication Protocol for Cloud Based Medical Healthcare Systems Using Internet of Medical Things. IEEE Journal on Selected Areas in Communications, 39(2), 346–360. https://doi.org/10.1109/jsac.2020.3020599
[11]Josh Kaufman (2005). What Is ‘Communication Overhead’? Retrieved from https://personalmba.com/communication-overhead/#:~:text=Communication%20Overhead%20is%20the%20proportion,increases%2C%20so%20does%20Communication%20Overhead.
[12]L. Coppolino, V. D'Alessandro, S. D'Antonio, L. Levy and L. Romano, "My Smart Home is Under Attack," 2015 IEEE 18th International Conference on Computational Science and Engineering, 2015, pp. 145-151, doi: 10.1109/CSE.2015.28
[13]Lyu, Q., Zheng, N., Liu, H., Gao, C., Chen, S., & Liu, J. (2019). Remotely Access “My” Smart Home in Private: An Anti-Tracking Authentication and Key Agreement Scheme. IEEE Access, 7, 41835-41851. doi:10.1109/access.2019.2907602
[14]Oh, J., Yu, S., Lee, J., Son, S., Kim, M., and Park, Y. “A secure and lightweight authentication protocol for IoT-based smart homes. Sensors, vol. 21, no. 4, p. 1488, doi: 10.3390/s21041488
[15]Remotely Access ``My'' Smart Home in Private: An Anti-Tracking Authentication and Key Agreement Scheme
[16]Smart Home Market by Product (Lighting Control, Security & Access Control, HVAC, Entertainment, Smart Speaker, Home Healthcare, Smart Kitchen, Home Appliances, and Smart Furniture), Software & Services, and Region—Global Forecast to 2024. Accessed: Jan. 2019. [Online]. Available: https://www.marketsandmarkets.com/Market-Reports/smarthomes-and-assisted-living-advanced-technologie-and-global-market121.html
[17]Vasudev, H., Deshpande, V., Das, D., & Das, S. K. (2020). A Lightweight Mutual Authentication Protocol for V2V Communication in Internet of Vehicles. IEEE Transactions on Vehicular Technology, 69(6), 6709–6717. https://doi.org/10.1109/tvt.2020.2986585
[18]W. Liu, X. Wang and W. Peng, "Secure Remote Multi-Factor Authentication Scheme Based on Chaotic Map Zero-Knowledge Proof for Crowdsourcing Internet of Things," in IEEE Access, vol. 8, pp. 8754-8767, 2020, doi: 10.1109/ACCESS.2019.2962912.
[19]Xu, Z., Xu, C., Liang, W., Xu, J., & Chen, H. (2019). A Lightweight Mutual Authentication and Key Agreement Scheme for Medical Internet of Things. IEEE Access, 7, 53922–53931. https://doi.org/10.1109/access.2019.2912870
[20]Zheng, L., Song, C., Cao, N., Li, Z., Zhou, W., Chen, J., & Meng, L. (2018). A New Mutual Authentication Protocol in Mobile RFID for Smart Campus. IEEE Access, 6, 60996–61005. https://doi.org/10.1109/access.2018.2875973
Published
2021-11-30
How to Cite
LIJAU, E. (2021). MyMaster : A Multifactor Authentication Scheme for Smart Home Device. Journal of IT in Asia, 9(1), 89-96. https://doi.org/10.33736/jita.3856.2021
Section
Articles