MyMaster : A Multifactor Authentication Scheme for Smart Home Device
DOI:
https://doi.org/10.33736/jita.3856.2021Keywords:
multi factor authentication (MFA), IoT, smart home, user authentication, smart deviceAbstract
Smart homes are one of the Internet of Things (IoT) applications most significant to enable people to operate intelligent devices on the Internet in their homes. However, when users can access an intelligent home system remotely, they have major privacy and confidentiality difficulties to overcome. Nothing has been done to improve the safety characteristics of an intelligent home with current research on authentication approaches. For example, to address these issues and to develop a reciprocal tracking authentication system with a critical aspect of a deal, we recommend an Internet based Smart Home System (IFTTT) model. As a controller and a safety guard, an IFTTT-Home Gateway provides a user with remote access to a Smart Home System within their company. The system is designed for mutual authentication with security features such as anonymity and full advance security by using Elliptical Curve Encryption, Nonces, XOR or cryptographic Hash functions. We also incorporate multi factor authentication (MFA) into the model to ensure more security and preventing privacy leakage.
References
[2]A Lightweight Mutual Authentication Protocol for V2V Communication in Internet of Vehicles
[3]A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes
[4]A World That Works for You. Accessed: Aug. 11, 2018. [Online]. Available: http://IFTTT.com
[5]B. Ali and A. Awad, ‘‘Cyber and physical security vulnerability assessment for IoT-based smart homes,’’ Sensors, vol. 18, pp. 1–17, Mar. 2018.
[6]B. Barret. Hack Brief: Hacker Strikes Kids, Gadget Maker VTech to Steal 5 Million Accounts. Accessed: Sep. 25, 2018. [Online]. Available: https://www.wired.com/2015/11/vtech-childrens-gadget-maker-hack-5- million-accounts/
[7]B. Baruah and S. Dhal, ‘‘A two-factor authentication scheme against FDM attack in IFTTT based smart home system,’’ Comput. Secur., vol. 77, pp. 21–35, Aug. 2018.
[8]Cao, J., Yu, P., Ma, M., & Gao, W. (2019). Fast Authentication and Data Transfer Scheme for Massive NB-IoT Devices in 3GPP 5G Network. IEEE Internet of Things Journal, 6(2), 1561–1575. https://doi.org/10.1109/jiot.2018.2846803
[9]Cui, Z., Xue, F., Zhang, S., Cai, X., Cao, Y., Zhang, W., & Chen, J. (2020). A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN. IEEE Transactions on Services Computing, 13(2), 241–251. https://doi.org/10.1109/TSC.2020.2964537
[10]Deebak, B. D., & Al-Turjman, F. (2021). Smart Mutual Authentication Protocol for Cloud Based Medical Healthcare Systems Using Internet of Medical Things. IEEE Journal on Selected Areas in Communications, 39(2), 346–360. https://doi.org/10.1109/jsac.2020.3020599
[11]Josh Kaufman (2005). What Is ‘Communication Overhead’? Retrieved from https://personalmba.com/communication-overhead/#:~:text=Communication%20Overhead%20is%20the%20proportion,increases%2C%20so%20does%20Communication%20Overhead.
[12]L. Coppolino, V. D'Alessandro, S. D'Antonio, L. Levy and L. Romano, "My Smart Home is Under Attack," 2015 IEEE 18th International Conference on Computational Science and Engineering, 2015, pp. 145-151, doi: 10.1109/CSE.2015.28
[13]Lyu, Q., Zheng, N., Liu, H., Gao, C., Chen, S., & Liu, J. (2019). Remotely Access “My” Smart Home in Private: An Anti-Tracking Authentication and Key Agreement Scheme. IEEE Access, 7, 41835-41851. doi:10.1109/access.2019.2907602
[14]Oh, J., Yu, S., Lee, J., Son, S., Kim, M., and Park, Y. “A secure and lightweight authentication protocol for IoT-based smart homes. Sensors, vol. 21, no. 4, p. 1488, doi: 10.3390/s21041488
[15]Remotely Access ``My'' Smart Home in Private: An Anti-Tracking Authentication and Key Agreement Scheme
[16]Smart Home Market by Product (Lighting Control, Security & Access Control, HVAC, Entertainment, Smart Speaker, Home Healthcare, Smart Kitchen, Home Appliances, and Smart Furniture), Software & Services, and Region—Global Forecast to 2024. Accessed: Jan. 2019. [Online]. Available: https://www.marketsandmarkets.com/Market-Reports/smarthomes-and-assisted-living-advanced-technologie-and-global-market121.html
[17]Vasudev, H., Deshpande, V., Das, D., & Das, S. K. (2020). A Lightweight Mutual Authentication Protocol for V2V Communication in Internet of Vehicles. IEEE Transactions on Vehicular Technology, 69(6), 6709–6717. https://doi.org/10.1109/tvt.2020.2986585
[18]W. Liu, X. Wang and W. Peng, "Secure Remote Multi-Factor Authentication Scheme Based on Chaotic Map Zero-Knowledge Proof for Crowdsourcing Internet of Things," in IEEE Access, vol. 8, pp. 8754-8767, 2020, doi: 10.1109/ACCESS.2019.2962912.
[19]Xu, Z., Xu, C., Liang, W., Xu, J., & Chen, H. (2019). A Lightweight Mutual Authentication and Key Agreement Scheme for Medical Internet of Things. IEEE Access, 7, 53922–53931. https://doi.org/10.1109/access.2019.2912870
[20]Zheng, L., Song, C., Cao, N., Li, Z., Zhou, W., Chen, J., & Meng, L. (2018). A New Mutual Authentication Protocol in Mobile RFID for Smart Campus. IEEE Access, 6, 60996–61005. https://doi.org/10.1109/access.2018.2875973
Downloads
Published
How to Cite
Issue
Section
License
Copyright Transfer Statement for Journal
1) In signing this statement, the author(s) grant UNIMAS Publisher an exclusive license to publish their original research papers. The author(s) also grant UNIMAS Publisher permission to reproduce, recreate, translate, extract or summarize, and to distribute and display in any forms, formats, and media. The author(s) can reuse their papers in their future printed work without first requiring permission from UNIMAS Publisher, provided that the author(s) acknowledge and reference publication in the Journal.
2) For open access articles, the author(s) agree that their articles published under UNIMAS Publisher are distributed under the terms of the CC-BY-NC-SA (Creative Commons Attribution-Non Commercial-Share Alike 4.0 International License) which permits unrestricted use, distribution, and reproduction in any medium, for non-commercial purposes, provided the original work of the author(s) is properly cited.
3) For subscription articles, the author(s) agree that UNIMAS Publisher holds copyright, or an exclusive license to publish. Readers or users may view, download, print, and copy the content, for academic purposes, subject to the following conditions of use: (a) any reuse of materials is subject to permission from UNIMAS Publisher; (b) archived materials may only be used for academic research; (c) archived materials may not be used for commercial purposes, which include but not limited to monetary compensation by means of sale, resale, license, transfer of copyright, loan, etc.; and (d) archived materials may not be re-published in any part, either in print or online.
4) The author(s) is/are responsible to ensure his or her or their submitted work is original and does not infringe any existing copyright, trademark, patent, statutory right, or propriety right of others. Corresponding author(s) has (have) obtained permission from all co-authors prior to submission to the journal. Upon submission of the manuscript, the author(s) agree that no similar work has been or will be submitted or published elsewhere in any language. If submitted manuscript includes materials from others, the authors have obtained the permission from the copyright owners.
5) In signing this statement, the author(s) declare(s) that the researches in which they have conducted are in compliance with the current laws of the respective country and UNIMAS Journal Publication Ethics Policy. Any experimentation or research involving human or the use of animal samples must obtain approval from Human or Animal Ethics Committee in their respective institutions. The author(s) agree and understand that UNIMAS Publisher is not responsible for any compensational claims or failure caused by the author(s) in fulfilling the above-mentioned requirements. The author(s) must accept the responsibility for releasing their materials upon request by Chief Editor or UNIMAS Publisher.
6) The author(s) should have participated sufficiently in the work and ensured the appropriateness of the content of the article. The author(s) should also agree that he or she has no commercial attachments (e.g. patent or license arrangement, equity interest, consultancies, etc.) that might pose any conflict of interest with the submitted manuscript. The author(s) also agree to make any relevant materials and data available upon request by the editor or UNIMAS Publisher.