Knowledge Agora



Similar Articles

Title ESCI-AKA: Enabling Secure Communication in an IoT-Enabled Smart Home Environment Using Authenticated Key Agreement Framework
ID_Doc 44559
Authors Alasmary, H; Tanveer, M
Title ESCI-AKA: Enabling Secure Communication in an IoT-Enabled Smart Home Environment Using Authenticated Key Agreement Framework
Year 2023
Published Mathematics, 11, 16
Abstract Smart home environments are a vital component of the larger ecosystem within smart cities, aiming to revolutionize residential living through the integration of Internet of Things (IoT) devices and advanced technologies. However, ensuring robust security and preserving privacy in these interconnected ecosystems present significant challenges. During the monitoring and controlling tasks in the smart home environment, diverse commands are exchanged between the IoT device and the user over the public Internet. The public Internet is open and vulnerable to various security attacks, which can corrode the monitoring and controlling operation of the smart home. In addition, conventional security algorithms are inappropriate for IoT devices deployed in the smart home. However, various pernicious security attacks are equally efficacious in the resource-limited smart home environment. Thus, various authenticated encryption schemes are proposed to enable security services in resource-constricted smart home environments. This paper presents a lightweight and efficient authentication framework for a smart home environment by leveraging the features of an authenticated encryption scheme and the hash function called "ESCI-AKA". ESCI-AKA checks the authenticity of the user at the local device and exchanges three messages among the user, gateway, and smart embedded device for establishing a secure channel for indecipherable communication by setting a session key. In addition, we corroborate the security of the established session key through the random oracle model and informal security analysis. Moreover, the Scyther tool is employed for the security validation of ESCI-AKA. Finally, the performance comparison of ESCI-AKA and other eminent security frameworks explicates that ESCI-AKA requires low computational and communication costs while providing robust security features.
PDF https://www.mdpi.com/2227-7390/11/16/3450/pdf?version=1691573251

Similar Articles

ID Score Article
43268 Wu, TY; Meng, Q; Chen, YC; Kumari, S; Chen, CM Toward a Secure Smart-Home IoT Access Control Scheme Based on Home Registration Approach(2023)Mathematics, 11, 9
42229 Khanpara, P; Lavingia, K; Trivedi, R; Tanwar, S; Verma, A; Sharma, R A context-aware internet of things-driven security scheme for smart homes(2023)Security And Privacy, 6, 1
44136 Li, N; Liu, DX; Nepal, S Lightweight Mutual Authentication for IoT and Its Applications(2017)Ieee Transactions On Sustainable Computing, 2, 4
42368 Khan, ZA Using energy-efficient trust management to protect IoT networks for smart cities(2018)
39765 Reddy, AG; Suresh, D; Phaneendra, K; Shin, JS; Odelu, V Provably secure pseudo-identity based device authentication for smart cities environment(2018)
40802 Limbasiya, T; Garg, M; Shandil, S Advanced verification system using a smart card for smart city users(2018)
36412 Alfouzan, FA; Kim, K; Alzahrani, NM An Efficient Framework for Securing the Smart City Communication Networks(2022)Sensors, 22, 8
37922 Gupta, S; Alharbi, F; Alshahrani, R; Arya, PK; Vyas, S; Elkamchouchi, DH; Soufiene, B Secure and Lightweight Authentication Protocol for Privacy Preserving Communications in Smart City Applications(2023)Sustainability, 15, 6
37039 Sharma, R; Arya, R A secure authentication technique for connecting different IoT devices in the smart city infrastructure(2022)Cluster Computing-The Journal Of Networks Software Tools And Applications, 25.0, 4
36102 Bera, B; Das, AK; Balzano, W; Medaglia, CM On the design of biometric-based user authentication protocol in smart city environment(2020)
Scroll