Trust-based Authentication for Smart Home Systems

Warning

This publication doesn't include Institute of Computer Science. It includes Faculty of Informatics. Official publication website can be found on muni.cz.
Authors

MBAREK Bacem GE Mouzhi PITNER Tomáš

Year of publication 2021
Type Article in Periodical
Magazine / Source Wireless Personal Communications
MU Faculty or unit

Faculty of Informatics

Citation
Web Springer Link
Doi http://dx.doi.org/10.1007/s11277-020-07965-0
Keywords Smart home; IoT; Authentication; Jamming attacks; Clone attacks
Description Smart home systems are developed to interconnect and automate household appliances and create ubiquitous home services. Such a system is mainly driven by the communications among Internet-of-Things (IoT) objects along with Radio Frequency IDentification (RFID) technologies, where the RFID techniques in the IoT network are commonly prone to malicious attacks due to the inherent weaknesses of underlying wireless radio communications. Thus, it causes the smart home systems vulnerable to some active attacks such as the jamming and cloning attacks, which in turn threaten to home breach and personal information disclosure. This paper therefore proposes a new trust-based authentication scheme to effectively address two typical attacks, jamming and cloning attacks, in smart home environment. The evaluation shows that our solution can significantly reduce the authentication failure in jamming attacks, increase the detection probability of cloning attacks, and improve the authentication efficiency to manage the authentication delay in a reasonable time.

You are running an old browser version. We recommend updating your browser to its latest version.

More info