Trust-Based Authentication for Smart Home Systems

  • PDF / 1,266,952 Bytes
  • 16 Pages / 439.37 x 666.142 pts Page_size
  • 7 Downloads / 240 Views

DOWNLOAD

REPORT


Trust‑Based Authentication for Smart Home Systems Bacem Mbarek1   · Mouzhi Ge1 · Tomás Pitner1

© Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract Smart home systems are developed to interconnect and automate household appliances and create ubiquitous home services. Such a system is mainly driven by the communications among Internet-of-Things (IoT) objects along with Radio Frequency IDentification (RFID) technologies, where the RFID techniques in the IoT network are commonly prone to malicious attacks due to the inherent weaknesses of underlying wireless radio communications. Thus, it causes the smart home systems vulnerable to some active attacks such as the jamming and cloning attacks, which in turn threaten to home breach and personal information disclosure. This paper therefore proposes a new trust-based authentication scheme to effectively address two typical attacks, jamming and cloning attacks, in smart home environment. The evaluation shows that our solution can significantly reduce the authentication failure in jamming attacks, increase the detection probability of cloning attacks, and improve the authentication efficiency to manage the authentication delay in a reasonable time. Keywords  Smart home · IoT · Authentication · Jamming attacks · Clone attacks

1 Introduction Nowadays, smart home systems are developed to enable home automation and increase the quality of life [10, 28]. These systems are usually featured by using a smart phone application to interconnect and control different home devices such as lights, power plugins, cooking devices, temperature and humidity sensors as well as security systems [2, 41]. In order to implement the home device interconnections, Internet of Things (IoT) and Radio Frequency IDentification (RFID) are widely used as typical wireless communication techniques [25]. IoT is an emerging application referring to networked objects that interconnect to each other via wireless sensors attached to them [13, 21]. Smart home systems push * Bacem Mbarek [email protected] Mouzhi Ge [email protected] Tomás Pitner [email protected] 1



Faculty of Informatics, Masaryk University, Brno, Czech Republic

13

Vol.:(0123456789)



B. Mbarek et al.

forward a future home environment where embedded sensors and actuators are self-configured and can be controlled remotely through the Internet. It enables a variety of monitoring and control applications such as gas leakage detection, automatic air condition control, and door locking systems. In those applications, RFID is one of the key enabler technologies for smart home IoT. RFID reader can read the identification information from the RFID tag that is plugged into home appliances and analyze it for further information processing. Householder can remotely manage and control home appliances such as desk lamp and air conditioning by using handheld mobile RFID (MRFID). The MRFID reader can be carried to different rooms. When a home resident enters a room, the MRFID reader processes the information of RFID tag