Secure Supervised Learning-Based Smart Home Authentication Framework
- URL: http://arxiv.org/abs/2402.00568v1
- Date: Thu, 1 Feb 2024 13:01:47 GMT
- Title: Secure Supervised Learning-Based Smart Home Authentication Framework
- Authors: K. Swapna Sudha, N. Jeyanthi, and Celestine Iwendi
- Abstract summary: A secure authentication protocol needs to be established between the smart devices and the user.
Most of the existing smart home authentication protocols were identified to fail in facilitating a secure mutual authentication.
SSL-SHAF is proposed as are liable mutual authentication that can be contextually imposed for better security.
- Score: 0.7607700105031543
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The Smart home possesses the capability of facilitating home services to
their users with the systematic advance in The Internet of Things (IoT) and
information and communication technologies (ICT) in recent decades. The home
service offered by the smart devices helps the users in utilize maximized level
of comfort for the objective of improving life quality. As the user and smart
devices communicate through an insecure channel, the smart home environment is
prone to security and privacy problems. A secure authentication protocol needs
to be established between the smart devices and the user, such that a situation
for device authentication can be made feasible in smart home environments. Most
of the existing smart home authentication protocols were identified to fail in
facilitating a secure mutual authentication and increases the possibility of
lunching the attacks of session key disclosure, impersonation and stolen smart
device. In this paper, Secure Supervised Learning-based Smart Home
Authentication Framework (SSL-SHAF) is proposed as are liable mutual
authentication that can be contextually imposed for better security. The formal
analysis of the proposed SSL-SHAF confirmed better resistance against session
key disclosure, impersonation and stolen smart device attacks. The results of
SSL-SHAF confirmed minimized computational costs and security compared to the
baseline protocols considered for investigation.
Related papers
- Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
We propose Authenticated Cyclic Redundancy Integrity Check (ACRIC)
ACRIC preserves backward compatibility without requiring additional hardware and is protocol agnostic.
We show that ACRIC offers robust security with minimal transmission overhead ( 1 ms)
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - AEAKA: An Adaptive and Efficient Authentication and Key Agreement Scheme for IoT in Cloud-Edge-Device Collaborative Environments [7.106119177152857]
We propose an adaptive and efficient authentication and key agreement scheme (AEAKA) for Cloud-Edge-Device IoT environments.
AEAKA is highly adaptive and scalable, capable of automatically and dynamically initiating different authentication methods based on device requirements.
It employs an edge-assisted authentication approach to reduce the load on third-party trust authorities.
arXiv Detail & Related papers (2024-11-14T06:55:27Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles [61.394095512765304]
Dynamic Wireless Power Transfer (DWPT) is a novel technology that allows charging an electric vehicle while driving.
Recent advancements in quantum computing jeopardize classical public key cryptography.
We propose DynamiQS, the first post-quantum secure authentication protocol for dynamic wireless charging.
arXiv Detail & Related papers (2023-12-20T09:40:45Z) - Blockchain-based Zero Trust on the Edge [5.323279718522213]
This paper proposes a novel approach based on Zero Trust Architecture (ZTA) extended with blockchain to further enhance security.
The blockchain component serves as an immutable database for storing users' requests and is used to verify trustworthiness by analyzing and identifying potentially malicious user activities.
We discuss the framework, processes of the approach, and the experiments carried out on a testbed to validate its feasibility and applicability in the smart city context.
arXiv Detail & Related papers (2023-11-28T12:43:21Z) - Tamper-Evident Pairing [55.2480439325792]
Tamper-Evident Pairing (TEP) is an improvement of the Push-Button configuration (PBC) standard.
TEP relies on the Tamper-Evident Announcement (TEA), which guarantees that an adversary can neither tamper a transmitted message without being detected, nor hide the fact that the message has been sent.
This paper provides a comprehensive overview of the TEP protocol, including all information needed to understand how it works.
arXiv Detail & Related papers (2023-11-24T18:54:00Z) - Architecture of Smart Certificates for Web3 Applications Against
Cyberthreats in Financial Industry [2.795656498870966]
This study addresses security challenges associated with the current internet, specifically focusing on emerging technologies as blockchain and decentralized storage.
It also investigates the role of Web3 applications in shaping the future of the internet.
arXiv Detail & Related papers (2023-11-03T14:51:24Z) - Safe RAN control: A Symbolic Reinforcement Learning Approach [62.997667081978825]
We present a Symbolic Reinforcement Learning (SRL) based architecture for safety control of Radio Access Network (RAN) applications.
We provide a purely automated procedure in which a user can specify high-level logical safety specifications for a given cellular network topology.
We introduce a user interface (UI) developed to help a user set intent specifications to the system, and inspect the difference in agent proposed actions.
arXiv Detail & Related papers (2021-06-03T16:45:40Z) - A Smart Home System based on Internet of Things [0.0]
Authorization and authentication are challenging IoT security operations.
This paper applies an extra layer of security of multi-factor authentication to act as a prevention method for mitigating unauthorized access.
arXiv Detail & Related papers (2020-09-11T10:34:48Z) - Smart Home, security concerns of IoT [91.3755431537592]
The IoT (Internet of Things) has become widely popular in the domestic environments.
People are renewing their homes into smart homes; however, the privacy concerns of owning many Internet connected devices with always-on environmental sensors remain insufficiently addressed.
Default and weak passwords, cheap materials and hardware, and unencrypted communication are identified as the principal threats and vulnerabilities of IoT devices.
arXiv Detail & Related papers (2020-07-06T10:36:11Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.