P. Kumar, A. Braeken, A. Gurtov, J. Iinatti and P. H. Ha, "Anonymous Secure Framework in Connected Smart Home Environments," in IEEE Transactions on Information Forensics and Security, vol. 12, no. 4, pp. 968-979, April 2017. doi: 10.1109/TIFS.2016.2647225
Anonymous secure framework in connected smart home environments
|Author:||Kumar, Pardeep1; Braeken, An2; Gurtov, Andrei3,4;|
1Department of Computer Science, University of Oxford, OX1 3QD, United Kingdom
2Industrial Engineering INDI, Vrije Universiteit Brussel, Belgium
3Linkoping University, Sweden
4ITMO University, Russia
5University of Oulu, P. O. Box 4500, FI-90014, Finland
6Department of Computer Science, UiT The Arctic University of Norway, N-9037, Tromso, Norway
|Online Access:||PDF Full Text (PDF, 0.8 MB)|
|Persistent link:|| http://urn.fi/urn:nbn:fi-fe2018062726515
Institute of Electrical and Electronics Engineers,
|Publish Date:|| 2018-06-27
The smart home is an environment, where heterogeneous electronic devices and appliances are networked together to provide smart services in a ubiquitous manner to the individuals. As the homes become smarter, more complex, and technology dependent, the need for an adequate security mechanism with minimum individual's intervention is growing. The recent serious security attacks have shown how the Internet-enabled smart homes can be turned into very dangerous spots for various ill intentions, and thus lead the privacy concerns for the individuals. For instance, an eavesdropper is able to derive the identity of a particular device/appliance via public channels that can be used to infer in the life pattern of an individual within the home area network. This paper proposes an anonymous secure framework (ASF) in connected smart home environments, using solely lightweight operations. The proposed framework in this paper provides efficient authentication and key agreement, and enables devices (identity and data) anonymity and unlinkability. One-time session key progression regularly renews the session key for the smart devices and dilutes the risk of using a compromised session key in the ASF. It is demonstrated that computation complexity of the proposed framework is low as compared with the existing schemes, while security has been significantly improved.
IEEE transactions on information forensics and security
|Pages:||968 - 979|
|Type of Publication:||
A1 Journal article – refereed
|Field of Science:||
213 Electronic, automation and communications engineering, electronics
This work has received funding from the Research Council of Norway (PREAPP project, grant no. 231746/F20); the part of work acknowledged the contribution of the COST Action IC1303 - AAPELE, Architectures, Algorithms and Platforms for Enhanced Living Environments”; and the part of this work is also supported by Academy of Finland project SECUREConnect (296693).
© 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.