Skip to main content

SASH: Secure Authentication Scheme for Smart Home Environments

  • Conference paper
  • First Online:
Inventive Communication and Computational Technologies

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 383))

  • 373 Accesses

Abstract

IoT and ICT are building the framework of the world all around us smarter and further receptive, integrating the digital and substantial universe; consequently, there are already more connected things than humans across the globe. Networked coupled gadgets use integrated sensors to accumulate statistics and process it, thereby improving our performance and lifestyle. Practical IoT instances extent from an intelligent home that instinctively regulates light and heat, smart watches to RFID chips that is automatically adjusted to prevent failures. As the users and smart gadgets communicate via an unsafe transmission medium, the crucial data interchanged amidst the network becomes prone to an opponent that causes security and privacy problems such as impersonation, failed mutual authentication and session key disclosure. In this paper, we address these drawbacks and vulnerabilities and put forward a more efficient, secure, and lightweight authentication scheme. Using the AVISPA tool, we also illustrate that the propounded scheme guarantees higher safety and protection while decreasing implementation complexity to correlated schemes and it is appropriate with applications of smart home environments established on IoT.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Braeken A, Porambage P, Stojmenovic M, Lambrinos L (2016) edaaas: efficient distributed anonymous authentication and access in smart homes. Int J Distrib Sensor Netw 12(12):1550147716682037

    Google Scholar 

  2. Wazid M, Das AK, Odelu V, Kumar N, Susilo W (2017) Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans Dependable Secure Comput 17(2):391–406

    Google Scholar 

  3. Mbarek B, Buhnova B, Pitner T (2019) Semlas: an efficient secure multi-level authentication scheme for IoT-based smart home systems. In: 2019 15th International wireless communications & mobile computing conference (IWCMC). IEEE, pp 1373–1378

    Google Scholar 

  4. Poh GS, Gope P, Ning J (2019) Privhome: privacy-preserving authenticated communication in smart home environment. IEEE Trans Dependable Secure Comput

    Google Scholar 

  5. Mbarek B, Ge M, Pitner T (2020) An efficient mutual authentication scheme for internet of things. Internet of Things 9:100160

    Article  Google Scholar 

  6. Banerjee S, Odelu V, Das AK, Chattopadhyay S, Park Y (2020) An efficient, anonymous and robust authentication scheme for smart home environments. Sensors 20(4):1215

    Google Scholar 

  7. Xiang A, Zheng J (2020) A situation-aware scheme for efficient device authentication in smart grid-enabled home area networks. Electronics 9(6):989

    Article  Google Scholar 

  8. Kumar P, Chouhan L (2021) A secure authentication scheme for IoT application in smart home. Peer-To-Peer Netw Appl 14(1):420–438

    Article  Google Scholar 

  9. Oh J, Yu S, Lee J, Son S, Kim M, Park Y (2021) A secure and lightweight authentication protocol for IoT-based smart homes. Sensors 21(4):1488

    Google Scholar 

  10. Yu S, Park K, Park Y (2019) A secure lightweight three-factor authentication scheme for IoT in cloud computing environment. Sensors 19(16):3598

    Article  Google Scholar 

  11. Singh S, Chaurasiya VK (2021) Mutual authentication scheme of IoT devices in fog computing environment. Clust Comput 24(3):1643–1657

    Article  Google Scholar 

  12. Thakare A, Kim YG (2021) Secure and efficient authentication scheme in IoT environments. Appl Sci 11(3):1260

    Article  Google Scholar 

  13. Dhillon PK, Kalra S (2017) Secure multi-factor remote user authentication scheme for internet of things environments. Int J Commun Syst 30(16):e3323

    Article  Google Scholar 

  14. Bera B, Vangala A, Das AK, Lorenz P, Khan MK (2022) Private blockchain- envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment. Comput Stand Interfaces 80:103567

    Article  Google Scholar 

  15. Mahmod MJA, Guin U (2020) A robust, low-cost and secure authentication scheme for IoT applications. Cryptography 4(1):8

    Article  Google Scholar 

  16. Alzahrani BA, Chaudhry SA, Barnawi A, Xiao W, Chen M, Al-Barakati A (2020) ILAS-IoT: an improved and lightweight authentication scheme for IoT deployment. J Ambient Intell Humanized Comput 1–13

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bhawna Narwal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Narwal, B., Dahiya, V., Bansal, V., Aggarwal, P. (2023). SASH: Secure Authentication Scheme for Smart Home Environments. In: Ranganathan, G., Fernando, X., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 383. Springer, Singapore. https://doi.org/10.1007/978-981-19-4960-9_62

Download citation

Publish with us

Policies and ethics