Skip to main content
Log in

Secure multiparty access and authentication based on advanced fuzzy extractor in smart home

  • Application of soft computing
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Smart home (SH) technology is a new IoT application that allows users to remotely control household appliances. It provides several facilities like light control, smart locks, smoke detection, temperature monitoring, etc. Smart home domain needs an anonymous and efficient authentication scheme to ensure secure multiparty communications because of the insecure communication channel. Several authentication schemes were developed but it does not require multiparty authentication and are not secure in multiparty access. Thus, we propose a secure multiparty access and authentication based on advanced fuzzy extractor (SMAA_AFE) system that allows only the valid user to access the devices in SH. The proposed method consists of four phases such as sensor node (SN) registration phase, smart user (SU) registration phase, smart user authentication phase, password, and biometric update phase. All SUs and the SNs of the SH are registered and during the authentication phase, the user will be authenticated using the SMAA_AFE protocol. Here, the biometric data of the user is needed for authentication. When the user imprints his fingerprint, a valid biometric key will be generated only if a fixed number of members authenticate the user. The generated key is robust because we use SHA-256 hashing function. We use KNN to calculate the distance between the registered biometric data and the data given during authentication because it predicts more accurately. SMAA_AFE protocol improves security from various attacks. The security features of the proposed method are analyzed and its performance is compared to other authentication protocols focusing on communication and computation costs. The results demonstrate that the proposed method outperforms other protocols in terms of communication cost, requiring only 1188 bits, and computation cost, with an execution time of 6.20 ms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Data availability

All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by Sirisha Uppuluri, G. Lakshmeeswari. The first draft of the manuscript was written by Sirisha Uppuluri and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript. Conceptualization: Sirisha Uppuluri; Methodology: Sirisha Uppuluri, G. Lakshmeeswari; Formal analysis and investigation: Sirisha Uppuluri; Writing - original draft preparation: Sirisha Uppuluri, G. Lakshmeeswari; Writing - review and editing: Sirisha Uppuluri; Supervision: G. Lakshmeeswari.

References

  • Abu Arqub O (2017) Adaptation of reproducing kernel algorithm for solving fuzzy Fredholm–Volterra integrodifferential equations. Neural Comput Appl 28:1591–1610

    Article  Google Scholar 

  • Abu Arqub O, Singh J, Maayah B, Alhodaly M (2023a) Reproducing kernel approach for numerical solutions of fuzzy fractional initial value problems under the Mittag–Leffler kernel differential operator. Math Methods Appl Sci 46(7):7965–7986

    Article  MathSciNet  Google Scholar 

  • Abu Arqub O, Singh J, Alhodaly M (2023b) Adaptation of kernel functions-based approach with Atangana–Baleanu–Caputo distributed order derivative for solutions of fuzzy fractional Volterra and Fredholm integrodifferential equations. Math Methods Appl Sci 46(7):7807–7834

    Article  MathSciNet  Google Scholar 

  • Al-Aqrabi H, Johnson AP, Hill R (2019) Dynamic multiparty authentication using cryptographic hardware for the internet of things. In: 2019 IEEE smart world, ubiquitous intelligence & computing, advanced & trusted computing, scalable computing & communications, cloud & big data computing, internet of people and smart city innovation

  • Alshammari M, Al-Smadi M, Arqub OA, Hashim I, Alias MA (2020) Residual series representation algorithm for solving fuzzy duffing oscillator equations. Symmetry 12(4):572

    Article  ADS  Google Scholar 

  • Banerjee M, Lee J, Choo KK (2018) A blockchain future for internet of things security: a position paper. Digit Commun Netw 4(3):149–160

    Article  Google Scholar 

  • Canetti R, Fuller B, Paneth O, Reyzin L, Smith A (2021) Reusable fuzzy extractors for low-entropy distributions. J Cryptol 34(1):1–33

    Article  MathSciNet  Google Scholar 

  • Dhoot A, Manjul M, Devgan SK, Nazarov AN, Pankaj (2021) Enhanced lightweight and secure session key establishment protocol for smart home inhabitants. J Discrete Math Sci Cryptogr 24(5):1327–1335

    Article  Google Scholar 

  • Hui TK, Sherratt RS, Sánchez DD (2017) Major requirements for building smart homes in smart cities based on internet of things technologies. Futur Gener Comput Syst 76:358–369

    Article  Google Scholar 

  • Iqbal W, Abbas H, Rauf B, Bangash YA, Amjad MF, Hemani A (2021) PCSS: privacy preserving communication scheme for SDN enabled smart homes. IEEE Sens J 22(18):17677–17690

    Article  ADS  Google Scholar 

  • Jabbar WA, Alsibai MH, Amran NS, Mahayadin SK (2018) Design and implementation of IoT-based automation system for smart home. In: 2018 international symposium on networks, computers and communications (ISNCC). IEEE, pp 1–6

  • Khari M, Garg AK, Gandomi AH, Gupta R, Patan R, Balusamy B (2019) Securing data in internet of things (IoT) using cryptography and steganography techniques. IEEE Trans Syst Man Cybern Syst 50(1):73–80

    Article  Google Scholar 

  • Kumar P, Chouhan L (2021) A secure authentication scheme for IoT application in smart home. Peer-to-Peer Netw Appl 14(1):420–438

    Article  Google Scholar 

  • Mahendran RK, Velusamy P (2020) A secure fuzzy extractor based biometric key authentication scheme for body sensor network in internet of medical things. Comput Commun 153:545–552

    Article  Google Scholar 

  • Mahmud S, Ahmed S, Shikder K (2019) A smart home automation and metering system using internet of things (IoT). In: 2019 international conference on robotics, electrical and signal processing techniques (ICREST). IEEE, pp 451–454

  • Mamun M, Miyaji A, Luv R, Su C (2021) A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT. Peer-to-Peer Netw Appl 14(2):708–721

    Article  Google Scholar 

  • Mbarek B, Ge M, Pitner T (2021) Trust-based authentication for smart home systems. Wirel Pers Commun 117(3):2157–2172

    Article  Google Scholar 

  • Nimmy K, Sankaran S, Achuthan K, Calyam P (2021) Lightweight and privacy-preserving remote user authentication for smart homes. IEEE Access 10:176–190

    Article  Google Scholar 

  • Nyangaresi VO (2021) ECC based authentication scheme for smart homes. In: 2021 International Symposium ELMAR. IEEE, pp 5–10

  • Pawar S, Kithani V, Ahuja S, Sahu S (2018) Smart home security using IoT and face recognition. In: 2018 fourth international conference on computing communication control and automation (ICCUBEA). IEEE, pp 1–6

  • Qashlan A, Nanda P, He X, Mohanty M (2021) Privacy-preserving mechanism in smart home using blockchain. IEEE Access 9:103651–103669

    Article  Google Scholar 

  • Ray AK, Bagwari A (2020) IoT based smart home: security aspects and security architecture. In: 2020 IEEE 9th international conference on communication systems and network technologies (CSNT). IEEE, pp 218–222

  • Sadhukhan D, Ray S, Biswas GP, Khan MK, Dasgupta M (2021) A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography. J Supercomput 77(2):1114–1151

    Article  Google Scholar 

  • Sajeev A, Rajamani HS (2020) Cyber-attacks on smart home energy management systems under aggregators. In: 2020 international conference on communications, computing, cybersecurity, and informatics (CCCI). IEEE, pp 1–5

  • Shuai M, Yu N, Wang H, Xiong L (2019) Anonymous authentication scheme for smart home environment with provable security. Comput Secur 86:132–146

    Article  Google Scholar 

  • Tanveer M, Abbas G, Abbas ZH, Bilal M, Mukherjee A, Kwak KS (2021) LAKE-6SH: lightweight user authenticated key exchange for 6LoWPAN-based smart homes. IEEE Internet Things J 9(4):2578–2591

    Article  Google Scholar 

  • Wazid M, Das AK, Bhat V, Vasilakos AV (2020) LAM-CIoT: lightweight authentication mechanism in cloud-based IoT environment. J Netw Comput Appl 150:102496

    Article  Google Scholar 

  • Wen Y, Liu S, Han S (2018) Reusable fuzzy extractor from the decisional Diffie–Hellman assumption. Designs Codes Cryptogr 86(11):2495–2512

    Article  MathSciNet  Google Scholar 

  • Yang Q, Wang H (2021) Privacy-preserving transactive energy management for IoT-aided smart homes via blockchain. IEEE Internet Things J 8(14):11463–11475

    Article  Google Scholar 

Download references

Funding

There is no funding for this study.

Author information

Authors and Affiliations

Authors

Contributions

All the authors have participated in writing the manuscript and have revised the final version. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Sirisha Uppuluri.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants and/or animals performed by any of the authors.

Informed consent

There is no informed consent for this study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Uppuluri, S., Lakshmeeswari, G. Secure multiparty access and authentication based on advanced fuzzy extractor in smart home. Soft Comput 28, 4899–4914 (2024). https://doi.org/10.1007/s00500-023-09182-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-023-09182-w

Keywords

Navigation