Abstract
Smart home (SH) technology is a new IoT application that allows users to remotely control household appliances. It provides several facilities like light control, smart locks, smoke detection, temperature monitoring, etc. Smart home domain needs an anonymous and efficient authentication scheme to ensure secure multiparty communications because of the insecure communication channel. Several authentication schemes were developed but it does not require multiparty authentication and are not secure in multiparty access. Thus, we propose a secure multiparty access and authentication based on advanced fuzzy extractor (SMAA_AFE) system that allows only the valid user to access the devices in SH. The proposed method consists of four phases such as sensor node (SN) registration phase, smart user (SU) registration phase, smart user authentication phase, password, and biometric update phase. All SUs and the SNs of the SH are registered and during the authentication phase, the user will be authenticated using the SMAA_AFE protocol. Here, the biometric data of the user is needed for authentication. When the user imprints his fingerprint, a valid biometric key will be generated only if a fixed number of members authenticate the user. The generated key is robust because we use SHA-256 hashing function. We use KNN to calculate the distance between the registered biometric data and the data given during authentication because it predicts more accurately. SMAA_AFE protocol improves security from various attacks. The security features of the proposed method are analyzed and its performance is compared to other authentication protocols focusing on communication and computation costs. The results demonstrate that the proposed method outperforms other protocols in terms of communication cost, requiring only 1188 bits, and computation cost, with an execution time of 6.20 ms.
Similar content being viewed by others
Data availability
All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by Sirisha Uppuluri, G. Lakshmeeswari. The first draft of the manuscript was written by Sirisha Uppuluri and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript. Conceptualization: Sirisha Uppuluri; Methodology: Sirisha Uppuluri, G. Lakshmeeswari; Formal analysis and investigation: Sirisha Uppuluri; Writing - original draft preparation: Sirisha Uppuluri, G. Lakshmeeswari; Writing - review and editing: Sirisha Uppuluri; Supervision: G. Lakshmeeswari.
References
Abu Arqub O (2017) Adaptation of reproducing kernel algorithm for solving fuzzy Fredholm–Volterra integrodifferential equations. Neural Comput Appl 28:1591–1610
Abu Arqub O, Singh J, Maayah B, Alhodaly M (2023a) Reproducing kernel approach for numerical solutions of fuzzy fractional initial value problems under the Mittag–Leffler kernel differential operator. Math Methods Appl Sci 46(7):7965–7986
Abu Arqub O, Singh J, Alhodaly M (2023b) Adaptation of kernel functions-based approach with Atangana–Baleanu–Caputo distributed order derivative for solutions of fuzzy fractional Volterra and Fredholm integrodifferential equations. Math Methods Appl Sci 46(7):7807–7834
Al-Aqrabi H, Johnson AP, Hill R (2019) Dynamic multiparty authentication using cryptographic hardware for the internet of things. In: 2019 IEEE smart world, ubiquitous intelligence & computing, advanced & trusted computing, scalable computing & communications, cloud & big data computing, internet of people and smart city innovation
Alshammari M, Al-Smadi M, Arqub OA, Hashim I, Alias MA (2020) Residual series representation algorithm for solving fuzzy duffing oscillator equations. Symmetry 12(4):572
Banerjee M, Lee J, Choo KK (2018) A blockchain future for internet of things security: a position paper. Digit Commun Netw 4(3):149–160
Canetti R, Fuller B, Paneth O, Reyzin L, Smith A (2021) Reusable fuzzy extractors for low-entropy distributions. J Cryptol 34(1):1–33
Dhoot A, Manjul M, Devgan SK, Nazarov AN, Pankaj (2021) Enhanced lightweight and secure session key establishment protocol for smart home inhabitants. J Discrete Math Sci Cryptogr 24(5):1327–1335
Hui TK, Sherratt RS, Sánchez DD (2017) Major requirements for building smart homes in smart cities based on internet of things technologies. Futur Gener Comput Syst 76:358–369
Iqbal W, Abbas H, Rauf B, Bangash YA, Amjad MF, Hemani A (2021) PCSS: privacy preserving communication scheme for SDN enabled smart homes. IEEE Sens J 22(18):17677–17690
Jabbar WA, Alsibai MH, Amran NS, Mahayadin SK (2018) Design and implementation of IoT-based automation system for smart home. In: 2018 international symposium on networks, computers and communications (ISNCC). IEEE, pp 1–6
Khari M, Garg AK, Gandomi AH, Gupta R, Patan R, Balusamy B (2019) Securing data in internet of things (IoT) using cryptography and steganography techniques. IEEE Trans Syst Man Cybern Syst 50(1):73–80
Kumar P, Chouhan L (2021) A secure authentication scheme for IoT application in smart home. Peer-to-Peer Netw Appl 14(1):420–438
Mahendran RK, Velusamy P (2020) A secure fuzzy extractor based biometric key authentication scheme for body sensor network in internet of medical things. Comput Commun 153:545–552
Mahmud S, Ahmed S, Shikder K (2019) A smart home automation and metering system using internet of things (IoT). In: 2019 international conference on robotics, electrical and signal processing techniques (ICREST). IEEE, pp 451–454
Mamun M, Miyaji A, Luv R, Su C (2021) A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT. Peer-to-Peer Netw Appl 14(2):708–721
Mbarek B, Ge M, Pitner T (2021) Trust-based authentication for smart home systems. Wirel Pers Commun 117(3):2157–2172
Nimmy K, Sankaran S, Achuthan K, Calyam P (2021) Lightweight and privacy-preserving remote user authentication for smart homes. IEEE Access 10:176–190
Nyangaresi VO (2021) ECC based authentication scheme for smart homes. In: 2021 International Symposium ELMAR. IEEE, pp 5–10
Pawar S, Kithani V, Ahuja S, Sahu S (2018) Smart home security using IoT and face recognition. In: 2018 fourth international conference on computing communication control and automation (ICCUBEA). IEEE, pp 1–6
Qashlan A, Nanda P, He X, Mohanty M (2021) Privacy-preserving mechanism in smart home using blockchain. IEEE Access 9:103651–103669
Ray AK, Bagwari A (2020) IoT based smart home: security aspects and security architecture. In: 2020 IEEE 9th international conference on communication systems and network technologies (CSNT). IEEE, pp 218–222
Sadhukhan D, Ray S, Biswas GP, Khan MK, Dasgupta M (2021) A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography. J Supercomput 77(2):1114–1151
Sajeev A, Rajamani HS (2020) Cyber-attacks on smart home energy management systems under aggregators. In: 2020 international conference on communications, computing, cybersecurity, and informatics (CCCI). IEEE, pp 1–5
Shuai M, Yu N, Wang H, Xiong L (2019) Anonymous authentication scheme for smart home environment with provable security. Comput Secur 86:132–146
Tanveer M, Abbas G, Abbas ZH, Bilal M, Mukherjee A, Kwak KS (2021) LAKE-6SH: lightweight user authenticated key exchange for 6LoWPAN-based smart homes. IEEE Internet Things J 9(4):2578–2591
Wazid M, Das AK, Bhat V, Vasilakos AV (2020) LAM-CIoT: lightweight authentication mechanism in cloud-based IoT environment. J Netw Comput Appl 150:102496
Wen Y, Liu S, Han S (2018) Reusable fuzzy extractor from the decisional Diffie–Hellman assumption. Designs Codes Cryptogr 86(11):2495–2512
Yang Q, Wang H (2021) Privacy-preserving transactive energy management for IoT-aided smart homes via blockchain. IEEE Internet Things J 8(14):11463–11475
Funding
There is no funding for this study.
Author information
Authors and Affiliations
Contributions
All the authors have participated in writing the manuscript and have revised the final version. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants and/or animals performed by any of the authors.
Informed consent
There is no informed consent for this study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Uppuluri, S., Lakshmeeswari, G. Secure multiparty access and authentication based on advanced fuzzy extractor in smart home. Soft Comput 28, 4899–4914 (2024). https://doi.org/10.1007/s00500-023-09182-w
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-023-09182-w