Abstract
Smart home networks today span from technological advances that introduced highly networked devices of high density to applications which are more vulnerable due to its increasingly invasive nature to personal space and data. Such networks are becoming susceptible to multiple types of attacks that are seen today with a high number of third-party framework vendors in increasing risk of malicious attack. In such scenarios, dynamic- or context-aware authentication may provide a reinforced measure that takes into account environmental changes or behavioral changes in the network to enable the administrator in the decision-making process. The following work intends to explore a methodology in the incorporation of context-based processing that attaches the context-based filtering intelligence deep within the IoT network at the data processing center.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Srivastava, J.R., Sudarshan, T.S.B.: Intelligent traffic management with wireless sensor networks. In: ACS International Conference on Computer Systems and Applications (2013)
Kim, Y., Yoo, S., Yoo, C.: DAoT: Dynamic and energy-aware authentication for smart home appliances in internet of things. In: IEEE International Conference on Consumer Electronics (2015)
Srividya, Ch., Rakesh, N.: Enhancement and performance analysis of epidemic routing protocol for delay tolerant networks. In: International Conference on Inventive Systems and Control, pp. 1–5 (2017)
Ashwini, M., Rakesh, N.: Enhancement and performance analysis of LEACH algorithm in IoT. In: International Conference on Inventive Systems and Control (2017)
Lakshmi, R.V., Krishnan, D., Parvathy S., Vishnudatha, K., Poroor, J., Dhar, A.: JPermit: usable and secure registration of guest-phones into enterprise VoIP network. In: International Conference on Advances in Computer Engineering (2010)
Manmadhan, N., Achuthan, K.: Behavioural analysis for prevention of intranet information leakage. In: International Conference on Advances in Computing, Communications and Informatics (2014)
Staudemeyer, R.C., Omlin, C.W.: Extracting salient features for network intrusion detection using machine learning methods. S. Afr. Comput. J. 52 (2014)
Santoso, F., Yun, N.: Securing IoT for smart home system. In: IEEE International Symposium on Consumer Electronics (2015)
Lee, W., Stolfo, S., Mok, K.: Mining in data-flow environment: experience in network intrusion detection. In: Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 114–124 (1999)
Hodo, E., Bellekens, X., et al.: Threat analysis of IoT networks using artificial neural network intrusion detection system. In: International Symposium on Networks, Computers and Communications (2016)
Habib, K., Leister, W.: Context-aware authentication for the internet of things. In: The Eleventh International Conference on Autonomic and Autonomous Systems (2015)
Friedman, J., Hastie, T., Tibshirani, R.: Additive logistic regression: a statistical view of boosting. In: Annals of Statistics, vol. 028 (2000)
Acknowledgements
This research is supported by Amrita School of Engineering, Bangalore.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sreedharan, S., Rakesh, N. (2019). Securitization of Smart Home Network Using Dynamic Authentication. In: Smys, S., Bestak, R., Chen, JZ., Kotuliak, I. (eds) International Conference on Computer Networks and Communication Technologies. Lecture Notes on Data Engineering and Communications Technologies, vol 15. Springer, Singapore. https://doi.org/10.1007/978-981-10-8681-6_27
Download citation
DOI: https://doi.org/10.1007/978-981-10-8681-6_27
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8680-9
Online ISBN: 978-981-10-8681-6
eBook Packages: EngineeringEngineering (R0)