Skip to main content

Securitization of Smart Home Network Using Dynamic Authentication

  • Conference paper
  • First Online:
International Conference on Computer Networks and Communication Technologies

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 15))

Abstract

Smart home networks today span from technological advances that introduced highly networked devices of high density to applications which are more vulnerable due to its increasingly invasive nature to personal space and data. Such networks are becoming susceptible to multiple types of attacks that are seen today with a high number of third-party framework vendors in increasing risk of malicious attack. In such scenarios, dynamic- or context-aware authentication may provide a reinforced measure that takes into account environmental changes or behavioral changes in the network to enable the administrator in the decision-making process. The following work intends to explore a methodology in the incorporation of context-based processing that attaches the context-based filtering intelligence deep within the IoT network at the data processing center.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Srivastava, J.R., Sudarshan, T.S.B.: Intelligent traffic management with wireless sensor networks. In: ACS International Conference on Computer Systems and Applications (2013)

    Google Scholar 

  2. Kim, Y., Yoo, S., Yoo, C.: DAoT: Dynamic and energy-aware authentication for smart home appliances in internet of things. In: IEEE International Conference on Consumer Electronics (2015)

    Google Scholar 

  3. Srividya, Ch., Rakesh, N.: Enhancement and performance analysis of epidemic routing protocol for delay tolerant networks. In: International Conference on Inventive Systems and Control, pp. 1–5 (2017)

    Google Scholar 

  4. Ashwini, M., Rakesh, N.: Enhancement and performance analysis of LEACH algorithm in IoT. In: International Conference on Inventive Systems and Control (2017)

    Google Scholar 

  5. Lakshmi, R.V., Krishnan, D., Parvathy S., Vishnudatha, K., Poroor, J., Dhar, A.: JPermit: usable and secure registration of guest-phones into enterprise VoIP network. In: International Conference on Advances in Computer Engineering (2010)

    Google Scholar 

  6. Manmadhan, N., Achuthan, K.: Behavioural analysis for prevention of intranet information leakage. In: International Conference on Advances in Computing, Communications and Informatics (2014)

    Google Scholar 

  7. Staudemeyer, R.C., Omlin, C.W.: Extracting salient features for network intrusion detection using machine learning methods. S. Afr. Comput. J. 52 (2014)

    Google Scholar 

  8. Santoso, F., Yun, N.: Securing IoT for smart home system. In: IEEE International Symposium on Consumer Electronics (2015)

    Google Scholar 

  9. Lee, W., Stolfo, S., Mok, K.: Mining in data-flow environment: experience in network intrusion detection. In: Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 114–124 (1999)

    Google Scholar 

  10. Hodo, E., Bellekens, X., et al.: Threat analysis of IoT networks using artificial neural network intrusion detection system. In: International Symposium on Networks, Computers and Communications (2016)

    Google Scholar 

  11. Habib, K., Leister, W.: Context-aware authentication for the internet of things. In: The Eleventh International Conference on Autonomic and Autonomous Systems (2015)

    Google Scholar 

  12. Friedman, J., Hastie, T., Tibshirani, R.: Additive logistic regression: a statistical view of boosting. In: Annals of Statistics, vol. 028 (2000)

    Google Scholar 

Download references

Acknowledgements

This research is supported by Amrita School of Engineering, Bangalore.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shruthi Sreedharan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sreedharan, S., Rakesh, N. (2019). Securitization of Smart Home Network Using Dynamic Authentication. In: Smys, S., Bestak, R., Chen, JZ., Kotuliak, I. (eds) International Conference on Computer Networks and Communication Technologies. Lecture Notes on Data Engineering and Communications Technologies, vol 15. Springer, Singapore. https://doi.org/10.1007/978-981-10-8681-6_27

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8681-6_27

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8680-9

  • Online ISBN: 978-981-10-8681-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics