Skip to main content

A Secure Authentication Scheme for Smart Home Based on Trusted Execution Environment

  • Conference paper
  • First Online:
Advances in Smart Vehicular Technology, Transportation, Communication and Applications

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 347))

Abstract

With the rapid growth of the smart home, remote control of devices within a smart home environment has become a primary and essential function. However, there are significant security vulnerabilities in the process of remote control. This paper proposes a secure authentication scheme based on a trusted execution environment for smart home remote control. The proposed scheme generates a session key between smart home devices and users. This session key ensures that a user can securely control devices remotely and resist various well-known attacks. We also utilize the Real-or-Random model to demonstrate our scheme is provably secure. Besides, our work has lower computation and communication costs than other related methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Amintoosi, H., Nikooghadam, M., Kumari, S., Kumar, S., Chen, C.M.: TAMA: three-factor authentication for multi-server architecture. Hum.-Centric Comput. Inf. Sci. 11 (2021)

    Google Scholar 

  2. Banerjee, S., Odelu, V., Das, A.K., Chattopadhyay, S., Park, Y.: An efficient, anonymous and robust authentication scheme for smart home environments. Sensors 20(4), 1215 (2020)

    Google Scholar 

  3. Bao, Z., Shi, W., Kumari, S., Kong, Z.Y., Chen, C.M.: Lockmix: a secure and privacy-preserving mix service for bitcoin anonymity. Int. J. Inf. Secur. 19(3), 311–321 (2020)

    Google Scholar 

  4. Chen, C.M., Deng, X., Gan, W., Chen, J., Islam, S.: A secure blockchain-based group key agreement protocol for IoT. J. Supercomput. 77(8), 9046–9068 (2021)

    Article  Google Scholar 

  5. Chen, C.M., Xiang, B., Wang, K.H., Yeh, K.H., Wu, T.Y.: A robust mutual authentication with a key agreement scheme for session initiation protocol. Appl. Sci. 8(10), 1789 (2018)

    Google Scholar 

  6. Chen, Y.Q., Zhou, B., Zhang, M., Chen, C.M.: Using IoT technology for computer-integrated manufacturing systems in the semiconductor industry. Appl. Soft Comput. 89, 106065 (2020)

    Google Scholar 

  7. Dey, S., Hossain, A.: Session-key establishment and authentication in a smart home network using public key cryptography. IEEE Sens. Lett. 3(4), 1–4 (2019)

    Article  Google Scholar 

  8. Fakroon, M., Alshahrani, M., Gebali, F., Traore, I.: Secure remote anonymous user authentication scheme for smart home environment. Internet Things 9, 100158 (2020)

    Google Scholar 

  9. Gomez, C., Paradells, J.: Wireless home automation networks: a survey of architectures and technologies. IEEE Commun. Mag. 48(6), 92–101 (2010)

    Article  Google Scholar 

  10. Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (IoT): a vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 29(7), 1645–1660 (2013)

    Article  Google Scholar 

  11. Jeong, J., Chung, M.Y., Choo, H.: Integrated OTP-based user authentication scheme using smart cards in home networks. In: Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), pp. 294–294. IEEE (2008)

    Google Scholar 

  12. Kim, H.J., Kim, H.S.: \({{\rm AUTH}}_{{\rm HOTP}}\)-HOTP based authentication scheme over home network environment. In: International Conference on Computational Science and Its Applications, pp. 622–637. Springer (2011)

    Google Scholar 

  13. Kim, J.E., Boulos, G., Yackovich, J., Barth, T., Beckel, C., Mosse, D.: Seamless integration of heterogeneous devices and access control in smart homes. In: 2012 Eighth International Conference on Intelligent Environments, pp. 206–213. IEEE (2012)

    Google Scholar 

  14. Kumar, P., Gurtov, A., Iinatti, J., Ylianttila, M., Sain, M.: Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sens. J. 16(1), 254–264 (2015)

    Article  Google Scholar 

  15. Kumari, A., Kumar, V., Abbasi, M.Y., Kumari, S., Chaudhary, P., Chen, C.M.: CSEF: cloud-based secure and efficient framework for smart medical system using ECC. IEEE Access 8, 107838–107852 (2020)

    Article  Google Scholar 

  16. Li, Y.: Design of a key establishment protocol for smart home energy management system. In: 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks, pp. 88–93. IEEE (2013)

    Google Scholar 

  17. Li, Z., Miao, Q., Chaudhry, S.A., Chen, C.M.: A provably secure and lightweight mutual authentication protocol in fog-enabled social internet of vehicles. Int. J. Distrib. Sens. Netw. 18(6), 15501329221104332 (2022)

    Google Scholar 

  18. Liu, S., Chen, C.M.: Comments on “a secure and lightweight drones-access protocol for smart city surveillance”. IEEE Trans. Intell. Transp. Syst. (2022)

    Google Scholar 

  19. Mei, Q., Xiong, H., Chen, Y.C., Chen, C.M.: Blockchain-enabled privacy-preserving authentication mechanism for transportation cps with cloud-edge computing. IEEE Trans. Eng. Manag. (2022)

    Google Scholar 

  20. Naoui, S., Elhdhili, M.H., Saidane, L.A.: Novel smart home authentication protocol LRP-shap. In: 2019 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–6. IEEE (2019)

    Google Scholar 

  21. Renuka, K., Kumar, S., Kumari, S., Chen, C.M.: Cryptanalysis and improvement of a privacy-preserving three-factor authentication protocol for wireless sensor networks. Sensors 19(21), 4625 (2019)

    Google Scholar 

  22. Santoso, F.K., Vun, N.C.: Securing iot for smart home system. In: 2015 International Symposium on Consumer Electronics (ISCE), pp. 1–2. IEEE (2015)

    Google Scholar 

  23. Shuai, M., Yu, N., Wang, H., Xiong, L.: Anonymous authentication scheme for smart home environment with provable security. Comput. Secur. 86, 132–146 (2019)

    Article  Google Scholar 

  24. Vaidya, B., Park, J.H., Yeo, S.S., Rodrigues, J.J.: Robust one-time password authentication scheme using smart card for home network environment. Comput. Commun. 34(3), 326–336 (2011)

    Article  Google Scholar 

  25. Xiong, H., Hou, Y., Huang, X., Zhao, Y., Chen, C.M.: Heterogeneous signcryption scheme from IBC to PKI with equality test for WBANs. IEEE Syst. J. (2021)

    Google Scholar 

  26. Yavari, M., Safkhani, M., Kumari, S., Kumar, S., Chen, C.M.: An improved blockchain-based authentication protocol for IoT network management. Secur. Commun. Netw. 2020 (2020)

    Google Scholar 

  27. Yu, B., Li, H.: Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor internet of things. Int. J. Distrib. Sens. Netw. 15(9), 1550147719879379 (2019)

    Google Scholar 

Download references

Acknowledgements

This research was partially supported by National Key Research and Development Program of China (Grant No. 2019YFE0118700), and Science and Technology Project of China Southern Power Grid Corporation (Grant No. 066600KK52200016).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yi Luo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hu, H., Ou, J., Qian, B., Luo, Y., Xiao, Y., Chen, Z. (2023). A Secure Authentication Scheme for Smart Home Based on Trusted Execution Environment. In: Ni, S., Wu, TY., Geng, J., Chu, SC., Tsihrintzis, G.A. (eds) Advances in Smart Vehicular Technology, Transportation, Communication and Applications. Smart Innovation, Systems and Technologies, vol 347. Springer, Singapore. https://doi.org/10.1007/978-981-99-0848-6_43

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-0848-6_43

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-0847-9

  • Online ISBN: 978-981-99-0848-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics