Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks

In smart home environments, the interaction between a remote user and devices commonly occurs through a gateway, necessitating the need for robust user authentication. Despite numerous state-of-the-art user-authentication schemes proposed over the years, these schemes still suffer from security vuln...

Full description

Bibliographic Details
Main Authors: Iqra Asghar, Muhammad Ayaz Khan, Tahir Ahmad, Subhan Ullah, Khwaja Mansoor ul Hassan, Attaullah Buriro
Format: Article
Language:English
Published: MDPI AG 2023-08-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/23/16/7268
_version_ 1797583183599894528
author Iqra Asghar
Muhammad Ayaz Khan
Tahir Ahmad
Subhan Ullah
Khwaja Mansoor ul Hassan
Attaullah Buriro
author_facet Iqra Asghar
Muhammad Ayaz Khan
Tahir Ahmad
Subhan Ullah
Khwaja Mansoor ul Hassan
Attaullah Buriro
author_sort Iqra Asghar
collection DOAJ
description In smart home environments, the interaction between a remote user and devices commonly occurs through a gateway, necessitating the need for robust user authentication. Despite numerous state-of-the-art user-authentication schemes proposed over the years, these schemes still suffer from security vulnerabilities exploited by the attackers. One severe physical attack is the node capture attack, which allows adversaries to compromise the security of the entire scheme. This research paper advances the state of the art by conducting a security analysis of user-authentication approaches regarding their vulnerability to node capture attacks resulting in revelations of several security weaknesses. To this end, we propose a secure user-authentication scheme to counter node capture attacks in smart home environments. To validate the effectiveness of our proposed scheme, we employ the BAN logic and ProVerif tool for verification. Lastly, we conduct performance analysis to validate the lightweight nature of our user-authentication scheme, making it suitable for IoT-based smart home environments.
first_indexed 2024-03-10T23:35:17Z
format Article
id doaj.art-0ac6a5ad8e744bf19ae0ea0c950ce697
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-10T23:35:17Z
publishDate 2023-08-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-0ac6a5ad8e744bf19ae0ea0c950ce6972023-11-19T02:59:10ZengMDPI AGSensors1424-82202023-08-012316726810.3390/s23167268Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture AttacksIqra Asghar0Muhammad Ayaz Khan1Tahir Ahmad2Subhan Ullah3Khwaja Mansoor ul Hassan4Attaullah Buriro5Department of Cybersecurity, Air University Islamabad, Islamabad 44000, PakistanDepartment of Computer Science, Air University Islamabad, Islamabad 44000, PakistanCenter for Cybersecurity, Brunno Kessler Foundation, 38123 Trento, ItalyFaculty of Computer Science, National University of Computer and Emerging Sciences (NUCES-FAST), Islamabad 44000, PakistanDepartment of Cybersecurity, Air University Islamabad, Islamabad 44000, PakistanFaculty of Engineering, Free University Bozen-Bolzano, 39100 Bolzano, ItalyIn smart home environments, the interaction between a remote user and devices commonly occurs through a gateway, necessitating the need for robust user authentication. Despite numerous state-of-the-art user-authentication schemes proposed over the years, these schemes still suffer from security vulnerabilities exploited by the attackers. One severe physical attack is the node capture attack, which allows adversaries to compromise the security of the entire scheme. This research paper advances the state of the art by conducting a security analysis of user-authentication approaches regarding their vulnerability to node capture attacks resulting in revelations of several security weaknesses. To this end, we propose a secure user-authentication scheme to counter node capture attacks in smart home environments. To validate the effectiveness of our proposed scheme, we employ the BAN logic and ProVerif tool for verification. Lastly, we conduct performance analysis to validate the lightweight nature of our user-authentication scheme, making it suitable for IoT-based smart home environments.https://www.mdpi.com/1424-8220/23/16/7268smart home securityuser authenticationnode capture attack
spellingShingle Iqra Asghar
Muhammad Ayaz Khan
Tahir Ahmad
Subhan Ullah
Khwaja Mansoor ul Hassan
Attaullah Buriro
Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks
Sensors
smart home security
user authentication
node capture attack
title Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks
title_full Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks
title_fullStr Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks
title_full_unstemmed Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks
title_short Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks
title_sort fortifying smart home security a robust and efficient user authentication scheme to counter node capture attacks
topic smart home security
user authentication
node capture attack
url https://www.mdpi.com/1424-8220/23/16/7268
work_keys_str_mv AT iqraasghar fortifyingsmarthomesecurityarobustandefficientuserauthenticationschemetocounternodecaptureattacks
AT muhammadayazkhan fortifyingsmarthomesecurityarobustandefficientuserauthenticationschemetocounternodecaptureattacks
AT tahirahmad fortifyingsmarthomesecurityarobustandefficientuserauthenticationschemetocounternodecaptureattacks
AT subhanullah fortifyingsmarthomesecurityarobustandefficientuserauthenticationschemetocounternodecaptureattacks
AT khwajamansoorulhassan fortifyingsmarthomesecurityarobustandefficientuserauthenticationschemetocounternodecaptureattacks
AT attaullahburiro fortifyingsmarthomesecurityarobustandefficientuserauthenticationschemetocounternodecaptureattacks