Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks
In smart home environments, the interaction between a remote user and devices commonly occurs through a gateway, necessitating the need for robust user authentication. Despite numerous state-of-the-art user-authentication schemes proposed over the years, these schemes still suffer from security vuln...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-08-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/23/16/7268 |
_version_ | 1797583183599894528 |
---|---|
author | Iqra Asghar Muhammad Ayaz Khan Tahir Ahmad Subhan Ullah Khwaja Mansoor ul Hassan Attaullah Buriro |
author_facet | Iqra Asghar Muhammad Ayaz Khan Tahir Ahmad Subhan Ullah Khwaja Mansoor ul Hassan Attaullah Buriro |
author_sort | Iqra Asghar |
collection | DOAJ |
description | In smart home environments, the interaction between a remote user and devices commonly occurs through a gateway, necessitating the need for robust user authentication. Despite numerous state-of-the-art user-authentication schemes proposed over the years, these schemes still suffer from security vulnerabilities exploited by the attackers. One severe physical attack is the node capture attack, which allows adversaries to compromise the security of the entire scheme. This research paper advances the state of the art by conducting a security analysis of user-authentication approaches regarding their vulnerability to node capture attacks resulting in revelations of several security weaknesses. To this end, we propose a secure user-authentication scheme to counter node capture attacks in smart home environments. To validate the effectiveness of our proposed scheme, we employ the BAN logic and ProVerif tool for verification. Lastly, we conduct performance analysis to validate the lightweight nature of our user-authentication scheme, making it suitable for IoT-based smart home environments. |
first_indexed | 2024-03-10T23:35:17Z |
format | Article |
id | doaj.art-0ac6a5ad8e744bf19ae0ea0c950ce697 |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-03-10T23:35:17Z |
publishDate | 2023-08-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-0ac6a5ad8e744bf19ae0ea0c950ce6972023-11-19T02:59:10ZengMDPI AGSensors1424-82202023-08-012316726810.3390/s23167268Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture AttacksIqra Asghar0Muhammad Ayaz Khan1Tahir Ahmad2Subhan Ullah3Khwaja Mansoor ul Hassan4Attaullah Buriro5Department of Cybersecurity, Air University Islamabad, Islamabad 44000, PakistanDepartment of Computer Science, Air University Islamabad, Islamabad 44000, PakistanCenter for Cybersecurity, Brunno Kessler Foundation, 38123 Trento, ItalyFaculty of Computer Science, National University of Computer and Emerging Sciences (NUCES-FAST), Islamabad 44000, PakistanDepartment of Cybersecurity, Air University Islamabad, Islamabad 44000, PakistanFaculty of Engineering, Free University Bozen-Bolzano, 39100 Bolzano, ItalyIn smart home environments, the interaction between a remote user and devices commonly occurs through a gateway, necessitating the need for robust user authentication. Despite numerous state-of-the-art user-authentication schemes proposed over the years, these schemes still suffer from security vulnerabilities exploited by the attackers. One severe physical attack is the node capture attack, which allows adversaries to compromise the security of the entire scheme. This research paper advances the state of the art by conducting a security analysis of user-authentication approaches regarding their vulnerability to node capture attacks resulting in revelations of several security weaknesses. To this end, we propose a secure user-authentication scheme to counter node capture attacks in smart home environments. To validate the effectiveness of our proposed scheme, we employ the BAN logic and ProVerif tool for verification. Lastly, we conduct performance analysis to validate the lightweight nature of our user-authentication scheme, making it suitable for IoT-based smart home environments.https://www.mdpi.com/1424-8220/23/16/7268smart home securityuser authenticationnode capture attack |
spellingShingle | Iqra Asghar Muhammad Ayaz Khan Tahir Ahmad Subhan Ullah Khwaja Mansoor ul Hassan Attaullah Buriro Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks Sensors smart home security user authentication node capture attack |
title | Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks |
title_full | Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks |
title_fullStr | Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks |
title_full_unstemmed | Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks |
title_short | Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks |
title_sort | fortifying smart home security a robust and efficient user authentication scheme to counter node capture attacks |
topic | smart home security user authentication node capture attack |
url | https://www.mdpi.com/1424-8220/23/16/7268 |
work_keys_str_mv | AT iqraasghar fortifyingsmarthomesecurityarobustandefficientuserauthenticationschemetocounternodecaptureattacks AT muhammadayazkhan fortifyingsmarthomesecurityarobustandefficientuserauthenticationschemetocounternodecaptureattacks AT tahirahmad fortifyingsmarthomesecurityarobustandefficientuserauthenticationschemetocounternodecaptureattacks AT subhanullah fortifyingsmarthomesecurityarobustandefficientuserauthenticationschemetocounternodecaptureattacks AT khwajamansoorulhassan fortifyingsmarthomesecurityarobustandefficientuserauthenticationschemetocounternodecaptureattacks AT attaullahburiro fortifyingsmarthomesecurityarobustandefficientuserauthenticationschemetocounternodecaptureattacks |