Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes
Highly sensitive information about people’s social life and daily activities flows in smart home networks. As such, if attackers can manage to capture or even eavesdrop on this information, the privacy of the users can be compromised. The consequences can be far-reaching, such as knowing the status...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-12-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/12/24/12688 |
_version_ | 1797461656159125504 |
---|---|
author | Vincent Omollo Nyangaresi Zaid Ameen Abduljabbar Keyan Abdul-Aziz Mutlaq Junchao Ma Dhafer G. Honi Abdulla J. Y. Aldarwish Iman Qays Abduljaleel |
author_facet | Vincent Omollo Nyangaresi Zaid Ameen Abduljabbar Keyan Abdul-Aziz Mutlaq Junchao Ma Dhafer G. Honi Abdulla J. Y. Aldarwish Iman Qays Abduljaleel |
author_sort | Vincent Omollo Nyangaresi |
collection | DOAJ |
description | Highly sensitive information about people’s social life and daily activities flows in smart home networks. As such, if attackers can manage to capture or even eavesdrop on this information, the privacy of the users can be compromised. The consequences can be far-reaching, such as knowing the status of home occupancy that can then facilitate burglary. To address these challenges, approaches such as data aggregation and signcryption have been utilized. Elliptic curve cryptography, bilinear pairing, asymmetric key cryptosystem, blockchain, and exponential operations are among the most popular techniques deployed to design these security solutions. However, the computational, storage and communication complexities exhibited by the majority of these techniques are too high. This renders these techniques unsuitable for smart home components such as smart switches and sensors. Some of these schemes have centralized architectures, which present some single points of failure. In this paper, symmetric key authentication procedures are presented for smart home networks. The proposed protocol leverages on cryptographic primitives such as one-way hashing and bitwise exclusive-Or operations. The results indicate that this scheme incurs the lowest communication, storage, and computation costs compared to other related state-of-the-art techniques. Empirically, our protocol reduces the communication and computation complexities by 16.7% and 57.7%, respectively. In addition, it provides backward key secrecy, robust mutual authentication, anonymity, forward key secrecy, and unlinkability. Moreover, it can effectively prevent attacks such as impersonation, session hijacking, denial of service, packet replays, man-in-the-middle, and message eavesdropping. |
first_indexed | 2024-03-09T17:22:33Z |
format | Article |
id | doaj.art-e051fb97d1d44e948658f143fcec2611 |
institution | Directory Open Access Journal |
issn | 2076-3417 |
language | English |
last_indexed | 2024-03-09T17:22:33Z |
publishDate | 2022-12-01 |
publisher | MDPI AG |
record_format | Article |
series | Applied Sciences |
spelling | doaj.art-e051fb97d1d44e948658f143fcec26112023-11-24T13:03:01ZengMDPI AGApplied Sciences2076-34172022-12-0112241268810.3390/app122412688Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart HomesVincent Omollo Nyangaresi0Zaid Ameen Abduljabbar1Keyan Abdul-Aziz Mutlaq2Junchao Ma3Dhafer G. Honi4Abdulla J. Y. Aldarwish5Iman Qays Abduljaleel6Faculty of Biological & Physical Sciences, Tom Mboya University, Homabay 40300, KenyaDepartment of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, IraqIT and Communication Center, University of Basrah, Basrah 61004, IraqCollege of Big Data and Internet, Shenzhen Technology University, Shenzhen 518118, ChinaDepartment of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, IraqDepartment of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, IraqDepartment of Computer Science, College of Computer Science and Information Technology, University of Basrah, Basrah 61004, IraqHighly sensitive information about people’s social life and daily activities flows in smart home networks. As such, if attackers can manage to capture or even eavesdrop on this information, the privacy of the users can be compromised. The consequences can be far-reaching, such as knowing the status of home occupancy that can then facilitate burglary. To address these challenges, approaches such as data aggregation and signcryption have been utilized. Elliptic curve cryptography, bilinear pairing, asymmetric key cryptosystem, blockchain, and exponential operations are among the most popular techniques deployed to design these security solutions. However, the computational, storage and communication complexities exhibited by the majority of these techniques are too high. This renders these techniques unsuitable for smart home components such as smart switches and sensors. Some of these schemes have centralized architectures, which present some single points of failure. In this paper, symmetric key authentication procedures are presented for smart home networks. The proposed protocol leverages on cryptographic primitives such as one-way hashing and bitwise exclusive-Or operations. The results indicate that this scheme incurs the lowest communication, storage, and computation costs compared to other related state-of-the-art techniques. Empirically, our protocol reduces the communication and computation complexities by 16.7% and 57.7%, respectively. In addition, it provides backward key secrecy, robust mutual authentication, anonymity, forward key secrecy, and unlinkability. Moreover, it can effectively prevent attacks such as impersonation, session hijacking, denial of service, packet replays, man-in-the-middle, and message eavesdropping.https://www.mdpi.com/2076-3417/12/24/12688anonymousauthenticationattacksIoTprivacysecurity |
spellingShingle | Vincent Omollo Nyangaresi Zaid Ameen Abduljabbar Keyan Abdul-Aziz Mutlaq Junchao Ma Dhafer G. Honi Abdulla J. Y. Aldarwish Iman Qays Abduljaleel Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes Applied Sciences anonymous authentication attacks IoT privacy security |
title | Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes |
title_full | Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes |
title_fullStr | Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes |
title_full_unstemmed | Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes |
title_short | Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes |
title_sort | energy efficient dynamic symmetric key based protocol for secure traffic exchanges in smart homes |
topic | anonymous authentication attacks IoT privacy security |
url | https://www.mdpi.com/2076-3417/12/24/12688 |
work_keys_str_mv | AT vincentomollonyangaresi energyefficientdynamicsymmetrickeybasedprotocolforsecuretrafficexchangesinsmarthomes AT zaidameenabduljabbar energyefficientdynamicsymmetrickeybasedprotocolforsecuretrafficexchangesinsmarthomes AT keyanabdulazizmutlaq energyefficientdynamicsymmetrickeybasedprotocolforsecuretrafficexchangesinsmarthomes AT junchaoma energyefficientdynamicsymmetrickeybasedprotocolforsecuretrafficexchangesinsmarthomes AT dhaferghoni energyefficientdynamicsymmetrickeybasedprotocolforsecuretrafficexchangesinsmarthomes AT abdullajyaldarwish energyefficientdynamicsymmetrickeybasedprotocolforsecuretrafficexchangesinsmarthomes AT imanqaysabduljaleel energyefficientdynamicsymmetrickeybasedprotocolforsecuretrafficexchangesinsmarthomes |