Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes

Highly sensitive information about people’s social life and daily activities flows in smart home networks. As such, if attackers can manage to capture or even eavesdrop on this information, the privacy of the users can be compromised. The consequences can be far-reaching, such as knowing the status...

Full description

Bibliographic Details
Main Authors: Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar, Keyan Abdul-Aziz Mutlaq, Junchao Ma, Dhafer G. Honi, Abdulla J. Y. Aldarwish, Iman Qays Abduljaleel
Format: Article
Language:English
Published: MDPI AG 2022-12-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/12/24/12688
_version_ 1797461656159125504
author Vincent Omollo Nyangaresi
Zaid Ameen Abduljabbar
Keyan Abdul-Aziz Mutlaq
Junchao Ma
Dhafer G. Honi
Abdulla J. Y. Aldarwish
Iman Qays Abduljaleel
author_facet Vincent Omollo Nyangaresi
Zaid Ameen Abduljabbar
Keyan Abdul-Aziz Mutlaq
Junchao Ma
Dhafer G. Honi
Abdulla J. Y. Aldarwish
Iman Qays Abduljaleel
author_sort Vincent Omollo Nyangaresi
collection DOAJ
description Highly sensitive information about people’s social life and daily activities flows in smart home networks. As such, if attackers can manage to capture or even eavesdrop on this information, the privacy of the users can be compromised. The consequences can be far-reaching, such as knowing the status of home occupancy that can then facilitate burglary. To address these challenges, approaches such as data aggregation and signcryption have been utilized. Elliptic curve cryptography, bilinear pairing, asymmetric key cryptosystem, blockchain, and exponential operations are among the most popular techniques deployed to design these security solutions. However, the computational, storage and communication complexities exhibited by the majority of these techniques are too high. This renders these techniques unsuitable for smart home components such as smart switches and sensors. Some of these schemes have centralized architectures, which present some single points of failure. In this paper, symmetric key authentication procedures are presented for smart home networks. The proposed protocol leverages on cryptographic primitives such as one-way hashing and bitwise exclusive-Or operations. The results indicate that this scheme incurs the lowest communication, storage, and computation costs compared to other related state-of-the-art techniques. Empirically, our protocol reduces the communication and computation complexities by 16.7% and 57.7%, respectively. In addition, it provides backward key secrecy, robust mutual authentication, anonymity, forward key secrecy, and unlinkability. Moreover, it can effectively prevent attacks such as impersonation, session hijacking, denial of service, packet replays, man-in-the-middle, and message eavesdropping.
first_indexed 2024-03-09T17:22:33Z
format Article
id doaj.art-e051fb97d1d44e948658f143fcec2611
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-09T17:22:33Z
publishDate 2022-12-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-e051fb97d1d44e948658f143fcec26112023-11-24T13:03:01ZengMDPI AGApplied Sciences2076-34172022-12-0112241268810.3390/app122412688Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart HomesVincent Omollo Nyangaresi0Zaid Ameen Abduljabbar1Keyan Abdul-Aziz Mutlaq2Junchao Ma3Dhafer G. Honi4Abdulla J. Y. Aldarwish5Iman Qays Abduljaleel6Faculty of Biological & Physical Sciences, Tom Mboya University, Homabay 40300, KenyaDepartment of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, IraqIT and Communication Center, University of Basrah, Basrah 61004, IraqCollege of Big Data and Internet, Shenzhen Technology University, Shenzhen 518118, ChinaDepartment of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, IraqDepartment of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, IraqDepartment of Computer Science, College of Computer Science and Information Technology, University of Basrah, Basrah 61004, IraqHighly sensitive information about people’s social life and daily activities flows in smart home networks. As such, if attackers can manage to capture or even eavesdrop on this information, the privacy of the users can be compromised. The consequences can be far-reaching, such as knowing the status of home occupancy that can then facilitate burglary. To address these challenges, approaches such as data aggregation and signcryption have been utilized. Elliptic curve cryptography, bilinear pairing, asymmetric key cryptosystem, blockchain, and exponential operations are among the most popular techniques deployed to design these security solutions. However, the computational, storage and communication complexities exhibited by the majority of these techniques are too high. This renders these techniques unsuitable for smart home components such as smart switches and sensors. Some of these schemes have centralized architectures, which present some single points of failure. In this paper, symmetric key authentication procedures are presented for smart home networks. The proposed protocol leverages on cryptographic primitives such as one-way hashing and bitwise exclusive-Or operations. The results indicate that this scheme incurs the lowest communication, storage, and computation costs compared to other related state-of-the-art techniques. Empirically, our protocol reduces the communication and computation complexities by 16.7% and 57.7%, respectively. In addition, it provides backward key secrecy, robust mutual authentication, anonymity, forward key secrecy, and unlinkability. Moreover, it can effectively prevent attacks such as impersonation, session hijacking, denial of service, packet replays, man-in-the-middle, and message eavesdropping.https://www.mdpi.com/2076-3417/12/24/12688anonymousauthenticationattacksIoTprivacysecurity
spellingShingle Vincent Omollo Nyangaresi
Zaid Ameen Abduljabbar
Keyan Abdul-Aziz Mutlaq
Junchao Ma
Dhafer G. Honi
Abdulla J. Y. Aldarwish
Iman Qays Abduljaleel
Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes
Applied Sciences
anonymous
authentication
attacks
IoT
privacy
security
title Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes
title_full Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes
title_fullStr Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes
title_full_unstemmed Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes
title_short Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes
title_sort energy efficient dynamic symmetric key based protocol for secure traffic exchanges in smart homes
topic anonymous
authentication
attacks
IoT
privacy
security
url https://www.mdpi.com/2076-3417/12/24/12688
work_keys_str_mv AT vincentomollonyangaresi energyefficientdynamicsymmetrickeybasedprotocolforsecuretrafficexchangesinsmarthomes
AT zaidameenabduljabbar energyefficientdynamicsymmetrickeybasedprotocolforsecuretrafficexchangesinsmarthomes
AT keyanabdulazizmutlaq energyefficientdynamicsymmetrickeybasedprotocolforsecuretrafficexchangesinsmarthomes
AT junchaoma energyefficientdynamicsymmetrickeybasedprotocolforsecuretrafficexchangesinsmarthomes
AT dhaferghoni energyefficientdynamicsymmetrickeybasedprotocolforsecuretrafficexchangesinsmarthomes
AT abdullajyaldarwish energyefficientdynamicsymmetrickeybasedprotocolforsecuretrafficexchangesinsmarthomes
AT imanqaysabduljaleel energyefficientdynamicsymmetrickeybasedprotocolforsecuretrafficexchangesinsmarthomes