Trust-Based Authentication for Smart Home Systems
Smart home systems are developed to interconnect and automate household appliances and create ubiquitous home services. Such a system is mainly driven by the communications among Internet-of-Things (IoT) objects along with Radio Frequency IDentification (RFID) technologies, where the RFID techniques...
Saved in:
Published in | Wireless personal communications Vol. 117; no. 3; pp. 2157 - 2172 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New York
Springer US
01.04.2021
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Smart home systems are developed to interconnect and automate household appliances and create ubiquitous home services. Such a system is mainly driven by the communications among Internet-of-Things (IoT) objects along with Radio Frequency IDentification (RFID) technologies, where the RFID techniques in the IoT network are commonly prone to malicious attacks due to the inherent weaknesses of underlying wireless radio communications. Thus, it causes the smart home systems vulnerable to some active attacks such as the jamming and cloning attacks, which in turn threaten to home breach and personal information disclosure. This paper therefore proposes a new trust-based authentication scheme to effectively address two typical attacks, jamming and cloning attacks, in smart home environment. The evaluation shows that our solution can significantly reduce the authentication failure in jamming attacks, increase the detection probability of cloning attacks, and improve the authentication efficiency to manage the authentication delay in a reasonable time. |
---|---|
ISSN: | 0929-6212 1572-834X |
DOI: | 10.1007/s11277-020-07965-0 |