An effective device and data origin authentication scheme in home networks

Author(s):  
Soobok Shin ◽  
Hongjin Yeh ◽  
Kangseok Kim
2020 ◽  
Vol 2020 ◽  
pp. 1-19
Author(s):  
Yousheng Zhou ◽  
Longan Wang

In the ubiquitous networks, mobile nodes can obtain roaming service that enables them to get access to the services extended by their home networks in the field of foreign network. To provide secure and anonymous communication for legal mobile users in roaming services, there should be a mutual authentication between mobile user and foreign agent with the help of home agent. There are many roaming authentication schemes which have been proposed; however, with the progress of quantum computation, quantum attack poses security threats to many traditional public key cryptography-based authentication schemes; thus, antiquantum attack roaming authentication schemes need to be investigated. On account of the limitation of computational resources for mobile nodes, a lightweight anonymous and antiquantum authentication schemes need to be developed to enable mobile nodes to roam across multiple service domains securely and seamlessly. In consideration of the advantages of lattice in antiquantum, an NTRU-based authentication scheme with provable security and conditional privacy preservation is proposed to remedy these security weaknesses. Compared with the existing scheme, the proposed scheme not only improves efficiency but also can resist the quantum attack.


2020 ◽  
Vol 39 (5) ◽  
pp. 6009-6020
Author(s):  
Yosef Ashibani ◽  
Qusay H. Mahmoud

Smartphones have now become ubiquitous for accessing and controlling home appliances in smart homes, a popular application of the Internet of Things. User authentication on smartphones is mostly achieved at initial access. However, without applying a continuous authentication process, the network will be susceptible to unauthorized users. This issue emphasizes the importance of offering a continuous authentication scheme to identify the current user of the device. This can be achieved by extracting information during smartphone usage, including application access patterns. In this paper, we present a flexible machine learning user authentication scheme for smart home networks based on smartphone usage. Considering that users may run their smartphone applications differently during different day time intervals as well as different days of the week, new features are extracted by considering this information. The scheme is evaluated on a real-world dataset for continuous user authentication. The results show that the presented scheme authenticates users with high accuracy.


Sign in / Sign up

Export Citation Format

Share Document