2016
DOI: 10.1109/jsen.2015.2475298
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments

Abstract: The proliferation of current wireless communications and information technologies have been altering humans lifestyle and social interactions-the next frontier is the smart home environments or spaces. A smart home consists of low capacity devices (e.g., sensors) and wireless networks, and therefore, all working together as a secure system that needs an adequate level of security. This paper introduces lightweight and secure session key establishment scheme for smart home environments. To establish trust among… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
127
0
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 157 publications
(153 citation statements)
references
References 40 publications
(68 reference statements)
0
127
0
1
Order By: Relevance
“…), and financial information are used. For the reason, security technology should be applied [7,[9][10][11]. This section describes the structure and security matters of smart devices in smart home, and the previous studies related to smart home security.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…), and financial information are used. For the reason, security technology should be applied [7,[9][10][11]. This section describes the structure and security matters of smart devices in smart home, and the previous studies related to smart home security.…”
Section: Related Workmentioning
confidence: 99%
“…Since smartphones supported various activities, such as financial affairs, business affairs, and personal affairs, the security technology of smartphones has been developed. However, the smart home appliances for smart home fail to have security technology and get exposed to many attacks [7,9,10]. Therefore, this paper proposes the internal security framework for smart devices, which can be applied to smart home appliances as well as smartphones.…”
mentioning
confidence: 99%
“…Here, E is the encryption algorithm (e.g., AES (advanced encryption standard) [25]), and T 1 is the current time-stamp of node U. The U then sends N, S U , G U , T 1, K idU to the C node.…”
Section: B Authentication and Key Establishment Phasementioning
confidence: 99%
“…Here, E denotes the identical encryption scheme (AES [25]) and T 2 is the current time-stamp of the C node. The C node sends M, G C , S C , T 2 to the node U.…”
Section: B Authentication and Key Establishment Phasementioning
confidence: 99%
See 1 more Smart Citation