2022
DOI: 10.1007/s11276-022-03197-1
|View full text |Cite
|
Sign up to set email alerts
|

Secure user authentication and key agreement scheme for IoT device access control based smart home communications

Abstract: The upcoming paradigm in Internet of Things (IoT) based applications is to afford effective interactional communication strategies between the devices in the smart home system. With the rapid growth of IoT services, the incorporation of security measures becomes a vital concern. The general issue faced in the security of the intercommunication between the devices and the users is improper authentication between them. Also, the access control of devices must be ensured with reliable features for establishing se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 53 publications
0
5
0
Order By: Relevance
“…Uppuluri et al [41] proposd a novel approach called Modified Honey Encryption utilizing Inverse Sampling-Conditional Probability Model Transform (MHE-IS-CPMT) with ECC for identification and key exchange in a home framework. The protocol encompasses several components, including initialization, enrollment, login, and credential renewal, which collectively ensure secure data transmission between users and their devices.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Uppuluri et al [41] proposd a novel approach called Modified Honey Encryption utilizing Inverse Sampling-Conditional Probability Model Transform (MHE-IS-CPMT) with ECC for identification and key exchange in a home framework. The protocol encompasses several components, including initialization, enrollment, login, and credential renewal, which collectively ensure secure data transmission between users and their devices.…”
Section: Related Workmentioning
confidence: 99%
“…By examining the outcomes, valuable insights can be gained, leading to further investigations and advancements in the field. To assess the success of the proposed SSCA model, a comparative analysis is conducted, comparing its results with existing works such as MHE-IS-CPMT [41], ElGamal-based Authentication Method(EAM) [39], SCSS [38], and Secure hybridized Cloud-Enabled Framework (SHCEF) [34]. Moreover, the suggested architecture is evaluated based on various performance indicators, including response time, scalability, throughput, security, and dependability (reliability).…”
Section: Performance Evaluation Criteriamentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, the scheme does not guarantee user privacy, and the gateway node's private key is not secure. The papers [26][27][28] provide an in-depth analysis of various authentication schemes used in a range of applications, including smart home communication, intelligent transportation systems, and map street view. These authentication schemes play a crucial role in ensuring secure and reliable communication between different entities.…”
Section: Related Workmentioning
confidence: 99%
“…The security of IoT is a crucial area of research that is gaining popularity among academic, corporate, and government organizations worldwide. Many are actively designing and developing IoT-based solutions [4].…”
Section: Introductionmentioning
confidence: 99%