Authors: Bhabendu Kumar Mohanta; Debasish Jena; Srikanta Patnaik
Addresses: Department of Computer Science and Engineering, International Institute of Information Technology, Bhubaneswar, Odisha, 751003, India ' Department of Computer Science and Engineering, International Institute of Information Technology, Bhubaneswar, Odisha, 751003, India ' Department of Computer Science and Engineering, SOA University, Bhubaneswar, Odisha, 751030, India
Abstract: Internet of things (IoT)-enabled smart home means all the home appliances are connected to the internet. All these devices are monitored and controlled using a mobile device, iPhone, or iPad regardless of location or time constraint. In an IoT-based smart home network, associated users and devices need to be recognised otherwise unauthorised access reduce the security and privacy of the smart environment. In this paper, contributions are first proposed as an elliptical curve cryptography-based authentication protocol for fog nodes and users in the IoT-based smart home environment. Secondly, the simulation for security analysis of the proposed authentication protocol using AVISPA tools has been done. Thirdly, BAN logic is used to verify that the devices in the smart home environment have achieved the security goals. Finally, a comparison with some existing works has been done and it has been seen that proposed protocol achieved better security goals in a smart home environment.
Keywords: authentication; internet of things; IoT; smart home environment; security; elliptic curve cryptography.
International Journal of Intelligent Systems Technologies and Applications, 2021 Vol.20 No.1, pp.25 - 46
Received: 27 Dec 2019
Accepted: 04 Mar 2020
Published online: 29 Apr 2021 *