An ECC-based authentication protocol for fog-IoT enabled smart home environment Online publication date: Thu, 29-Apr-2021
by Bhabendu Kumar Mohanta; Debasish Jena; Srikanta Patnaik
International Journal of Intelligent Systems Technologies and Applications (IJISTA), Vol. 20, No. 1, 2021
Abstract: Internet of things (IoT)-enabled smart home means all the home appliances are connected to the internet. All these devices are monitored and controlled using a mobile device, iPhone, or iPad regardless of location or time constraint. In an IoT-based smart home network, associated users and devices need to be recognised otherwise unauthorised access reduce the security and privacy of the smart environment. In this paper, contributions are first proposed as an elliptical curve cryptography-based authentication protocol for fog nodes and users in the IoT-based smart home environment. Secondly, the simulation for security analysis of the proposed authentication protocol using AVISPA tools has been done. Thirdly, BAN logic is used to verify that the devices in the smart home environment have achieved the security goals. Finally, a comparison with some existing works has been done and it has been seen that proposed protocol achieved better security goals in a smart home environment.
Online publication date: Thu, 29-Apr-2021
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Intelligent Systems Technologies and Applications (IJISTA):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email email@example.com