Authentication and Privacy Challenges for Internet of Things Smart Home Environment

JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES(2019)

引用 2|浏览2
暂无评分
摘要
This study is a very good approach to find the solution of secure authentication for IOT based smart home environment and its appliances. The study aims to compare the different authentication methods with respect to smart home environment and trying to identify its limitation. After analyzing the existing authentication methods its limitation and core issues then targeted the message authentication for SHE. Presently SHE authentication is based on Exchange of six message authentication techniques in Enhance authentication and key establishment scheme 6LOWPAN (EAKES6Lo) which is advance version of secure authentication and key establishment scheme (SAKES). This authentication method cause much high end to end delay, energy consumption, overall throughput of the system, complexity and poor security approach. By simulation of EAKES6Lo and SAKES scheme found some results, in contrast to these results, there may be another solution to access any SHE lights, fans, refrigerators, air condition, geezer, door lock, microwave oven, television and water pump, HVAC control and security alarms etc remotely with better security, better complexity, minimum energy consumption, better key length, better throughput and minor end to end delay named two step authentication (TSA). The proposed model also helps to monitor accessing system by comparing security codes and its complexity.
更多
查看译文
关键词
Internet of Things(IOT),Smart Home Environment (SHE),Version 6 Low Power Wireless Personal Area Network (6LoWPAN),Enhanced Authentication and Key Establishment Scheme for 6LoWPAN (EAKES6Lo),Secure Authentication and Key Establishment Scheme(SAKES),Two Step Authentication(TSA)
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要