Detailed Information on Publication Record
2019
SeMLAS: An Efficient Secure Multi-Level Authentication Scheme for IoT-Based Smart Home Systems
MBAREK, Bacem, Barbora BÜHNOVÁ and Tomáš PITNERBasic information
Original name
SeMLAS: An Efficient Secure Multi-Level Authentication Scheme for IoT-Based Smart Home Systems
Authors
MBAREK, Bacem (788 Tunisia, guarantor, belonging to the institution), Barbora BÜHNOVÁ (203 Czech Republic) and Tomáš PITNER (203 Czech Republic, belonging to the institution)
Edition
Tangier, Morocco, The 15th International Wireless Communications & Mobile Computing Conference (IWCMC 2019), p. 1373-1378, 6 pp. 2019
Publisher
IEEE
Other information
Language
English
Type of outcome
Stať ve sborníku
Field of Study
10200 1.2 Computer and information sciences
Confidentiality degree
není předmětem státního či obchodního tajemství
Publication form
electronic version available online
RIV identification code
RIV/00216224:14330/19:00109473
Organization unit
Faculty of Informatics
ISBN
978-1-5386-7747-6
ISSN
UT WoS
000492150100233
Keywords in English
Internet of Things; Smart home; Security; Authentication
Tags
International impact, Reviewed
Změněno: 21/12/2022 10:06, doc. Ing. RNDr. Barbora Bühnová, Ph.D.
Abstract
V originále
Smart Home Networks (SHNs) are attracting increasing interest in the research, development, and professional communities, particularly with the fast adoption of Internet of Things (IoT) devices. However, because of the limited processing, storage, and communication capabilities of these devices as well as their proprietary technologies, SHNs are getting vulnerable to numerous security threats that can adversely affect their proper functioning. Granting access to the legitimate users/entities is, therefore, essential to prevent illegitimate users from unauthorized use of the available resources. We argue that current access control schemes are not suitable for IoT-based SHN. In this paper, we therefore propose a novel Secure Multi-Level Authentication Scheme (SeMLAS) based on software mobile agents. In addition to enabling secure authentication between external peers and nodes at different hierarchical level of the SHN, our scheme can shorten the authentication process and detect malicious nodes via an appropriate use of mobile agents. The performance analysis of the implementation of SeMLAS with the NS2 tool is showing promising results. Indeed, compared with the OTP and TinyPK schemes, SeMLAS is achieving 48% and 24% less in terms of communication overhead and total energy consumption respectively.