MBAREK, Bacem, Mouzhi GE and Tomáš PITNER. Trust-based Authentication for Smart Home Systems. Wireless Personal Communications. Springer, 2021, vol. 117, No 3, p. 2157-2172. ISSN 0929-6212. Available from: https://dx.doi.org/10.1007/s11277-020-07965-0.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Trust-based Authentication for Smart Home Systems
Authors MBAREK, Bacem (788 Tunisia, belonging to the institution), Mouzhi GE (156 China, guarantor, belonging to the institution) and Tomáš PITNER (203 Czech Republic, belonging to the institution).
Edition Wireless Personal Communications, Springer, 2021, 0929-6212.
Other information
Original language English
Type of outcome Article in a journal
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher United States of America
Confidentiality degree is not subject to a state or trade secret
WWW Springer Link
Impact factor Impact factor: 2.017
RIV identification code RIV/00216224:14330/21:00120785
Organization unit Faculty of Informatics
Doi http://dx.doi.org/10.1007/s11277-020-07965-0
UT WoS 000590261700001
Keywords in English Smart home; IoT; Authentication; Jamming attacks; Clone attacks
Tags International impact, Reviewed
Changed by Changed by: Bacem Mbarek, PhD, učo 242111. Changed: 21/4/2022 19:09.
Abstract
Smart home systems are developed to interconnect and automate household appliances and create ubiquitous home services. Such a system is mainly driven by the communications among Internet-of-Things (IoT) objects along with Radio Frequency IDentification (RFID) technologies, where the RFID techniques in the IoT network are commonly prone to malicious attacks due to the inherent weaknesses of underlying wireless radio communications. Thus, it causes the smart home systems vulnerable to some active attacks such as the jamming and cloning attacks, which in turn threaten to home breach and personal information disclosure. This paper therefore proposes a new trust-based authentication scheme to effectively address two typical attacks, jamming and cloning attacks, in smart home environment. The evaluation shows that our solution can significantly reduce the authentication failure in jamming attacks, increase the detection probability of cloning attacks, and improve the authentication efficiency to manage the authentication delay in a reasonable time.
PrintDisplayed: 3/9/2024 06:15