J 2021

Trust-based Authentication for Smart Home Systems

MBAREK, Bacem; Mouzhi GE and Tomáš PITNER

Basic information

Original name

Trust-based Authentication for Smart Home Systems

Authors

MBAREK, Bacem (788 Tunisia, belonging to the institution); Mouzhi GE (156 China, guarantor, belonging to the institution) and Tomáš PITNER ORCID (203 Czech Republic, belonging to the institution)

Edition

Wireless Personal Communications, Springer, 2021, 0929-6212

Other information

Language

English

Type of outcome

Article in a journal

Field of Study

10201 Computer sciences, information science, bioinformatics

Country of publisher

United States of America

Confidentiality degree

is not subject to a state or trade secret

References:

Impact factor

Impact factor: 2.017

RIV identification code

RIV/00216224:14330/21:00120785

Organization unit

Faculty of Informatics

UT WoS

000590261700001

EID Scopus

2-s2.0-85096145576

Keywords in English

Smart home; IoT; Authentication; Jamming attacks; Clone attacks

Tags

International impact, Reviewed
Changed: 21/4/2022 19:09, Bacem Mbarek, PhD

Abstract

In the original language

Smart home systems are developed to interconnect and automate household appliances and create ubiquitous home services. Such a system is mainly driven by the communications among Internet-of-Things (IoT) objects along with Radio Frequency IDentification (RFID) technologies, where the RFID techniques in the IoT network are commonly prone to malicious attacks due to the inherent weaknesses of underlying wireless radio communications. Thus, it causes the smart home systems vulnerable to some active attacks such as the jamming and cloning attacks, which in turn threaten to home breach and personal information disclosure. This paper therefore proposes a new trust-based authentication scheme to effectively address two typical attacks, jamming and cloning attacks, in smart home environment. The evaluation shows that our solution can significantly reduce the authentication failure in jamming attacks, increase the detection probability of cloning attacks, and improve the authentication efficiency to manage the authentication delay in a reasonable time.