2021
Trust-based Authentication for Smart Home Systems
MBAREK, Bacem; Mouzhi GE and Tomáš PITNERBasic information
Original name
Trust-based Authentication for Smart Home Systems
Authors
MBAREK, Bacem (788 Tunisia, belonging to the institution); Mouzhi GE (156 China, guarantor, belonging to the institution) and Tomáš PITNER ORCID (203 Czech Republic, belonging to the institution)
Edition
Wireless Personal Communications, Springer, 2021, 0929-6212
Other information
Language
English
Type of outcome
Article in a journal
Field of Study
10201 Computer sciences, information science, bioinformatics
Country of publisher
United States of America
Confidentiality degree
is not subject to a state or trade secret
References:
Impact factor
Impact factor: 2.017
RIV identification code
RIV/00216224:14330/21:00120785
Organization unit
Faculty of Informatics
UT WoS
000590261700001
EID Scopus
2-s2.0-85096145576
Keywords in English
Smart home; IoT; Authentication; Jamming attacks; Clone attacks
Tags
International impact, Reviewed
Changed: 21/4/2022 19:09, Bacem Mbarek, PhD
Abstract
In the original language
Smart home systems are developed to interconnect and automate household appliances and create ubiquitous home services. Such a system is mainly driven by the communications among Internet-of-Things (IoT) objects along with Radio Frequency IDentification (RFID) technologies, where the RFID techniques in the IoT network are commonly prone to malicious attacks due to the inherent weaknesses of underlying wireless radio communications. Thus, it causes the smart home systems vulnerable to some active attacks such as the jamming and cloning attacks, which in turn threaten to home breach and personal information disclosure. This paper therefore proposes a new trust-based authentication scheme to effectively address two typical attacks, jamming and cloning attacks, in smart home environment. The evaluation shows that our solution can significantly reduce the authentication failure in jamming attacks, increase the detection probability of cloning attacks, and improve the authentication efficiency to manage the authentication delay in a reasonable time.