| Literature DB >> 27399699 |
Jungho Kang1, Mansik Kim2, Jong Hyuk Park3.
Abstract
With the ICT technology making great progress in the smart home environment, the ubiquitous environment is rapidly emerging all over the world, but problems are also increasing proportionally to the rapid growth of the smart home market such as multiplatform heterogeneity and new security threats. In addition, the smart home sensors have so low computing resources that they cannot process complicated computation tasks, which is required to create a proper security environment. A service provider also faces overhead in processing data from a rapidly increasing number of sensors. This paper aimed to propose a scheme to build infrastructure in which communication entities can securely authenticate and design security channel with physically unclonable PUFs and the TTP that smart home communication entities can rely on. In addition, we analyze and evaluate the proposed scheme for security and performance and prove that it can build secure channels with low resources. Finally, we expect that the proposed scheme can be helpful for secure communication with low resources in future smart home multiplatforms.Entities:
Keywords: PUFs; TTP; multiplatform; resource; smart home
Year: 2016 PMID: 27399699 PMCID: PMC4970085 DOI: 10.3390/s16071036
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Smart home infrastructure.
Figure 2Proposed smart home multiplatform infrastructure.
Proposed Protocol Parameters.
| Notation | Meaning |
|---|---|
| Sensor | Smart home Sensor Device |
| Gateway | Smart home Gateway |
| TTP | Trusted Third Party |
| SP | Service Provider |
| IDS, IDG, IDT, IDP | Sensor, Gateway, TTP and SP ID |
| PUF | Physical unclonable function |
| C[c1, c2, … , cm] | Challenge vector value for PUF |
| R[r1, r2, … , rm] | Response vector value for PUF |
| S[s1, s2, … , sk] | Gateway private key vector for Zero-knowledge Proofs |
| V[v1, v2, … , vk] | Gateway public key vector for Zero-knowledge Proofs |
| PC[pc1, pc2, … , pcj] | Challenge vector for zero-knowledge Proofs |
| n | Public key for Zero-knowledge Proofs |
| r | Random value for Zero-knowledge Proofs |
| x | Witness value for zero-knowledge Proofs |
| y | Response value for zero-knowledge Proofs |
| T | Timestamp |
| N | Nonce |
| SK | Session key between Sensor and SP |
| H() | Hash function |
| f() | SK generator |
| D() | Decryption |
| E() | Encryption |
Figure 3Provisioning phase: (a) sensor provisioning; (b) gateway provisioning.
Figure 4Authentication phase.
Comparative security analysis between smart home protocols.
| Jinsung et al. [ | Alessandro et al. [ | Khusvinder et al. [ | Vijay et al. [ | Proposed Scheme | |
|---|---|---|---|---|---|
| Multiplatform | X | O | X | X | O |
| Low Resource | O | O | Δ | X | O |
| Security | X | X | O | O | O |
| Privacy | X | X | Δ | O | O |
O: Support; Δ: not fully support; X: Not support.
Comparative performance analysis between sensor protocols.
| ELK [ | LKH [ | CoGKTK [ | sGIM [ | Proposed Scheme | |
|---|---|---|---|---|---|
| Distributed KS | Not-support | Not-support | Support | Support | Support |
| Forward Security | X | X | O | X | O |
| Mutual Authentication | X | X | O | X | O |
| Relay Attack | X | X | X | X | O |
| Replay Attack | X | X | O | O | O |
O: Secure; X: Vulnerable.
Comparative computing resource analysis between communication objects.
| Sensor | Gateway | SP | TTP | |
|---|---|---|---|---|
| PUF | m+1 | - | - | (m + 1) * X |
| Hash | 1 | 1 | - | 2X |
| Encryption | 1 | - | x | - |
| Decryption | 1 | - | x | - |
| f() | 1 | - | x | - |
| Nonce generation | 1 | k | - | (m + 2) * X |
| Zero-knowledge Proofs computations | - | O(ni) | O(nj) | - |
Comparative storage resource analysis between communication objects.
| Sensor | Gateway | SP | TTP | |
|---|---|---|---|---|
| ID | 4 | 2 + Y + X | 3 + x | 2 + Y + X |
| Challenge C | 1 | 1 | mx | mX |
| Response R | 1 | - | - | mX |
| SK | 1 | - | x | - |
| Timestamp | 1 | - | - | X |
| Nonce | 1 | 1 | - | - |