Physical-Unclonable-Function-Based Secure and Anonymous User Authentication for Smart Homes

The Internet of Things (IoT) technology has revolutionized various sectors, including healthcare, smart cities, agriculture, education, and homes. The interconnected network of diverse IoT devices used in smart homes allows users to remotely manage lighting, security systems, heating, and household...

Full description

Saved in:
Bibliographic Details
Main Authors: Hakjun Lee, Jihyeon Ryu
Format: Article
Language:English
Published: IEEE 2024-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10757410/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850236516854398976
author Hakjun Lee
Jihyeon Ryu
author_facet Hakjun Lee
Jihyeon Ryu
author_sort Hakjun Lee
collection DOAJ
description The Internet of Things (IoT) technology has revolutionized various sectors, including healthcare, smart cities, agriculture, education, and homes. The interconnected network of diverse IoT devices used in smart homes allows users to remotely manage lighting, security systems, heating, and household appliances through smart devices. The multitude of interactions and frequent data exchanges in smart homes necessitate robust user authentication. Strengthening smart home security is crucial to ensuring user safety and safeguarding personal information, thereby maximizing the benefits of smart technology. In 2023, Bai et al. proposed an authentication scheme aimed at ensuring anonymity and secure key establishment in smart environments. Although their scheme achieved various security objectives, we identified security vulnerabilities in their proposal. In this paper, we highlight the weaknesses in their scheme and introduce a new, secure, and anonymous authentication scheme. The proposed solution integrates bio-hash techniques for protecting user identity and physical unclonable functions to mitigate device capture attacks. Our scheme establishes a secure session key between the user, gateway, and sensor, providing protection against various known attacks from both internal and external adversaries. Furthermore, we conducted both formal and informal analyses to validate the security of the proposed scheme and compared its performance with related schemes to demonstrate its effectiveness and practical applicability.
format Article
id doaj-art-7dcb7bf8d9a746d180bb7fcb669c24ca
institution OA Journals
issn 2169-3536
language English
publishDate 2024-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-7dcb7bf8d9a746d180bb7fcb669c24ca2025-08-20T02:01:57ZengIEEEIEEE Access2169-35362024-01-011217248317249810.1109/ACCESS.2024.350225010757410Physical-Unclonable-Function-Based Secure and Anonymous User Authentication for Smart HomesHakjun Lee0https://orcid.org/0000-0002-5777-4256Jihyeon Ryu1https://orcid.org/0000-0001-8124-3853Department of Computer Engineering, Kyungnam University, Changwon-si, Gyeongsangnam-do, Republic of KoreaSchool of Computer and Information Engineering, Kwangwoon University, Seoul-si, Republic of KoreaThe Internet of Things (IoT) technology has revolutionized various sectors, including healthcare, smart cities, agriculture, education, and homes. The interconnected network of diverse IoT devices used in smart homes allows users to remotely manage lighting, security systems, heating, and household appliances through smart devices. The multitude of interactions and frequent data exchanges in smart homes necessitate robust user authentication. Strengthening smart home security is crucial to ensuring user safety and safeguarding personal information, thereby maximizing the benefits of smart technology. In 2023, Bai et al. proposed an authentication scheme aimed at ensuring anonymity and secure key establishment in smart environments. Although their scheme achieved various security objectives, we identified security vulnerabilities in their proposal. In this paper, we highlight the weaknesses in their scheme and introduce a new, secure, and anonymous authentication scheme. The proposed solution integrates bio-hash techniques for protecting user identity and physical unclonable functions to mitigate device capture attacks. Our scheme establishes a secure session key between the user, gateway, and sensor, providing protection against various known attacks from both internal and external adversaries. Furthermore, we conducted both formal and informal analyses to validate the security of the proposed scheme and compared its performance with related schemes to demonstrate its effectiveness and practical applicability.https://ieeexplore.ieee.org/document/10757410/Multi-factor authenticationauthentication protocolssmart homephysical unclonable function
spellingShingle Hakjun Lee
Jihyeon Ryu
Physical-Unclonable-Function-Based Secure and Anonymous User Authentication for Smart Homes
IEEE Access
Multi-factor authentication
authentication protocols
smart home
physical unclonable function
title Physical-Unclonable-Function-Based Secure and Anonymous User Authentication for Smart Homes
title_full Physical-Unclonable-Function-Based Secure and Anonymous User Authentication for Smart Homes
title_fullStr Physical-Unclonable-Function-Based Secure and Anonymous User Authentication for Smart Homes
title_full_unstemmed Physical-Unclonable-Function-Based Secure and Anonymous User Authentication for Smart Homes
title_short Physical-Unclonable-Function-Based Secure and Anonymous User Authentication for Smart Homes
title_sort physical unclonable function based secure and anonymous user authentication for smart homes
topic Multi-factor authentication
authentication protocols
smart home
physical unclonable function
url https://ieeexplore.ieee.org/document/10757410/
work_keys_str_mv AT hakjunlee physicalunclonablefunctionbasedsecureandanonymoususerauthenticationforsmarthomes
AT jihyeonryu physicalunclonablefunctionbasedsecureandanonymoususerauthenticationforsmarthomes