A Novel Lightweight Authentication for Intelligent Energy Monitoring in Smart Home

  • Chintan PatelEmail author
  • Nishant Doshi
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1148)


The widespread acceptance of IoT-based application is increasing exponentially day by day. The smart home is one of the key applications of an IoT in which the smart appliances are connected with the smart meter. A smart meter collects the energy consumption data at a particular interval and sends those data to the smart home users and an electricity controlling center. The secure authentication and key establishment between the user and smart meter provide secure transmission of energy consumption data. In this paper, we propose an authentication and key exchange mechanism between the smart home user and the smart meter via a gateway node using elliptic curve cryptography. The formal security analysis of the proposed scheme is performed using a real-or-random model, and informal security analysis is given based on a widely adopted Dolev–Yao channel. An implementation of the proposed protocol is performed using a publish–subscribe-based MQTT protocol. At last, we discuss a performance analysis and comparison of the proposed scheme with the other existing schemes.


Smart home Smart meter Authentication ROR Dolev–Yao model 


  1. 1.
  2. 2.
    Statista Research Department: Internet of things (IoT) connected devices.
  3. 3.
    Patel, C., Doshi, N.: Security challenges in IoT cyber world. In: Security in Smart Cities: Models, Applications, and Challenges, pp. 171–191. Springer, Berlin (2019)Google Scholar
  4. 4.
    Shingala, M., Patel, C., Doshi, N.: An improve three factor remote user authentication scheme using smart card. Wirel. Pers. Commun. 99(1), 227–251 (2018)CrossRefGoogle Scholar
  5. 5.
    Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981). Scholar
  6. 6.
    Hwang, M.S., Lee, C.C., Tang, Y.L.: A simple remote user authentication scheme. Math. Comput. Model. 36(1–2), 103–107 (2002). Scholar
  7. 7.
    Das, M.L.: Two-factor user authentication in wireless sensor networks. Trans. Wireless. Commun. 8(3), 1086–1090 (2009). Scholar
  8. 8.
    Li, X., Niu, J., Bhuiyan, M.Z.A., Wu, F., Karuppiah, M., Kumari, S.: A robust ecc-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Trans. Ind. Inf. 14(8), 3599–3609 (2017)CrossRefGoogle Scholar
  9. 9.
    Mahmood, K., Chaudhry, S.A., Naqvi, H., Kumari, S., Li, X., Sangaiah, A.K.: An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Future Gener. Comput. Syst. 81, 557–565 (2018).
  10. 10.
    Patel, C., Doshi, N.: Internet of Things Security: Challenges, Advances, and Analytics. Auerbach Publications (2018)Google Scholar
  11. 11.
    Garg, S., Kaur, K., Kaddoum, G., Rodrigues, J.J.P.C., Guizani, M.: Secure and lightweight authentication scheme for smart metering infrastructure in smart grid. IEEE Trans. Ind. Inf. 1–1 (2019)Google Scholar
  12. 12.
    Wang, D., Li, W., Wang, P.: Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans. Ind. Inf. 14(9), 4081–4092 (2018)CrossRefGoogle Scholar
  13. 13.
    Abdalla, M., Fouque, P.A., Pointcheval, D.: Password-based authenticated key exchange in the three-party setting. In: Vaudenay, S. (ed.) Public Key Cryptography—PKC 2005, pp. 65–84. Springer, Berlin (2005)CrossRefGoogle Scholar
  14. 14.
    Roy, S., Chatterjee, S., Das, A.K., Chattopadhyay, S., Kumari, S., Jo, M.: Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing internet of things. IEEE Internet Things J. 5(4), 2884–2895 (2018)CrossRefGoogle Scholar
  15. 15.
    Chatterjee, S., Roy, S., Das, A.K., Chattopadhyay, S., Kumar, N., Vasilakos, A.V.: Secure biometric-based authentication scheme using chebyshev chaotic map for multi-server environment. IEEE Trans. Dependable Secure Comput. 15(5), 824–839 (2018)CrossRefGoogle Scholar
  16. 16.
    Dolev, D., Yao, A.C.: On the security of public key protocols. In: Proceedings of the 22nd Annual Symposium on Foundations of Computer Science. SFCS ’81, pp. 350–357. IEEE Computer Society, Washington, DC, USA (1981).
  17. 17.
    Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology. CRYPTO ’99, pp. 388–397. Springer, Berlin (1999).
  18. 18.
    Amin, R., Islam, S.H., Biswas, G., Khan, M.K., Kumar, N.: A robust and anonymous patient monitoring system using wireless medical sensor networks. Future Gener. Comput. Syst. 80, 483–495 (2018).
  19. 19.
    Farash, M.S., Turkanović, M., Kumari, S., Hölbl, M.: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw. 36, 152–176 (2016)CrossRefGoogle Scholar
  20. 20.
    Poh, G.S., Gope, P., Ning, J.: Privhome: privacy-preserving authenticated communication in smart home environment. IEEE Trans. Dependable Secure Comput. (2019)Google Scholar
  21. 21.
    Wu, F., Xu, L., Kumari, S., Li, X., Shen, J., Choo, K.K.R., Wazid, M., Das, A.K.: An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J. Netw. Comput. Appl. 89, 72–85 (2017)., emerging Services for Internet of Things (IoT)
  22. 22.
    Zhou, Y., Liu, T., Tang, F., Wang, F., Tinashe, M.: A privacy-preserving authentication and key agreement scheme with deniability for IoT. Electronics 8(4), 450 (2019).

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Pandit Deendayal Petroleum UniversityGandhinagarIndia

Personalised recommendations