Skip to main content

An Inter-device Authentication Scheme for Smart Homes Using One-Time-Password Over Infrared Channel

  • Conference paper
  • First Online:
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments (ISDDC 2017)

Abstract

Internet of Things (IoT) is an emerging paradigm which enables physical objects to operate over the Internet, and collect and share the data that describe the real physical world. In this ubiquitous environment, due to the heterogeneity of objects, communication, topology, security protocols, and the computationally limited nature of IoT objects, conventional authentication schemes may not meet the IoT security requirements since they are considered impractical, weak, or outdated. In this paper, a two-factor inter device mutual authentication scheme for smart home is proposed, where in the first level, the key exchange is performed using the Diffie-Hellman protocol and a public key cryptography in order to validate the identity of devices; and the second level relies on the use of infrared communication to distribute the One-Time Passwords (OTPs) among devices for authentication purpose. The HLPSL language is used to model the proposed protocol, and a security analysis is conducted using the SPAN (Security Protocol Animator for AVISPA (SPAN)/AVISPA (Automated Validation of Internet Security Protocol and Applications) tool, showing that the proposed scheme can achieve the goals of secrecy of secret keys and mutual authentication. A proof-of-concept in the form of a hardware design is also proposed using Raspberry-Pi, Linux Infrared Remote Control (LIRC), Infrared circuit and a public-key-infrastructure. Experimentally, it is shown that this hardware design can achieve secure device-to-device authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dawy, Z., Saad, W., Ghosh, A., Andrews, J.G., Yaacoub, E.: Towards massive machine type cellular communications. IEEE Wirel. Commun. 24(1), 120–128 (2017)

    Article  Google Scholar 

  2. Shivraj, V.L., Rajan, M.A., Singh, M., Balamuralidhar, P.: One time password authentication scheme based on elliptic curves for Internet of Things (IoT). In: Proceedings of IEEE 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW 2015), pp. 1–6, 17–19 February 2015

    Google Scholar 

  3. Madsen, P.: Authentication in the IoT challenges and opportunities. http://www.secureidnews.com/news-item/authentication-in-the-iot-challenges-and-opportunities. Accessed 9 Aug 2017

  4. AVISPA Tool. http://www.avispa-project.org. Accessed 9 Aug 2017

  5. Stobert, E., Biddle, R.: Authentication in the home. In: Workshop on Home Usable Privacy and Security (HUPS), Newcastle, UK, 24 July 2013. http://cups.cs.cmu.edu/soups/2013/HUPS/HUPS13-ElizabethStobert.pdf. Accessed 9 Aug 2017

  6. PureLiFi. http://purelifi.com. Accessed 9 Aug 2017

  7. Tian, Z., Wright, K., Zhou, X.: The DarkLight Rises: Visible Light Communication in the Dark. http://www.cs.dartmouth.edu/~xia/papers/mobicom16-darklight.pdf. Accessed 9 Aug 2017

  8. Schneier, B.: Applied Cryptography Protocols Algorithms and Source Code in C, 2nd edn. Wiley, London (1996). ISBN 978-1-119-09672-6

    MATH  Google Scholar 

  9. Saxena, U., Sodhi, J.S., Singh, Y.: Analysis of security attacks in a smart home networks. In: Proceedings of 7th International Conference on Cloud Computing, Data Science and Engineering, Noida, India, 12–13 January 2017, pp. 431–436 (2017)

    Google Scholar 

  10. Kumar, P., Braeken, A., Gurtov, A., Iinatti, J., Ha, P.H.: Anonymous secure framework in connected smart home environments. IEEE Trans. Inf. Forensics Secur. 12(4), 968–979 (2017)

    Article  Google Scholar 

  11. Wilson, P.: Inter-device authentication protocol for the internet of things. M.Sc. thesis, Department of Electrical and Computer Engineering, University of Victoria, B.C, Canada, July 2017

    Google Scholar 

  12. Yao, X., Han, X., Du, X., Zhou, X.: A lightweight multicast authentication mechanism for small scale IoT applications. IEEE Sens. J. 13(10), 3693–3701 (2013)

    Article  Google Scholar 

  13. Benaloh, J., de Mare, M.: One-way accumulators: a decentralized alternative to digital signatures. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 274–285. Springer, Heidelberg (1994). doi:10.1007/3-540-48285-7_24

    Chapter  Google Scholar 

  14. Hernandez-Ramos, J.L., Pawlowski, M.P., Jara, A.J., Skarmeta, A.F., Ladid, L.: Toward a lightweight authentication and authorization framework for smart objects. IEEE J. Sel. Areas Comm. 33(4), 690–702 (2015)

    Article  Google Scholar 

  15. Hughes, P.: ARM and Sensor Platforms Deliver an Open Source Framework for Sensor Devices, ARM. https://www.arm.com/about/newsroom/arm-and-sensor-platforms-deliver-an-open-source-framework-for-sensor-devices.php. Accessed 9 Aug 2017

  16. Sharaf-Dabbagh, Y., Saad, W.: On the authentication of devices in the Internet of Things. In: Proceedings of the 17th IEEE International Symposium on World Wireless, Mobile Multimedia Networks, Coimbra, Portugal, pp. 1–3, June 2016

    Google Scholar 

  17. Shin, S., Yeh, H., Kim, K.: An effective device and data origin authentication scheme in home networks. In: Proceedings of 9th International Conference and Expo on Emerging Technologies for a Smarter World (CEWIT), November 5–6, Incheon, South Korea, pp. 1–5, September 2012

    Google Scholar 

  18. Kumar, P., Gurtov, A., Iinatti, J., Ylianttila, M., Sain, M.: Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sens. J. 16(1), 254–264 (2016)

    Article  Google Scholar 

  19. Santoso, F.K., Vun, N.C.H.: Securing IoT for smart home system. In: Proceedings of International Symposium on Consumer Electronics (ISCE), Madrid, Spain, pp. 1–2, 24–26 June 2015

    Google Scholar 

  20. Open Source Universal Remote. https://upverter.com/alexbain/f24516375cfae8b9/Open-Source-Universal-Remote/#/. Accessed 9 Aug 2017

  21. Linux Infrared Remote Control. http://www.lirc.org. Accessed 9 Aug 2017

  22. Raspbian Operating System. https://www.raspberrypi.org/downloads/raspbian. Accessed 9 Aug 2017

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Isaac Woungang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Raniyal, M.S., Woungang, I., Dhurandher, S.K. (2017). An Inter-device Authentication Scheme for Smart Homes Using One-Time-Password Over Infrared Channel. In: Traore, I., Woungang, I., Awad, A. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2017. Lecture Notes in Computer Science(), vol 10618. Springer, Cham. https://doi.org/10.1007/978-3-319-69155-8_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69155-8_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69154-1

  • Online ISBN: 978-3-319-69155-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics