International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Broken-Stick Regressive Lightweight Speck Cryptographic Constrained Application Protocol for Data Security in IoT Aware Smart Home

Author NameAuthor Details

Subhashini R, Jyothi D G

Subhashini R[1]

Jyothi D G[2]

[1]Department of Computer Science and Engineering, Bangalore Institute of Technology, Bangalore, Karnataka, India.

[2]Department of Artificial Intelligence and Machine Learning, Bangalore Institute of Technology, Bangalore, Karnataka, India.

Abstract

A smart environment aims to enhance the quality of human life by improving simplicity and efficiency. IoT tools are general in nowadays computer networks. The IoT paradigm has recently evolved into a technology for creating smart environments. However, during this transmission, IoT devices are susceptible to cyber-attacks. Therefore, security as well as privacy is main concerns at real-world smart home environment applications. The major aim of manuscript is to propose Broken-Stick Regressive Lightweight Speck Ephemeral Cryptography-based Constrained Application Protocol (BRLSC-CoAP) for enhancing data security with minimal computational cost. First, the smart devices (i.e. IoT) deployed in homes to gather huge number of real-time information as well as broadcast it into authentic user. In order to improve data transmission with higher security, the proposed BRLSC-CoAP technique includes registration, encryption, authentication, and decryption. During the registration process, clients provide their information to server, and after that generates congruential ephemeral symmetric key. The encryption process employs the lightweight speck ephemeral cryptography algorithm to encrypt data with the help of a congruential ephemeral symmetric key. This algorithm is a lightweight symmetric key encryption designed to enhance the CoAP protocol in smart home applications. When the client accesses the data, authentication is performed before decryption. Forbes indexive Broken-stick regression is employed for user authentication. Normal clients access the data using the congruential ephemeral symmetric key, ensuring secure data communication with higher data confidentiality in the smart home. An experimental assessment of BRLSC-CoAP compared through conventional works and evaluated with respect to authentication accuracy, precision, confidentiality rate and computation cost. Also two comparison charts of lightweightness in terms of delay and overhead are measured to validate the entire process. The results indicate that the performance of BRLSC-CoAP increases 5% accuracy, 5% precision and higher 5% confidentiality rate with minimum 10% computation cost, 30% delay and 29% overhead than the conventional methods.

Index Terms

IoT

Smart Home

Constrained Application Protocol (CoAP)

Data Security

Lightweight Speck Ephemeral Cryptography

Authentication

Forbes Indexive Broken-Stick Regression

Reference

  1. 1.
    S.U. Jan, I. A. Abbasi, M. A. Alqarni , “LMAS-SHS: A Lightweight Mutual Authentication Scheme for Smart Home Surveillance”, IEEE Access , vol. 10, 2022, pp. 52791 – 52803. DOI: 10.1109/ACCESS.2022.3174558
  2. 2.
    S. Zou, Q. Cao, C. Wang,Z. Huang,G. Xu, “A Robust Two-Factor User Authentication Scheme-Based ECC for Smart Home in IoT”, IEEE Systems Journal ,vol. 16, no. 3, 2022, pp. 4938 – 4949. DOI: 10.1109/JSYST.2021.3127438
  3. 3.
    N. Amraoui & B. Zouari, “Anomalous behavior detection-based approach for authenticating smart home system users”, International Journal of Information Security, Springer, vol. 21, 2022, pp.611–636.https://doi.org/10.1007/s10207-021-00571-6
  4. 4.
    S. Yu, N. Jho, Y. Park, “Lightweight Three-Factor-Based Privacy- Preserving Authentication Scheme for IoT-Enabled Smart Homes”, IEEE Access ,vol. 9, 2021, pp. 126186 – 126197. DOI: 10.1109/ACCESS.2021.3111443
  5. 5.
    S. Majumder, S. Ray, D. Sadhukhan, M. K. Khan & M. Dasgupta, “ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things”, Wireless Personal Communications, Springer, vol. 116, 2021, pp. 1867–1896. https://doi.org/10.1007/s11277-020-07769-2
  6. 6.
    Y. Cho, J. Oh, D. Kwon, S. Son, J. Lee, and Y. Park, “A Secure and Anonymous User Authentication Scheme for IoT-Enabled Smart Home Environments Using PUF”, IEEE Access, vol.10, 2022, pp. 101330 – 101346. DOI: 10.1109/ACCESS.2022.3208347
  7. 7.
    R. A. Devi and A.R. Arunachalam, “Enhancement of IoT device security using an Improved Elliptic Curve Cryptography algorithm and malware detection utilizing deep LSTM”, High-Confidence Computing, Elsevier, vol. 3, no. 2, 2023, pp. 1-14. https://doi.org/10.1016/j.hcc.2023.100117
  8. 8.
    V. Kumar, N. Malik, J. Singla, N. Z. Jhanjhi, F. Amsaad and A.Razaque, “Light Weight Authentication Scheme for Smart Home IoT Devices”, Cryptography , vol. 6, no.3, 2022, Pages 1-15. https://doi.org/10.3390/cryptography6030037
  9. 9.
    P. Kumar & L. Chouhan, “A secure authentication scheme for IoT application in smart home”, Peer-to-Peer networking and Applications, Springer, Volume 14, 2021, pages 420-438. https://doi.org/10.1007/s12083-020-00973-8
  10. 10.
    H. Luo , C. Wang , H. Luo, F. Zhang, F. Lin , and G. Xu, “G2F: A Secure User Authentication for Rapid Smart Home IoT Management”, IEEE Internet of Things Journal, vol. 8, no.13, 2021, pp. 10884 – 10895. DOI: 10.1109/JIOT.2021.3050710
  11. 11.
    T-Y. Wu, Q. Meng, Y-C. Chen, S.Kumari and C-M Chen, “Toward a Secure Smart-Home IoT Access Control Scheme Based on Home Registration Approach”, Mathematics, vol. 11, no.9, pp. 1-15. https://doi.org/10.3390/math11092123
  12. 12.
    C. Sisavath and L. Yu, “Design and implementation of security system for smart home based on IOT technology”, Procedia Computer Science, Elsevier, vol. 183, 2021, pp. 4-13. https://doi.org/10.1016/j.procs.2021.02.023
  13. 13.
    S. Sohail, Z. Fan, X. Gu, F. Sabrina, “Multi-tiered Artificial Neural Networks model for intrusion detection in smart homes”, Intelligent Systems with Applications, Elsevier, vol. 16, 2022, pp. 1-14. https://doi.org/10.1016/j.iswa.2022.200152
  14. 14.
    A. Huszti, S. Kovács, N. Oláh, “callable, password-based and threshold authentication for smart homes”, International Journal of Information Security, Springer, vol. 21, 2022, pp. 707–723. https://doi.org/10.1007/s10207-022-00578-7
  15. 15.
    W. Iqbal, H. Abbas, B. Rauf, Y. Abbas, F. Amjad, A. Hemani, “PCSS: Privacy Preserving Communication Scheme for SDN Enabled Smart Homes”, IEEE Sensors Journal, vol. 22, no. 18, 2022, pp.17677 – 17690. DOI: 10.1109/JSEN.2021.3087779
  16. 16.
    S. Yu, A. K. Das, and Y. Park, “ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes”, IEEE Access, vol. 9, 2021, pp. 49154 - 49159. DOI: 10.1109/ACCESS.2021.3068723
  17. 17.
    A. Qashlan, P. N. X. He and M. Mohanty, “Privacy-Preserving Mechanism in Smart Home Using Blockchain”, IEEE Access, vol. 9, 2021, pp. 103651 – 103669. DOI: 10.1109/ACCESS.2021.3098795
  18. 18.
    B. A. Alzahrani, A.Barnawi, A. Albarakati, A.Irshad , M. A. Khan , and S. A. Chaudhry, “SKIA-SH: A Symmetric Key-Based Improved Lightweight Authentication Scheme for Smart Homes”, Wireless Communications and Mobile Computing, Hindawi, vol.2022, 2022, pp. 1-12. https://doi.org/10.1155/2022/8669941
  19. 19.
    B. Liu, X. Yao, K. Guo, P. Zhu, “Consortium Blockchain Based Lightweight Message Authentication and Auditing in Smart Home”, IEEE Access ,vol. 11, 2023, pp. 68473 – 68485. DOI: 10.1109/ACCESS.2023.3293401
  20. 20.
    S. Uppuluri and G. Lakshmeeswari, “Secure user authentication and key agreement scheme for IoT device access control based smart home communications”, Wireless Networks, Springer, vol. 29, 2023, pp.1333–1354. https://doi.org/10.1007/s11276-022-03197-1
  21. 21.
    H. E. Makhtoum, Y. Bentaleb, “Secure and Lightweight Authentication Protocol for Smart Metering System”, International Journal of Advanced Computer Science and Applications(IJACSA), vol. 13, no. 11, 2022, pp. 1-8. DOI: 10.14569/IJACSA.2022.0131191
  22. 22.
    X. Zhao, B. Zhong and Z. Cui, “Design of a Decentralized Identifier-Based Authentication and Access Control Model for Smart Homes”, Electronics, vol. 12, no. 15, 2023, pp. 1-20. https://doi.org/10.3390/electronics12153334
  23. 23.
    M. Fariss, H. E. Gafif, A.Toumanari, “A Lightweight ECC-based Three-Factor Mutual Authentication and Key Agreement Protocol for WSNs in IoT”, International Journal of Advanced Computer Science and Applications (IJACSA),vol. 13, no. 6, 2022, pp. 1-11. DOI: 10.14569/IJACSA.2022.0130660
  24. 24.
    S. Amanlou, K. A.A.Bakar, “Lightweight Security Mechanism over MQTT Protocol for IoT Devices”, International Journal of Advanced Computer Science and Applications (IJACSA),vol. 11, no. 7, 2020, pp.1-6. DOI: 10.14569/IJACSA.2020.0110726
  25. 25.
    H.Alasmary, and M. Tanveer, “ESCI-AKA: Enabling Secure Communication in an IoT-Enabled Smart Home Environment Using Authenticated Key Agreement Framework”, Mathematics, vol.11, no. 16, pp. 1-25. https://doi.org/10.3390/math11163450.
SCOPUS
SCImago Journal & Country Rank