Lightweight and Seamless Distributed Scheme for the Smart Home
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32797
Lightweight and Seamless Distributed Scheme for the Smart Home

Authors: Muhammad Mehran Arshad Khan, Chengliang Wang, Zou Minhui, Danyal Badar Soomro

Abstract:

Security of the smart home in terms of behavior activity pattern recognition is a totally dissimilar and unique issue as compared to the security issues of other scenarios. Sensor devices (low capacity and high capacity) interact and negotiate each other by detecting the daily behavior activity of individuals to execute common tasks. Once a device (e.g., surveillance camera, smart phone and light detection sensor etc.) is compromised, an adversary can then get access to a specific device and can damage daily behavior activity by altering the data and commands. In this scenario, a group of common instruction processes may get involved to generate deadlock. Therefore, an effective suitable security solution is required for smart home architecture. This paper proposes seamless distributed Scheme which fortifies low computational wireless devices for secure communication. Proposed scheme is based on lightweight key-session process to upheld cryptic-link for trajectory by recognizing of individual’s behavior activities pattern. Every device and service provider unit (low capacity sensors (LCS) and high capacity sensors (HCS)) uses an authentication token and originates a secure trajectory connection in network. Analysis of experiments is revealed that proposed scheme strengthens the devices against device seizure attack by recognizing daily behavior activities, minimum utilization memory space of LCS and avoids network from deadlock. Additionally, the results of a comparison with other schemes indicate that scheme manages efficiency in term of computation and communication.

Keywords: Authentication, key-session, security, wireless sensors.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1316808

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 828

References:


[1] D. Desai, and H. Upadhyay, “Security and Privacy consideration for internet of things in smart home environments,” International Journal of Engineering Research and Development, vol. 10, no. 11, pp. 73-83, November 2014.
[2] Chengliang Wang, Y. Peng, D. De, W. Song, “DPHK Real-Time Distributed Predicted Data Collecting based on activity pattern Knowledge mined from trajectories in Smart Environment”, Frontiers of Computer Science, Vol. 10, Issue 6, pp. 1000–1011, 2016.
[3] J. E. Kim, G. Boulos, J. Yackovich, T. Barth, C. Beckel, and D. Mosse, “Seamless integration of heterogeneous devices and access control in smart homes,” in Proc. 8th Int. Conf. Intell. Environ. (IE). pp. 206-213 June 2012.
[4] P. Kumar, A. Gurtov, J. Iinatti, M. Ylianttilla, and M. Sain, “Lightweight and secure session-key establishment scheme in smart home environments,” IEEE Sensors Journal, vol. 16, no. 1, pp.254-264, 2016.
[5] A. Kailas, V. Cecchi, and A. Mukherjee, “A survey of communication and networking technologies for energy management in building and home automation,” Journal of Computer Networks and communication, vol. 2012, 2012.
[6] GENIO—Next Generation Home. (Online). Available; http://projects.celtic-initiative.org/genio/, Jul. 15, 2015.
[7] SM4ALL—Smart Home for All. (Online). Available: http://www.sm4all-project.eu/, accessed Jul. 16, 2015.
[8] HOPE— Smart Home For Elderly People. (Online). Available: http://www.hope-project.eu/, accessed Jul. 15, 2015.
[9] R. Roshan, and A. Kr. Ray, “Challenges and risk to implement IOT in smart homes: An Indian perspective,” International Journal of Computer Applications, vol. 153, no. 3, pp. 16-19, November 2016.
[10] Chengliang Wang, Yu Zhang, “Time-Window and Voronoi-Partition Based Aggregation Scheduling in Multi-Sink Wireless Sensor Networks”, Ad Hoc & Sensor Wireless Networks. Vol. 32, issue, 3-4, pp. 221-238, in 2016.
[11] P. Kumar, A. Braeken, A. Gurtov, J. Iinatti, and P. H. Ha, “Anonymous secure framework in connected smart home environments,” Journal of Latex Class Files, IEEE Transactions on Information Forensics and Security, vol. 13, no. 9, 2017.
[12] B. Vaidya, D. Makrakis, and H. T. Mouftah, “Device authentication mechanism for smart energy home area network”, in Proc. IEEE Int. Conference Consum. Electron. (ICCE), June, 2013, pp. 88-93.
[13] N. P. Hoang and D. Pishva, “A TOR-based anonymous communication approach to secure smart home appliances,” in 2015 17th International Conferences on Advanced Communication Technology (ICACT). IEEE, 2015, pp. 517-525.
[14] E. Ayday and S. Rajagopal, “Secure Device Authentication Mechanisms for the Smart Grid-Enabled Home Area networks,” Tech. Rep., 2013.
[15] M. Burrough, and J. Gill. Smart thermostat Security: Turning up the Heat. (Online). Available: http://www.burrough.org/Documents/Thermostat-final-paper.pdf, accessed April, 10, 2015.
[16] “AVISPA: Automated Validation of Internet Security Protocols and Applications,” http://www.avispa-project.org/web-interface/basic.php.