A review on Internet of Things Based Smart Home


Author  Security Framework


Download 235.34 Kb.
Pdf ko'rish
bet3/6
Sana30.04.2023
Hajmi235.34 Kb.
#1406855
1   2   3   4   5   6
Bog'liq
A Review on Internet of Things Based Smart Home

Author 
Security Framework
Security 
Goals
Zegers
et al.
[5]
The protocol can protect data 
before it is transmitted to the 
cloud 
by 
separating 
key 
encryption and data encryption. 
It 
improves 
the 
flexibility 
and 
efficiency of encryption 
key management. 
Park et al. 
[6]
Used to create virtual activities 
against side channel attacks in a 
virtual home environment. 
Flexible control of the 
number of false data 
transfers to balance 
energy efficiency and 
privacy protection. 
Zhou
et al.
[7] 
The 
protocol 
integrates 
certificateless signature and 
bilinear pairing encryption. 
It be used for devices 
with limited computing 
power. 
B. Authentication
Authentication is used to deal with impersonating threats in
the Internet of things system. In smart home environment, it is 
necessary to implement identity authentication to prevent 
devices and systems from being used illegally. Authentication is 
to verify that the data has not been tampered with, and the main 
purpose is to verify the identity of the device users and prevent 
illegal users from operating smart home devices. For instance, 
an unauthenticated alert may cause housing administrator to 
mistakenly think there is an emergency, so open the exit to allow 
access, but actually allowing illegal entry. Authentication 
includes the verification of cloud service, mobile interface and 
local device management, especially the devices connected to 
the Internet and allowed the third party to operate and control 
need strong authentication and authorization control 
mechanism. Smart home system is usually composed of a 
variety of devices, although many authentication schemes have 
been proposed, most of them will bring a lot of overhead, so it 
274
Authorized licensed use limited to: Tashkent University of Information Technologies. Downloaded on April 09,2023 at 09:43:10 UTC from IEEE Xplore. Restrictions apply. 


is necessary to design an efficient and lightweight authentication 
method to ensure the security of smart home (Table. II). 
TABLE II. 
R
ESEARCH ON SMART HOME 
A
UTHENTICATION

Download 235.34 Kb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling