A review on Internet of Things Based Smart Home
Author Security Framework
Download 235.34 Kb. Pdf ko'rish
|
A Review on Internet of Things Based Smart Home
Author
Security Framework Security Goals Zegers et al. [5] The protocol can protect data before it is transmitted to the cloud by separating key encryption and data encryption. It improves the flexibility and efficiency of encryption key management. Park et al. [6] Used to create virtual activities against side channel attacks in a virtual home environment. Flexible control of the number of false data transfers to balance energy efficiency and privacy protection. Zhou et al. [7] The protocol integrates certificateless signature and bilinear pairing encryption. It be used for devices with limited computing power. B. Authentication Authentication is used to deal with impersonating threats in the Internet of things system. In smart home environment, it is necessary to implement identity authentication to prevent devices and systems from being used illegally. Authentication is to verify that the data has not been tampered with, and the main purpose is to verify the identity of the device users and prevent illegal users from operating smart home devices. For instance, an unauthenticated alert may cause housing administrator to mistakenly think there is an emergency, so open the exit to allow access, but actually allowing illegal entry. Authentication includes the verification of cloud service, mobile interface and local device management, especially the devices connected to the Internet and allowed the third party to operate and control need strong authentication and authorization control mechanism. Smart home system is usually composed of a variety of devices, although many authentication schemes have been proposed, most of them will bring a lot of overhead, so it 274 Authorized licensed use limited to: Tashkent University of Information Technologies. Downloaded on April 09,2023 at 09:43:10 UTC from IEEE Xplore. Restrictions apply. is necessary to design an efficient and lightweight authentication method to ensure the security of smart home (Table. II). TABLE II. R ESEARCH ON SMART HOME A UTHENTICATION Download 235.34 Kb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling