About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in New Computing Environments. Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings

Research Article

PUF-Based Two-Factor Group Authentication in Smart Home

Download(Requires a free EAI acccount)
4 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-66922-5_14,
        author={Sai Ji and Rongxin Qi and Jian Shen},
        title={PUF-Based Two-Factor Group Authentication in Smart Home},
        proceedings={Security and Privacy in New Computing Environments. Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings},
        proceedings_a={SPNCE},
        year={2021},
        month={1},
        keywords={Smart home Secret sharing Authentication Fuzzy extractor},
        doi={10.1007/978-3-030-66922-5_14}
    }
    
  • Sai Ji
    Rongxin Qi
    Jian Shen
    Year: 2021
    PUF-Based Two-Factor Group Authentication in Smart Home
    SPNCE
    Springer
    DOI: 10.1007/978-3-030-66922-5_14
Sai Ji, Rongxin Qi,*, Jian Shen
    *Contact email: q_qirongxin@126.com

    Abstract

    Various IoT-based applications such as smart home, intelligent medical and VANETs, have been put into practical utilization. Smart home is one of the most concerned environments, which allows users to remotely access and control smart devices via a public network. With development of the mobile network and smart devices, more services can be provided to users by smart devices. To securely access devices and obtain collected data over the public network, multi-factor authentication schemes for smart home have obtained wide attention. However, most of these schemes cannot withstand impersonation attack, physical device lost attack, privileged-insider attack, smart card lost attack and so on. Besides, high communication and computational costs weaken the system performance, which causes that most authentication schemes are not suitable for resource-constrained smart devices. To mitigate the aforementioned drawbacks, we proposed a two-factor anonymous group authentication scheme to implement secure access to multiple devices simultaneously using chinese remainder theorem and secret sharing technology. Our scheme also utilizes fuzzy extractor to extract personal biometric information, which helps uniquely validate authorized users in smart home. Our scheme can support various security features and withstand the most well-known attacks in smart home. Performance analysis indicates that the proposed scheme can efficiently reduce communication/computational costs when the user accesses multiple devices simultaneously.

    Keywords
    Smart home Secret sharing Authentication Fuzzy extractor
    Published
    2021-01-22
    Appears in
    SpringerLink
    http://dx.doi.org/10.1007/978-3-030-66922-5_14
    Copyright © 2020–2025 ICST
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL