作者
Mohammad Wazid, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Willy Susilo
发表日期
2017/10/18
期刊
IEEE Transactions on Dependable and Secure Computing
卷号
17
期号
2
页码范围
391-406
出版商
IEEE
简介
The Information and Communication Technology (ICT) has been used in wide range of applications, such as smart living, smart health and smart transportation. Among all these applications, smart home is most popular, in which the users/residents can control the operations of the various smart sensor devices from remote sites also. However, the smart devices and users communicate over an insecure communication channel, i.e., the Internet. There may be the possibility of various types of attacks, such as smart device capture attack, user, gateway node and smart device impersonation attacks and privileged-insider attack on a smart home network. An illegal user, in this case, can gain access over data sent by the smart devices. Most of the existing schemes reported in the literature for the remote user authentication in smart home environment are not secure with respect to the above specified attacks. Thus, there …
引用总数
201820192020202120222023202413315474787420
学术搜索中的文章
M Wazid, AK Das, V Odelu, N Kumar, W Susilo - IEEE Transactions on Dependable and Secure …, 2017