Smart City Gnosys

Smart city article details

Title Esci-Aka: Enabling Secure Communication In An Iot-Enabled Smart Home Environment Using Authenticated Key Agreement Framework
ID_Doc 24330
Authors Alasmary H.; Tanveer M.
Year 2023
Published Mathematics, 11, 16
DOI http://dx.doi.org/10.3390/math11163450
Abstract Smart home environments are a vital component of the larger ecosystem within smart cities, aiming to revolutionize residential living through the integration of Internet of Things (IoT) devices and advanced technologies. However, ensuring robust security and preserving privacy in these interconnected ecosystems present significant challenges. During the monitoring and controlling tasks in the smart home environment, diverse commands are exchanged between the IoT device and the user over the public Internet. The public Internet is open and vulnerable to various security attacks, which can corrode the monitoring and controlling operation of the smart home. In addition, conventional security algorithms are inappropriate for IoT devices deployed in the smart home. However, various pernicious security attacks are equally efficacious in the resource-limited smart home environment. Thus, various authenticated encryption schemes are proposed to enable security services in resource-constricted smart home environments. This paper presents a lightweight and efficient authentication framework for a smart home environment by leveraging the features of an authenticated encryption scheme and the hash function called “ESCI-AKA”. ESCI-AKA checks the authenticity of the user at the local device and exchanges three messages among the user, gateway, and smart embedded device for establishing a secure channel for indecipherable communication by setting a session key. In addition, we corroborate the security of the established session key through the random oracle model and informal security analysis. Moreover, the Scyther tool is employed for the security validation of ESCI-AKA. Finally, the performance comparison of ESCI-AKA and other eminent security frameworks explicates that ESCI-AKA requires low computational and communication costs while providing robust security features. © 2023 by the authors.
Author Keywords authentication; Internet of things; smart city; smart device; smart home


Similar Articles


Id Similarity Authors Title Published
42045 View0.876Lee H.; Ryu J.Physical-Unclonable-Function-Based Secure And Anonymous User Authentication For Smart HomesIEEE Access, 12 (2024)
26946 View0.861Bhardwaj A.; Bharany S.; Abulfaraj A.W.; Osman Ibrahim A.; Nagmeldin W.Fortifying Home Iot Security: A Framework For Comprehensive Examination Of Vulnerabilities And Intrusion Detection Strategies For Smart CitiesEgyptian Informatics Journal, 25 (2024)
7977 View0.858Babu Erukala S.; Tokmakov D.; Devi Aguru A.; Kaluri R.; Bekyarova-Tokmakova A.; Mileva N.An End-To-End Secure Communication Framework For Smart Homes Environment Using Consortium Blockchain SystemIEEE Access, 13 (2025)
5129 View0.853Mohammad Z.; Abusukhon A.; Qattam T.A.A Survey Of Authenticated Key Agreement Protocols For Securing Iot2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology, JEEIT 2019 - Proceedings (2019)