计算机科学 ›› 2025, Vol. 52 ›› Issue (7): 342-352.doi: 10.11896/jsjkx.250100098
李江旭, 陈泽茂, 张立强
LI Jiangxu, CHEN Zemao, ZHANG Liqiang
摘要: 随着智能家居设备的普及,其资源受限特性和多样化攻击威胁,给传统安全协议带来了严峻挑战。尤其是当下流行的基于云平台的智能家居物联网技术,在提升家居设备智能化程度和管理效率的同时,也带来了较以往更为复杂的控制模式,即用户可以在云平台上设置控制规则来令云平台自动化管理设备,或通过智能家居厂商提供的App来远程控制家庭设备。但在这两种控制模式下,如果没有对设备远程控制方身份进行验证并建立安全会话密钥,攻击者则可能向家庭设备发送恶意指令,从而危害家庭安全。而现有的一些安全方案并没有考虑这两种主流控制模式,且在计算开销、通信效率和安全性之间难以平衡,亟需一种轻量级且高效的认证和密钥协商协议。因此,提出了基于椭圆曲线算法的轻量级云平台与智能设备双向认证和密钥协商方案,以及用户与智能设备间双向认证和密钥协商方案,实现了远程控制方与家庭设备之间高效而安全的认证。采用形式化验证工具ProVerif和启发式分析方法对所提方案进行了安全性分析,并与同类方案进行了安全性和性能比较,结果表明所提方案能够在满足轻量级的前提下提供更多安全特性。
中图分类号:
[1]DEEBAK B D,MEMON F H,KHOWAJA S A,et al.In the digital age of 5G networks:Seamless privacy-preserving authentication for cognitive-inspired internet of medical things[J].IEEE Transactions on Industrial Informatics,2022,18(12):8916-8923. [2]REN Y,LENG Y,QI J,et al.Multiple cloud storage mechanism based onblockchain in smart homes[J].Future Generation Computer Systems,2021,115:304-313. [3]WANG Z,LIU D,SUN Y,et al.A survey on IoT-enabled home automation systems:Attacks and defenses[J].IEEE Communications Surveys & Tutorials,2022,24(4):2292-2328. [4]TAIWOO,EZUGWU A E.Internet of Things-Based Intelligent Smart Home Control System[J].Security and Communication Networks,2021,2021(1):9928254. [5]AMRAOUI N,ZOUARI B.Securing the operation of SmartHome Systems:A literature review[J].Journal of Reliable Intelligent Environments,2022,8(1):67-74. [6]POH G S,GOPE P,NING J.PrivHome:Privacy-Preserving Authenticated Communication in Smart Home Environment[J].IEEE Transactions on Dependable and Secure Computing,2021,18(3):1095-1107. [7]MA Q,TAN H,ZHOU T.Mutual authentication scheme for smart devices in IoT-enabled smart home systems[J].Computer Standards & Interfaces,2023,86:103743. [8]SRINIVAS J,DAS A K,WAZID M,et al.Designing secure user authentication protocol for 17big data collection in IoT-based intelligent transportation system[J].IEEE Internet of Things Journal,2021,8(9):7727-7744. [9]JIANG Q,ZHANG N,NI J,et al.Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles[J].IEEE Transactions on Vehicular Technology,2020,69(9):9390-9401. [10]STOJKOSKA B L R,TRIVODALIEV K V.A review of Internet of Things for smart home:Challenges and solutions[J].Journal of Cleaner Production,2017,140:1454-1464. [11]FARASH M S,TURKANOVI Ć M,KUMARI S,et al.An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment[J].Ad Hoc Networks,2016,36:152-176. [12]VAIDYA B,PARK J H,YEO S,et al.Robust one-time password authentication scheme using smart card for home network environment[J].Computer Communications,2011,34(3):326-336. [13]KUMAR P,GURTOV A,LINATTI J,et al.Lightweight and secure session-key establishment scheme in smart home environments[J].IEEE Sensors Journal 2016,16(1):254-264. [14]WAZID M,DAS A K,ODELU V,et al.Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks[J].IEEE Internet of Things Journal,2018,5(1):269-282. [15]SHUAI M X,YU N H,WANG H X,et al.Anonymous authentication scheme for smart home environment with provable security[J].Computers & Security,2019,86:132-146. [16]WAZID M,DAS A K,ODELU V,et al.Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment[J].IEEE Transactions on Dependable and Secure Computing,2017(2):391-406. [17]CHAUDHRY S A,IRSHAD A,YAHYA K,et al.Rotating behind privacy:An improved lightweight authentication scheme for cloud-based IoT environment[J].ACM Transactions on Internet Technology,2021,21(3):1-19. [18]GUO Y,ZHANG Z,GUO Y.SecFHome:Secure remote authentication in fog-enabled smart home environment[J].Computer Networks,2022,207:108818. [19]WANG C,WANG D,DUAN Y,et al.Secure and lightweightuser authentication scheme for cloud-assisted internet of things[J].IEEE Transactions on Information Forensics and Security,2023,18:2961-2976. [20]TOUQEER H,ZAMAN S,AMIN R,et al.Smart home security:challenges,issues and solutions at different IoT layers[J].The Journal of Supercomputing,2021,77(12):14053-14089. [21]DOLEV D,YAO A.On the security of public key protocols[J].IEEE Transactions on information theory,1983,29(2):198-208. [22]HE D,KUMAR N,KHAN M K,et al.Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services[J].IEEE Systems Journal,2018,12(2):1621-1631. |
|