All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

SeMLAS: An Efficient Secure Multi-Level Authentication Scheme for IoT-Based Smart Home Systems

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14330%2F19%3A00109473" target="_blank" >RIV/00216224:14330/19:00109473 - isvavai.cz</a>

  • Result on the web

    <a href="http://dx.doi.org/10.1109/IWCMC.2019.8766442" target="_blank" >http://dx.doi.org/10.1109/IWCMC.2019.8766442</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1109/IWCMC.2019.8766442" target="_blank" >10.1109/IWCMC.2019.8766442</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    SeMLAS: An Efficient Secure Multi-Level Authentication Scheme for IoT-Based Smart Home Systems

  • Original language description

    Smart Home Networks (SHNs) are attracting increasing interest in the research, development, and professional communities, particularly with the fast adoption of Internet of Things (IoT) devices. However, because of the limited processing, storage, and communication capabilities of these devices as well as their proprietary technologies, SHNs are getting vulnerable to numerous security threats that can adversely affect their proper functioning. Granting access to the legitimate users/entities is, therefore, essential to prevent illegitimate users from unauthorized use of the available resources. We argue that current access control schemes are not suitable for IoT-based SHN. In this paper, we therefore propose a novel Secure Multi-Level Authentication Scheme (SeMLAS) based on software mobile agents. In addition to enabling secure authentication between external peers and nodes at different hierarchical level of the SHN, our scheme can shorten the authentication process and detect malicious nodes via an appropriate use of mobile agents. The performance analysis of the implementation of SeMLAS with the NS2 tool is showing promising results. Indeed, compared with the OTP and TinyPK schemes, SeMLAS is achieving 48% and 24% less in terms of communication overhead and total energy consumption respectively.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    10200 - Computer and information sciences

Result continuities

  • Project

  • Continuities

    I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace

Others

  • Publication year

    2019

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    The 15th International Wireless Communications & Mobile Computing Conference (IWCMC 2019)

  • ISBN

    9781538677476

  • ISSN

    2376-6492

  • e-ISSN

  • Number of pages

    6

  • Pages from-to

    1373-1378

  • Publisher name

    IEEE

  • Place of publication

    Tangier, Morocco

  • Event location

    Tangier, Morocco

  • Event date

    Jan 1, 2019

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article

    000492150100233