Toward Enforcing Security in Smart Homes Using a Trust-Based Scheme
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14330%2F20%3A00115248" target="_blank" >RIV/00216224:14330/20:00115248 - isvavai.cz</a>
Výsledek na webu
<a href="http://dx.doi.org/10.1007/978-3-030-44038-1_14" target="_blank" >http://dx.doi.org/10.1007/978-3-030-44038-1_14</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1007/978-3-030-44038-1_14" target="_blank" >10.1007/978-3-030-44038-1_14</a>
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Toward Enforcing Security in Smart Homes Using a Trust-Based Scheme
Popis výsledku v původním jazyce
Thanks to the huge progress in miniaturization, communication technologies, and mobile computing, smart homes are becoming increasingly popular. In order to manage the related facilities and provide the expected services, dedicated systems are commonly using Radio Frequency Identification (RFID) devices. However, these devices are still prone to security breaches and consequently pose threats to privacy. Effective solutions are, therefore, urgently needed to address these deficiencies. Within this context, we are proposing in this paper a security authentication scheme based on trust evaluation to detect counterfeit tags and prevent attacks like jamming and cloning. Our scheme, called Trust-Based Authentication (TBA), is particularly using trusts derived from historical transactions between RFID readers and RFID tags as well as trusts obtained from other readers as recommendations. Our simulation results show promising results in terms of replica detection and failure rates.
Název v anglickém jazyce
Toward Enforcing Security in Smart Homes Using a Trust-Based Scheme
Popis výsledku anglicky
Thanks to the huge progress in miniaturization, communication technologies, and mobile computing, smart homes are becoming increasingly popular. In order to manage the related facilities and provide the expected services, dedicated systems are commonly using Radio Frequency Identification (RFID) devices. However, these devices are still prone to security breaches and consequently pose threats to privacy. Effective solutions are, therefore, urgently needed to address these deficiencies. Within this context, we are proposing in this paper a security authentication scheme based on trust evaluation to detect counterfeit tags and prevent attacks like jamming and cloning. Our scheme, called Trust-Based Authentication (TBA), is particularly using trusts derived from historical transactions between RFID readers and RFID tags as well as trusts obtained from other readers as recommendations. Our simulation results show promising results in terms of replica detection and failure rates.
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
—
OECD FORD obor
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Návaznosti výsledku
Projekt
—
Návaznosti
I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace
Ostatní
Rok uplatnění
2020
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
AINA Workshops 2020
ISBN
9783030440374
ISSN
2194-5357
e-ISSN
—
Počet stran výsledku
10
Strana od-do
149-158
Název nakladatele
Springer
Místo vydání
Caserta, Italy
Místo konání akce
Caserta, Italy
Datum konání akce
1. 1. 2020
Typ akce podle státní příslušnosti
CST - Celostátní akce
Kód UT WoS článku
—