Event Details
Secure remote anonymous user authentication scheme for smart home environment
Presenter: v
Supervisor:
Date: Mon, February 8, 2021
Time: 10:00:00 - 00:00:00
Place: ZOOM - Please see below.
ABSTRACT
Zoom meeting link:
Meeting ID: 465 459 7074
Password: n0e3T9
Note: Please log in to Zoom via SSO and your UVic Netlink ID
Abstract: Smart home technology is an emerging application of Internet-of-Things (IoT) where the user can remotely control home devices. Since the user/home communication channel is insecure, an efficient and anonymous authentication scheme is required to provide secure communications in smart home environment. We propose a new scheme for user authentication that combines physical context awareness and transaction history. The new scheme offers two advantages: it does not maintain a verification table and avoids clock synchronization problem. Communication overhead and computational cost of the proposed scheme are analyzed and compared with other related schemes. The security of the scheme is evaluated using three different methods: (1) formal analysis using the Burrows-Abadi-Needham logic (BAN); (2) informal analysis; (3) model check using the automated validation of internet security protocols and applications (AVISPA) tool.
Zoom meeting link:
Meeting ID: 465 459 7074
Password: n0e3T9
Note: Please log in to Zoom via SSO and your UVic Netlink ID
Abstract: Smart home technology is an emerging application of Internet-of-Things (IoT) where the user can remotely control home devices. Since the user/home communication channel is insecure, an efficient and anonymous authentication scheme is required to provide secure communications in smart home environment. We propose a new scheme for user authentication that combines physical context awareness and transaction history. The new scheme offers two advantages: it does not maintain a verification table and avoids clock synchronization problem. Communication overhead and computational cost of the proposed scheme are analyzed and compared with other related schemes. The security of the scheme is evaluated using three different methods: (1) formal analysis using the Burrows-Abadi-Needham logic (BAN); (2) informal analysis; (3) model check using the automated validation of internet security protocols and applications (AVISPA) tool.