Event Details

Secure remote anonymous user authentication scheme for smart home environment

Presenter: v
Supervisor:

Date: Mon, February 8, 2021
Time: 10:00:00 - 00:00:00
Place: ZOOM - Please see below.

ABSTRACT

Zoom meeting linkhttps://us02web.zoom.us/j/4654597074?pwd=MmhCQVp3R3VrOWJ0OXVTM3NHQXkyQT09

Meeting ID: 465 459 7074

Password:  n0e3T9

Note: Please log in to Zoom via SSO and your UVic Netlink ID

 

Abstract:  Smart home technology is an emerging application of Internet-of-Things (IoT) where the user can remotely control home devices. Since the user/home communication channel is insecure, an efficient and anonymous authentication scheme is required to provide secure communications in smart home environment. We propose a new scheme for user authentication that combines physical context awareness and transaction history. The new scheme offers two advantages: it does not maintain a verification table and avoids clock synchronization problem. Communication overhead and computational cost of the proposed scheme are analyzed and compared with other related schemes. The security of the scheme is evaluated using three different methods: (1) formal analysis using the Burrows-Abadi-Needham logic (BAN); (2) informal analysis; (3) model check using the automated validation of internet security protocols and applications (AVISPA) tool.

Zoom meeting linkhttps://us02web.zoom.us/j/4654597074?pwd=MmhCQVp3R3VrOWJ0OXVTM3NHQXkyQT09

Meeting ID: 465 459 7074

Password:  n0e3T9

Note: Please log in to Zoom via SSO and your UVic Netlink ID

 

Abstract:  Smart home technology is an emerging application of Internet-of-Things (IoT) where the user can remotely control home devices. Since the user/home communication channel is insecure, an efficient and anonymous authentication scheme is required to provide secure communications in smart home environment. We propose a new scheme for user authentication that combines physical context awareness and transaction history. The new scheme offers two advantages: it does not maintain a verification table and avoids clock synchronization problem. Communication overhead and computational cost of the proposed scheme are analyzed and compared with other related schemes. The security of the scheme is evaluated using three different methods: (1) formal analysis using the Burrows-Abadi-Needham logic (BAN); (2) informal analysis; (3) model check using the automated validation of internet security protocols and applications (AVISPA) tool.