Authentication Protocol for Smart Home Devices Constrained using ECC

Main Article Content

Velaga Sohith Raghava, Pulakandam Venkata Siva Naga Hemanth, Palanisamy Santhi

Abstract

The In smart home devices, communication between the user and the home devices can be taken place inaccessibly. The principle issue is about security. So many protocols have been formulated for the com- munication process, but the passwords are easy to decrypt as they have a very low chance of combination, which means we can use brute force to decrypt them. Another principal issue is resource restraint because the devices used in communication are very slow in processing. In this paper, we introduced the lightweight protocol using a one-way hash and the concept of an elliptic curve. Prover if is used for formal verification of the protocol, guaranteeing a rigorous mathematical evaluation of its correctness. Furthermore, in the context of smart home environments, informal security research verifies its resilience against most privacy and security concern.

Article Details

Section
Articles