Article
Engineering, Electrical & Electronic
Hongzhi Li, Dezhi Han, Chin-Chen Chang
Summary: Smart home is an important application in improving living environment, and cryptography-based protection schemes have been proposed to ensure data confidentiality. Access control is urgently needed in smart home, and current centralized schemes have security and scalability issues. This study proposes a decentralized and reliable access control scheme for smart home using smart contracts, named DAC4SH. Experimental results show that DAC4SH performs appropriately in terms of computational and communication costs.
IEEE SENSORS JOURNAL
(2023)
Article
Engineering, Electrical & Electronic
Hongzhi Li, Dezhi Han, Chin-Chen Chang
Summary: Smart home is an important IoT-based application for improving living environment. To ensure data confidentiality, many cryptographic protection schemes have been proposed. Access control is a promising method to protect generated data from unauthorized access and is urgently needed in smart home. This study proposes a decentralized and reliable access control scheme for smart homes using smart contracts, named DAC4SH. By recording all access activities into immutable distributed ledgers for auditing, our proposed scheme proves to be feasible. According to experimental results, the performance of DAC4SH is deemed appropriate.
IEEE SENSORS JOURNAL
(2023)
Article
Mathematics
Tsu-Yang Wu, Qian Meng, Yeh-Cheng Chen, Saru Kumari, Chien-Ming Chen
Summary: The extensive application of IoT and AI technology has greatly promoted the construction and development of smart cities. However, the privacy and data security of smart home users accessing the system through public channels are vulnerable to attack. This paper presents a provably secure authentication scheme for the smart home environment, ensuring only legitimate users can use smart devices. The scheme is verified using an informal model and formally analyzed using the Real or Random model. By comparing security and performance analysis, our scheme proves to have higher security with similar performance.
Article
Computer Science, Information Systems
Sirisha Uppuluri, G. Lakshmeeswari
Summary: The upcoming paradigm in Internet of Things (IoT) based applications aims to improve interactional communication strategies between devices in smart home systems. Security measures, such as authentication and access control, are vital to ensure secure communication. The proposed protocol, Modified Honey Encryption using Inverse Sampling-Conditional Probability Model Transform (MHE-IS-CPMT) with Elliptic Curve Cryptography (ECC), provides secure authentication and key agreement. It includes steps such as initialization, registration, login and data access request, authentication and session key agreement, and key update. The protocol ensures secure device registration, user authentication, and key management, offering greater security than existing methods.
Article
Computer Science, Information Systems
Jian Chang, Junpei Ni, Jiang Xiao, Xiaohai Dai, Hai Jin
Summary: This article emphasizes the importance of data sharing in a multichain environment and proposes SynergyChain, a multichain framework that enables reliable data sharing with controllable data access. By aggregating and reorganizing data from multiple blockchains, SynergyChain ensures data reliability while providing automated and credible access control through smart contracts.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Leyou Zhang, Guang Yang, Chao Song, Qing Wu
Summary: This paper proposes an accountable multi-authority access control framework based on attribute-based encryption (ABE) to address security and privacy issues in smart grid systems.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2023)
Article
Computer Science, Hardware & Architecture
XiaoXu Zhang, Run-hua Shi, WanPeng Guo, PengBo Wang, WeiYang Ke
Summary: Devices and edges of the IoT work together to enhance sensing capability, causing increased concern for protecting personal sensory information privacy in smart homes. Attribute-based encryption (ABE) is widely used to enable secure data sharing in this scenario. However, the computational complexity of ABE makes it difficult for resource-constrained devices. Edge computing solves this problem by offloading heavy cryptographic operations to an edge server (ES) and uploading device data to a cloud. To ensure data integrity and correctness, a lightweight dual auditing scheme is proposed, utilizing data block aggregation, signatures, and Zero-Knowledge (ZK) proof. A smart contract is used for data user authentication to prevent collusion attacks. Simulation experiments confirm the efficiency of the proposed multiple auditing scheme.
Article
Telecommunications
Bello Musa Yakubu, Majid Iqbal Khan, Abid Khan, Farhana Jabeen, Gwanggil Jeon
Summary: Smart home devices are susceptible to various attacks, especially when multiple devices collude to launch a DDoS attack in a network. Previous studies have proposed authentication protocols that are not necessarily implementable in devices, particularly during D2D interactions. This research utilizes the Ethereum blockchain and smart contracts to propose a lightweight authentication mechanism that enables secure D2D interactions in a smart home.
DIGITAL COMMUNICATIONS AND NETWORKS
(2023)
Article
Engineering, Multidisciplinary
Tianshi Mu, Yuyang Lai, Guocong Feng, Huahui Lyu, Hang Yang, Jianfeng Deng
Summary: Smart grids are considered to be the next generation of electricity grids and can significantly impact the economic and environmental well-being of society. The effective use of data obtained from the grid is crucial for making it smart. Due to the sensitivity of the measured data, implementing data access control in smart grids is highly necessary to ensure security and privacy.
ALEXANDRIA ENGINEERING JOURNAL
(2023)
Article
Energy & Fuels
Linghao Zhang, Yong Tang, Te Zhou, Chao Tang, Huihui Liang, Jie Zhang
Summary: This paper proposes a regulation architecture based on load aggregator for accurate regulation and control of flexible smart home appliance loads. By analyzing the load value indicators, the adjustable potential of air-conditioner loads is effectively calculated, and the demand response capability and continuously controlled time of air-conditioners are accurately calculated through simulation study.
Article
Chemistry, Physical
Dae Sol Kong, Kyung Hoon Kim, Ying Chieh Hu, Jong Hun Kim, Inseo Kim, Jeongwan Lee, Joonhyuk Lee, Won Hyuk Shon, Hanjin Yoo, Chul-Un Ro, Seungsu Lee, Hyoungjeen Jeen, Minbaek Lee, Minseok Choi, Jong Hoon Jung
Summary: With the rapid development of the Internet of Things and artificial intelligence, smart home has emerged to fulfill the security, convenience, and energy-saving issues of modern life. A flexoelectric mica crystal is used to augment the finger touch-driven triboelectric output for operating a wireless and multichannel smart home controller. This work provides important ingredients for enhancing triboelectric output and realizing a convenient, multifunctional, cost-effective, and adaptable smart home control system without batteries.
Article
Nanoscience & Nanotechnology
S. M. Sohel Rana, M. Toyabur Rahman, M. Salauddin, S. Sharma, P. Maharjan, T. Bhatta, Hyunok Cho, Chani Park, Jae Yeong Park
Summary: Understanding the microcapacitor formation is crucial in improving the output performance of triboelectric nanogenerators (TENG), with the EN-TENG using PVDF-TrFE/MXene nanocomposite material showing significant enhancement in power density. This technology successfully powered electronic devices and was utilized in smart home applications.
ACS APPLIED MATERIALS & INTERFACES
(2021)
Article
Computer Science, Information Systems
Faiza Loukil, Chirine Ghedira-Guegan, Khouloud Boukadi, Aicha-Nabila Benharkat, Elhadj Benkhelifa
Summary: The Internet of Things is expected to enhance individuals' quality of life, but ensuring security and privacy remains a challenge. Centralized entity-based IoT device management poses a single point of failure, while distributed approaches struggle with delegating validation in untrustworthy IoT environments. Blockchain technology offers decentralization to address the trust issue, with smart contracts able to immediately detect vulnerabilities and protect data owner's privacy.
ACM TRANSACTIONS ON INTERNET TECHNOLOGY
(2021)
Article
Computer Science, Information Systems
Hafida Saidi, Nabila Labraoui, Ado Adamou Abba Ari, Leandros A. Maglaras, Joel Herve Mboussam Emati
Summary: In recent years, there has been an increasing interest in using wireless communication technologies and mobile devices in healthcare, but patient privacy is still at risk for data breaches. Implementing an access control system is a challenge when the patient's data can be accessed by users with diverse privileges. Blockchain is a new technology that can address this issue, but it also faces scalability, security, and privacy challenges.
Article
Computer Science, Artificial Intelligence
Soumyajit Ghosh, Arunava Chatterjee, Debashis Chatterjee
Summary: In this paper, a method based on statistical features is proposed for appliance identification, and a type-2 fuzzy system is built for the identification of household appliances. Additionally, an IoT-based load control system is developed for remote monitoring and control of appliances. The proposed method has higher identification accuracy compared to other state-of-the-art techniques, and its usefulness is validated through experiments.
EXPERT SYSTEMS WITH APPLICATIONS
(2023)