{"title":"智能家庭网络的安全密钥协议机制","authors":"Raushan Kumar Singh, Akshay Kumar, M. Hussain","doi":"10.1109/CSI54720.2022.9924103","DOIUrl":null,"url":null,"abstract":"In the modern era of society there is a growing usage of the Internet of Things and its applications can be seen in our daily lives like Smart home, life has become easy and comfortable but there is a tradeoff between security and privacy. Hence there is a need for efficient and secure security mechanisms for Smart homes to further elevate their usage. We have proposed a key agreement scheme between the devices in a smart home. The proposed mechanism established a symmetric key between the base station and the device securely. The established key can be further used for the secure transmission of data. The proposed mechanism is verified for security using the Scyther tool and found that it is secure. As we are not using any complex operation to generate a symmetric key the proposed scheme is lightweight.","PeriodicalId":221137,"journal":{"name":"2022 International Conference on Connected Systems & Intelligence (CSI)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Secure Key Agreement Mechanism for Smart Home Networks\",\"authors\":\"Raushan Kumar Singh, Akshay Kumar, M. Hussain\",\"doi\":\"10.1109/CSI54720.2022.9924103\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the modern era of society there is a growing usage of the Internet of Things and its applications can be seen in our daily lives like Smart home, life has become easy and comfortable but there is a tradeoff between security and privacy. Hence there is a need for efficient and secure security mechanisms for Smart homes to further elevate their usage. We have proposed a key agreement scheme between the devices in a smart home. The proposed mechanism established a symmetric key between the base station and the device securely. The established key can be further used for the secure transmission of data. The proposed mechanism is verified for security using the Scyther tool and found that it is secure. As we are not using any complex operation to generate a symmetric key the proposed scheme is lightweight.\",\"PeriodicalId\":221137,\"journal\":{\"name\":\"2022 International Conference on Connected Systems & Intelligence (CSI)\",\"volume\":\"45 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-08-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Connected Systems & Intelligence (CSI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSI54720.2022.9924103\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Connected Systems & Intelligence (CSI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSI54720.2022.9924103","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Secure Key Agreement Mechanism for Smart Home Networks
In the modern era of society there is a growing usage of the Internet of Things and its applications can be seen in our daily lives like Smart home, life has become easy and comfortable but there is a tradeoff between security and privacy. Hence there is a need for efficient and secure security mechanisms for Smart homes to further elevate their usage. We have proposed a key agreement scheme between the devices in a smart home. The proposed mechanism established a symmetric key between the base station and the device securely. The established key can be further used for the secure transmission of data. The proposed mechanism is verified for security using the Scyther tool and found that it is secure. As we are not using any complex operation to generate a symmetric key the proposed scheme is lightweight.