2020
DOI: 10.1145/3399432
|View full text |Cite
|
Sign up to set email alerts
|

Authenticating Smart Home Devices via Home Limited Channels

Abstract: Nowadays, most Internet of Things devices in smart homes rely on radio frequency channels for communication, making them exposed to various attacks such as spoofing and eavesdropping attacks. Existing methods using encryption keys may be inapplicable on these resource-constrained devices that cannot afford the computationally expensive encryption operations. Thus, in this article, we design a key-free communication method for such devices in a smart home. In particular, we introduce the Home-limited Channel (H… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…If the kth extracted features of base device D i and target device D j are one-dimensional numerical features, the similarity between f (Dj,k) e and f (Di,k) e is calculated by (1).…”
Section: Our Method: Recognizermentioning
confidence: 99%
See 2 more Smart Citations
“…If the kth extracted features of base device D i and target device D j are one-dimensional numerical features, the similarity between f (Dj,k) e and f (Di,k) e is calculated by (1).…”
Section: Our Method: Recognizermentioning
confidence: 99%
“…In (1), ε is the measurement error threshold, and f (Di,k) e is the absolute value of numerical feature.…”
Section: Our Method: Recognizermentioning
confidence: 99%
See 1 more Smart Citation
“…A further approach relies on controlling the flow of information for event-based IoT systems at the brokers to restrict which devices may communicate with each other [48]. The consideration of home-limited channels [71] that can be accessed only within a house yet remain inaccessible for attackers outside the house also provides an interesting application for authenticating devices in a smart home [71].…”
Section: Protection Mechanismsmentioning
confidence: 99%