A novel Primary Key infrastructure IoT enabled secure Access Control Framework Based smart home applications
DOI:
https://doi.org/10.21015/vtse.v13i1.2040Abstract
This paper presents a comprehensive security framework for smart home environments, integrating advanced authentication, access control mechanisms, and machine learning for robust IoT protection. A typical smart home ecosystem is illustrated with interconnected devices—air conditioning systems, robotic assistants, surveillance cameras, and thermostats—linked through a centralised wireless network that facilitates seamless communication and remote control via the internet. The framework emphasises secure authentication and authorisation processes, using public key infrastructure (PKI) to validate devices and users while issuing, renewing, and revoking certificates for encrypted communication. The mathematical model outlines device and user authentication, validation functions, and access control mechanisms to ensure secure operations. Fine-grained access control is implemented to grant permissions based on specific conditions, ensuring flexible yet secure resource allocation. Communication security is maintained through encryption and decryption, safeguarding data transmitted across devices and networks. To mitigate security risks, a convolutional neural network is employed for anomaly detection, identifying threats by recognising deviations in regular patterns. Additionally, the framework addresses interoperability by adhering to standard-compliance protocols, facilitating seamless integration across diverse devices. Resource optimisation techniques are introduced to maximise efficiency based on the number and capabilities of devices in the network. User interaction is streamlined through an intuitive interface that supports secure and user-friendly system access. The proposed SAC-PKI algorithm serves as the foundation for the framework, detailing sequential steps for authentication, certificate management, access control, and anomaly detection. By leveraging adaptive security features and advanced threat detection, this framework provides a robust solution for enhancing the cybersecurity of smart home deployments, addressing vulnerabilities, and ensuring efficient resource utilisation in IoT environments.
References
T. Magara and Y. Zhou, “Internet of things (IoT) of smart homes: Privacy and security,” Journal of Electrical and Computer Engineering, vol. 2024, no. 1, p. 7716956, 2024.
M. Shafiq, Z. Gu, O. Cheikhrouhou, W. Alhakami, and H. Hamam, “The rise of ‘Internet of Things’: Review and open research issues related to detection and prevention of IoT-based security attacks,” Wireless Communications and Mobile Computing, vol. 2022, no. 1, p. 8669348, 2022.
Y. R. Siwakoti, M. Bhurtel, D. B. Rawat, A. Oest, and R. Johnson, “Advances in IoT security: Vulnerabilities, enabled criminal services, attacks, and countermeasures,” IEEE Internet of Things Journal, vol. 10, no. 13, pp. 11224–11239, 2023.
Y. Huang, I.-L. Yen, and F. Bastani, “Collaborative access control for IoT—a blockchain approach,” arXiv preprint, arXiv:2405.15749, 2024.
A. Punia et al., “A systematic review on blockchain-based access control systems in cloud environment,” Journal of Cloud Computing, vol. 13, no. 1, p. 146, 2024.
Z. Ullah et al., “Towards blockchain-based secure storage and trusted data sharing scheme for IoT environment,” IEEE Access, vol. 10, pp. 36978–36994, 2022.
Z. Rahman et al., “Enhancing AES using chaos and logistic map-based key generation technique for securing IoT-based smart home,” arXiv preprint, arXiv:2203.16124, 2022.
B. Ahuja et al., “IoT-based multi-dimensional chaos mapping system for secure and fast transmission of visual data in smart cities,” IEEE Access, vol. 11, pp. 104930–104945, 2023.
W. E. H. Youssef et al., “A secure chaos-based lightweight cryptosystem for the Internet of Things,” IEEE Access, vol. 11, pp. 123279–123294, 2023.
K. S. Sudha, N. Jeyanthi, and C. Iwendi, “Secure supervised learning-based smart home authentication framework,” arXiv preprint, arXiv:2402.00568, 2024.
E. Magara, “Internet of things (IoT) of smart homes: Privacy and security,” International Journal of Communication Systems, vol. 37, no. 12, p. e7716956, 2024.
C. K. Nkuba et al., “Riding the IoT wave with VFuzz: Discovering security flaws in smart homes,” IEEE Access, vol. 10, pp. 123456–123469, 2022.
S. I. S. Corp., “The role of IoT in modern home security systems,” Aug. 21, 2024.
T. AI, “Data privacy in the age of IoT: Securing connected devices in 2024,” 2024.
D. Authority, “The top 8 IoT security challenges of 2024 and how to overcome them,” 2024.
MDPI, “Review of smart-home security using the Internet of Things,” Electronics, vol. 13, no. 16, p. 3343, 2024.
G. Vardakis et al., “Review of smart-home security using the Internet of Things,” Electronics, vol. 13, no. 16, p. 3343, 2024.
GlobeNewswire, “Internet of Things (IoT) security strategic market report 2024–2030,” Nov. 21, 2024.
Y. A. Akere, Impact of Internet of Things Devices on Corporate Networks, Ph.D. dissertation, The George Washington University, 2024.
I. F. All, “IoT security: An evolving landscape.” [Online]. Available: https://www.iotforall.com/iot-security-an-evolving-landscape, 2024.
Wikipedia contributors, “Z-Wave.” [Online]. Available: https://en.wikipedia.org/wiki/Z-Wave, Oct. 1, 2024.
Wikipedia contributors, “Apple Home.” [Online]. Available: https://en.wikipedia.org/wiki/Apple_Home, Oct. 5, 2024.
J. P. Tuohy, “You’ll need to buy a new lock if you want Apple Home to ‘magically’ unlock your door,” Jun. 19, 2024.
M. Leszczuk, “Analysis of the safety of the Internet of Things in the mesh,” in IoT Technologies in Smart-Cities: From Sensors to Big Data, Security and Trust, p. 105, 2020.
R. Crist, “Z-Wave smart-home gadgets announce new IoT security standards,” CNET, Nov. 2016. [Accessed: Apr. 13, 2025].
S. Uppuluri and G. Lakshmeeswari, “Review of security and privacy-based IoT smart home access control devices,” Wireless Personal Communications, vol. 137, no. 3, pp. 1601–1640, 2024.
S. Uppuluri and G. Lakshmeeswari, “Secure user authentication and key agreement scheme for IoT device access control based smart home communications,” Wireless Networks, vol. 29, no. 3, pp. 1333–1354, 2023.
D. H. Hussein and M. Ibnkahla, “A novel mathematical framework for modeling application-specific IoT traffic,” IEEE Internet of Things Journal, vol. 11, no. 2, pp. 2364–2381, 2023.
M. B. Haghparast et al., “Developing and evaluating a proposed health security framework in IoT using fuzzy analytic network process method,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, pp. 3121–3138, 2021.
M. Talal et al., “Smart home-based IoT for real-time and secure remote health monitoring of triage and priority system using body sensors: Multi-driven systematic review,” Journal of Medical Systems, vol. 43, pp. 1–34, 2019.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC-By) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This work is licensed under a Creative Commons Attribution License CC BY