Abstract
Smart home is intended to be able to enhance home automation systems and achieves goals such as reducing operational costs and increasing comfort while providing security to mobile users. However, an attacker may attempt security attacks in smart home environments because he/she can inject, insert, intercept, delete, and modify transmitted messages over an insecure channel. Secure and lightweight authentication protocols are essential to ensure useful services in smart home environments. In 2020, Iqbal et al. presented an anonymous lightweight authentication protocol for software-defined networking (SDN) enabled smart home, called ALAM. They claimed that ALAM protocol could resist security threats, and also provide secure mutual authentication and user anonymity. This comment demonstrates that ALAM protocol is fragile to various attacks, including session key disclosure, impersonation, and man-in-the-middle attacks, and also their scheme cannot provide user anonymity and mutual authentication. We propose the essential security guidelines to overcome the security flaws of ALAM protocol.
Author supplied keywords
Cite
CITATION STYLE
Yu, S., Das, A. K., & Park, Y. (2021). Comments on ‘“Alam: Anonymous lightweight authentication mechanism for SDN enabled smart homes.”’ IEEE Access, 9, 49154–49159. https://doi.org/10.1109/ACCESS.2021.3068723
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.