Loading

Authentication and Access Control Methods for Secured Smart Home IoT Service Environment
Sei-Youen Oh1, Aeri Lee2

1Sei-Youen Oh, Department of Police Administration, Semyung University, Jecheon, Republic of Koreay.
2Aeri Lee, Department of Computer Education, Catholic Kwandong University, Gangneung, Republic of Korea.
Manuscript received on 19 August 2019 | Revised Manuscript received on 29 August 2019 | Manuscript Published on 16 September 2019 | PP: 330-335 | Volume-8 Issue-2S6 July 2019 | Retrieval Number: B10630782S619/2019©BEIESP | DOI: 10.35940/ijrte.B1063.0782S619
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The development of the Internet of Things has increased the interconnections between things, and the IoT has been applied not only to our everyday life but also to various industrial fields. A variety of services are being developed for many people to use for the IoT environment. More focus is also being put on the smart home service market which applies the IoT to the residential space – an area close to an area close to their everyday life among the IoT services. Though the smart home service market is growing and being used in a variety of fields, security threats exist – such as data fabrication and falsification, illegal authentication and privacy violation. When the device data of the smart home becomes exposed to the security threats, there is also a risk of a secondary damage due to the nature of the smart home environment. Therefore, this paper proposes figuring out related security threats and requirements for a safe access to the smart home system in the IoT environment, as well as safe authentication and access control methods. It is expected that the analysis of the stability and efficiency of the proposed methods will be used as the base research on the security in the rapidly-growing smart home service environment.
Keywords: Authentication, IoT Device, IoT Services, Internet of Things.
Scope of the Article: IoT