{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T23:26:12Z","timestamp":1772234772819,"version":"3.50.1"},"reference-count":36,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T00:00:00Z","timestamp":1582329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In recent years, the Internet of Things (IoT) has exploded in popularity. The smart home, as an important facet of IoT, has gained its focus for smart intelligent systems. As users communicate with smart devices over an insecure communication medium, the sensitive information exchanged among them becomes vulnerable to an adversary. Thus, there is a great thrust in developing an anonymous authentication scheme to provide secure communication for smart home environments. Most recently, an anonymous authentication scheme for smart home environments with provable security has been proposed in the literature. In this paper, we analyze the recent scheme to highlight its several vulnerabilities. We then address the security drawbacks and present a more secure and robust authentication scheme that overcomes the drawbacks found in the analyzed scheme, while incorporating its advantages too. Finally, through a detailed comparative study, we demonstrate that the proposed scheme provides significantly better security and more functionality features with comparable communication and computational overheads with similar schemes.<\/jats:p>","DOI":"10.3390\/s20041215","type":"journal-article","created":{"date-parts":[[2020,2,24]],"date-time":"2020-02-24T03:33:43Z","timestamp":1582515223000},"page":"1215","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":61,"title":["An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments"],"prefix":"10.3390","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6455-5134","authenticated-orcid":false,"given":"Soumya","family":"Banerjee","sequence":"first","affiliation":[{"name":"Department of Information Technology, Jadavpur University, Salt Lake City, Kolkata 700 098, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6903-0361","authenticated-orcid":false,"given":"Vanga","family":"Odelu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Systems, Birla Institute of Technology &amp; Science, Pilani Hyderabad Campus, Hyderabad 500 078, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5196-9589","authenticated-orcid":false,"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[{"name":"Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad 500 032, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8929-9605","authenticated-orcid":false,"given":"Samiran","family":"Chattopadhyay","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Jadavpur University, Salt Lake City, Kolkata 700 098, India"},{"name":"Northumbria University, Newcastle upon Tyne NE1 8ST, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0406-6547","authenticated-orcid":false,"given":"Youngho","family":"Park","sequence":"additional","affiliation":[{"name":"School of Electronics Engineering, Kyungpook National University, 80 Daehak-ro, Sangyeok-dong, Buk-gu, Daegu 41566, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2020,2,22]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The Internet of Things: A Survey","volume":"54","author":"Atzori","year":"2010","journal-title":"Comput. Netw."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/MCOM.2010.5473869","article-title":"Wireless home automation networks: A survey of architectures and technologies","volume":"48","author":"Gomez","year":"2010","journal-title":"IEEE Commun. Mag."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Kim, J.E., Boulos, G., Yackovich, J., Barth, T., Beckel, C., and Mosse, D. (2012, January 26\u201329). Seamless integration of heterogeneous devices and access control in smart homes. Proceedings of the Eighth International Conference on Intelligent Environments (IE\u201912), Guanajato, Mexico.","DOI":"10.1109\/IE.2012.57"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1109\/JSEN.2015.2475298","article-title":"Lightweight and secure session-key establishment scheme in smart home environments","volume":"16","author":"Kumar","year":"2015","journal-title":"IEEE Sen. J."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"2641","DOI":"10.1016\/j.engappai.2013.08.004","article-title":"Forecasting the behavior of an elderly using wireless sensors data in a smart home","volume":"26","author":"Suryadevara","year":"2013","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","article-title":"Internet of Things (IoT): A vision, architectural elements, and future directions","volume":"29","author":"Gubbi","year":"2013","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.cose.2019.06.002","article-title":"Anonymous authentication scheme for smart home environment with provable security","volume":"86","author":"Shuai","year":"2019","journal-title":"Comput. Secur."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","article-title":"On the security of public key protocols","volume":"29","author":"Dolev","year":"1983","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","article-title":"Examining smart-card security under the threat of power analysis attacks","volume":"51","author":"Messerges","year":"2002","journal-title":"IEEE Trans. Comput."},{"key":"ref_10","unstructured":"Canetti, R., and Krawczyk, H. (May, January 28). Universally Composable Notions of Key Exchange and Secure Channels. Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques\u2013Advances in Cryptology (EUROCRYPT\u201902), Amsterdam, The Netherlands."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"8739","DOI":"10.1109\/JIOT.2019.2923373","article-title":"A Provably-Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment","volume":"6","author":"Banerjee","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Jeong, J., Chung, M.Y., and Choo, H. (2008, January 7\u201310). Integrated OTP-based user authentication scheme using smart cards in home networks. Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS\u201908), Waikoloa, HI, USA.","DOI":"10.1109\/HICSS.2008.208"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1016\/j.comcom.2010.03.013","article-title":"Robust one-time password authentication scheme using smart card for home network environment","volume":"34","author":"Vaidya","year":"2011","journal-title":"Comput. Commun."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Kim, H.J., and Kim, H.S. (2011, January 20\u201323). AUTH HOTP-HOTP based authentication scheme over home network environment. Proceedings of the International Conference on Computational Science and Its Applications (ICCSA\u201911), Santander, Spain.","DOI":"10.1007\/978-3-642-21931-3_48"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Vaidya, B., Makrakis, D., and Mouftah, H.T. (2011, January 9\u201312). Device authentication mechanism for smart energy home area networks. Proceedings of the IEEE International Conference on Consumer Electronics (ICCE\u201911), Berlin, Germany.","DOI":"10.1109\/ICCE.2011.5722864"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Hanumanthappa, P., and Singh, S. (2012, January 18\u201320). Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication. Proceedings of the International Conference on Innovations in Information Technology (IIT\u201912), Abu Dhabi, UAE.","DOI":"10.1109\/INNOVATIONS.2012.6207712"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Li, Y. (2013, January 5\u20137). Design of a key establishment protocol for smart home energy management system. Proceedings of the Fifth International Conference on Computational Intelligence, Communication Systems and Networks (CICSYN\u201913), Madrid, Spain.","DOI":"10.1109\/CICSYN.2013.42"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"945","DOI":"10.1007\/s00779-012-0541-2","article-title":"A novel secure key paring protocol for RF4CE ubiquitous smart home systems","volume":"17","author":"Han","year":"2013","journal-title":"Pers. Ubiquitous Comput."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Santoso, F.K., and Vun, N.C. (2015, January 9\u201311). Securing IoT for smart home system. Proceedings of the International Symposium on Consumer Electronics (ISCE\u201915), Madrid, Spain.","DOI":"10.1109\/ISCE.2015.7177843"},{"key":"ref_20","unstructured":"Wazid, M., Das, A.K., Odelu, V., Kumar, N., and Susilo, W. (2017). Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans. Depend. Secur. Comput."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1177\/1550147719879379","article-title":"Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things","volume":"15","author":"Yu","year":"2019","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Naoui, S., Elhdhili, M.H., and Saidane, L.A. (2019, January 15\u201318). Novel Smart Home Authentication Protocol LRP-SHAP. Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC\u201919), Marrakech, Morocco.","DOI":"10.1109\/WCNC.2019.8885493"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.iot.2020.100158","article-title":"Secure remote anonymous user authentication scheme for smart home environment","volume":"9","author":"Fakroon","year":"2020","journal-title":"Internet Things"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/LSENS.2019.2905020","article-title":"Session-key establishment and authentication in a smart home network using public key cryptography","volume":"3","author":"Dey","year":"2019","journal-title":"IEEE Sen. Lett."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., and Jun, B. (1999, January 15\u201319). Differential power analysis. Proceedings of the Annual International Cryptology Conference (CRYPTO\u201999), Santa Barbara, CA, USA.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Reyzin, L., and Smith, A. (2004, January 2\u20136). Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques\u2013Advances in Cryptology (EUROCRYPT\u201904), Lecture Notes in Computer Science (LNCS), Interlaken, Switzerland.","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"ref_27","unstructured":"Abdalla, M., Fouque, P., and Pointcheval, D. (2005, January 23\u201326). Password-based authenticated key exchange in the three-party setting. Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography (PKC\u201905), Lecture Notes in Computer Science (LNCS), Les Diablerets, Switzerland."},{"key":"ref_28","unstructured":"AVISPA (2019, March 23). Automated Validation of Internet Security Protocols and Applications. Available online: http:\/\/www.avispa-project.org\/."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1109\/TWC.2015.2473165","article-title":"A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks","volume":"15","author":"Chang","year":"2016","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"2776","DOI":"10.1109\/TIFS.2017.2721359","article-title":"Zipf\u2019s Law in Passwords","volume":"12","author":"Wang","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"4957","DOI":"10.1109\/TII.2019.2895030","article-title":"Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks","volume":"15","author":"Gope","year":"2019","journal-title":"IEEE Trans. Ind. Inf."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"85627","DOI":"10.1109\/ACCESS.2019.2926578","article-title":"Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions","volume":"7","author":"Banerjee","year":"2019","journal-title":"IEEE Access"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1953","DOI":"10.1109\/TIFS.2015.2439964","article-title":"A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards","volume":"10","author":"Odelu","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_34","unstructured":"von Oheimb, D. (2005, January 12\u201315). The high-level protocol specification language hlpsl developed in the eu project avispa. Proceedings of the 3rd APPSEM II (Applied Semantics II) Workshop (APPSEM\u201905), Frauenchiemsee, Germany."},{"key":"ref_35","unstructured":"AVISPA (2019, March 23). SPAN, the Security Protocol ANimator for AVISPA. Available online: http:\/\/www.avispa-project.org\/."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1109\/TIFS.2018.2850299","article-title":"Secure Key Agreement and Key Protection for Mobile Device User Authentication","volume":"14","author":"Wu","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/4\/1215\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:00:08Z","timestamp":1760173208000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/4\/1215"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,22]]},"references-count":36,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2020,2]]}},"alternative-id":["s20041215"],"URL":"https:\/\/doi.org\/10.3390\/s20041215","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,22]]}}}