Your new experience awaits. Try the new design now and help us make it even better

ORIGINAL RESEARCH article

Front. Comput. Sci.

Sec. Computer Security

This article is part of the Research TopicInnovative Solutions for Safeguarding Intelligent SystemsView all 4 articles

A Secure Authentication Scheme for Smart Home Environments: A Biometric-Driven Approach

Provisionally accepted
Zahra  M. RajehZahra M. Rajeh1*Sharaf  A AlhomdySharaf A Alhomdy1Fursan  ThabitFursan Thabit2Khawla  A. MaodahKhawla A. Maodah1
  • 1Sana'a University, Faculty of Computer & Information Technology, Sana'a, Yemen
  • 2Ege Universitesi, Izmir, Türkiye

The final, formatted version of the article will be published soon.

Abstractــــــ A smart home represents an emerging technological revolution. Devices such as smart TVs, smart refrigerators, and smart locks are connected to the Internet to enhance convenience in daily life. However, users contact these smart home devices via public channels, which makes the data being transferred vulnerable to attacks. Ensuring the privacy and data security of home users becomes a significant challenge. As smart home systems become increasingly integrated into our daily routines, securing them is crucial. This paper presents a lightweight authentication scheme for smart homes. It combines biometric data (OTIC) with cryptographic techniques. The goal is to achieve robust security while maintaining minimal computational overhead. The scheme allows mutual authentication among users, gateways, and devices. A formal security analysis is conducted using the Real-or-Random (RoR) model. The results demonstrate the scheme's resilience against polynomial-time adversaries. The scheme is efficient, robust, and resistant to common attacks, making it a practical solution for securing smart home networks. In the informal analysis, the proposed scheme was compared to other smart home authentication schemes. The comparison addressed various security features, including eavesdropping attacks, fault analysis attacks, and other security aspects. Finally, the performance analysis shows that the scheme performs well in terms of computation cost (memory = 332.2916 bits, CPU = 6.8299%, and Time = 1.5341 ms), as well as communication cost of 2400 bits. These results demonstrate that the scheme offers lightweight performance with enhanced security.

Keywords: Smart home environment, authentication, biometric, Iris, encoding

Received: 20 Jul 2025; Accepted: 12 Jan 2026.

Copyright: © 2026 Rajeh, Alhomdy, Thabit and Maodah. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

* Correspondence: Zahra M. Rajeh

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.