ORIGINAL RESEARCH article
Front. Comput. Sci.
Sec. Computer Security
This article is part of the Research TopicInnovative Solutions for Safeguarding Intelligent SystemsView all 4 articles
A Secure Authentication Scheme for Smart Home Environments: A Biometric-Driven Approach
Provisionally accepted- 1Sana'a University, Faculty of Computer & Information Technology, Sana'a, Yemen
- 2Ege Universitesi, Izmir, Türkiye
Select one of your emails
You have multiple emails registered with Frontiers:
Notify me on publication
Please enter your email address:
If you already have an account, please login
You don't have a Frontiers account ? You can register here
Abstractــــــ A smart home represents an emerging technological revolution. Devices such as smart TVs, smart refrigerators, and smart locks are connected to the Internet to enhance convenience in daily life. However, users contact these smart home devices via public channels, which makes the data being transferred vulnerable to attacks. Ensuring the privacy and data security of home users becomes a significant challenge. As smart home systems become increasingly integrated into our daily routines, securing them is crucial. This paper presents a lightweight authentication scheme for smart homes. It combines biometric data (OTIC) with cryptographic techniques. The goal is to achieve robust security while maintaining minimal computational overhead. The scheme allows mutual authentication among users, gateways, and devices. A formal security analysis is conducted using the Real-or-Random (RoR) model. The results demonstrate the scheme's resilience against polynomial-time adversaries. The scheme is efficient, robust, and resistant to common attacks, making it a practical solution for securing smart home networks. In the informal analysis, the proposed scheme was compared to other smart home authentication schemes. The comparison addressed various security features, including eavesdropping attacks, fault analysis attacks, and other security aspects. Finally, the performance analysis shows that the scheme performs well in terms of computation cost (memory = 332.2916 bits, CPU = 6.8299%, and Time = 1.5341 ms), as well as communication cost of 2400 bits. These results demonstrate that the scheme offers lightweight performance with enhanced security.
Keywords: Smart home environment, authentication, biometric, Iris, encoding
Received: 20 Jul 2025; Accepted: 12 Jan 2026.
Copyright: © 2026 Rajeh, Alhomdy, Thabit and Maodah. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
* Correspondence: Zahra M. Rajeh
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.
