The Home IoT device market is expanding rapidly, which has led to the increasing adoption of these devices in the home. However, IoT devices have long been challenged by various vulnerabilities and pose unique security challenges compared to other devices. This paper aims to redefine the process of entering the Home IoT environment by leveraging Decentralized Identifier(DID) authentication, and proposes a comprehensive approach to using Verifiable Credential(VC) and Verifiable Presentation(VP) to control access from outsiders like visitors. Through security analysis, this paper also highlights how these authentication and permission controls address traditional vulnerabilities and provide improved security over traditional IoT authentication methods. The results of this study shed light on the significant impact this methodology can have on the security of the Home IoT environment.
This research was supported in part by the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2021-0-01835) supervised by the IITP(Institute for Information & Communications Technology Planning & Evaluation), MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2023-2018-0-01396) supervised by the IITP(Institute for Information & Communications Technology Planning & Evaluation),Korea Institute for Advancement of Technology (KIAT) grant funded by the Korea Government (MOTIE) (P00 08703, The Competency Development Program for Industry Specialist), National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT (2021R1F1A1045861) and Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government(MSIT)(2021-0-00590, Decentralized High Performance Consensus for Large-Scale Blockchains)