Next Article in Journal
Autonomous Navigation of Mobile Robots: A Hierarchical Planning–Control Framework with Integrated DWA and MPC
Previous Article in Journal
Wildfire Early Warning System Based on a Smart CO2 Sensors Network
Previous Article in Special Issue
FL-DSFA: Securing RPL-Based IoT Networks against Selective Forwarding Attacks Using Federated Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Efficient IoT User Authentication Protocol with Semi-Trusted Servers

College of Computer Science, Sichuan University, Chengdu 610065, China
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(7), 2013; https://doi.org/10.3390/s25072013
Submission received: 20 January 2025 / Revised: 17 March 2025 / Accepted: 20 March 2025 / Published: 23 March 2025

Abstract

:
Internet of Things (IoT) user authentication protocols enable secure authentication and session key negotiation between users and IoT devices via an intermediate server, allowing users to access sensor data or control devices remotely. However, the existing IoT user authentication schemes often assume that the servers (registration center and intermediate servers) are fully trusted, overlooking the potential risk of insider attackers. Moreover, most of the existing schemes lack critical security properties, such as resistance to ephemeral secret leakage attacks and offline password guessing attacks, and they are unable to provide perfect forward security. Furthermore, with the rapid growth regarding IoT devices, the servers must manage a large number of users and device connections, making the performance of the authentication scheme heavily reliant on the server’s computational capacity, thereby impacting the system’s scalability and efficiency. The design of security protocols is based on the underlying security model, and the current IoT user authentication models fail to cover crucial threats like insider attacks and ephemeral secret leakage. To overcome these limitations, we propose a new security model, IoT-3eCK, which assumes semi-trusted servers and strengthens the adversary model to better meet the IoT authentication requirements. Based on this model, we design an efficient protocol that ensures user passwords, biometric data, and long-term keys are protected from insider users during registration, mitigating insider attacks. The protocol also integrates dynamic pseudo-identity anonymous authentication and ECC key exchange to satisfy the security properties. The performance analysis shows that, compared to the existing schemes, the new protocol reduces the communication costs by over 23% and the computational overhead by more than 22%, with a particularly significant reduction of over 95% in the computational overhead at the intermediate server. Furthermore, the security of the protocol is rigorously demonstrated using the random oracle model and verified with automated tools, further confirming its security and reliability.

1. Introduction

The Internet of Things (IoT) is transforming the way we interact with the physical world by connecting everyday devices to the Internet, creating an intelligent and automated ecosystem [1]. The IoT is transforming multiple fields, including industry, agriculture, power grids, transportation, the environment, healthcare, smart homes, and security and surveillance. As illustrated in Figure 1, the IoT system is composed of IoT devices, gateways, servers, and remote users, which form the foundation to enable the acquisition, processing, and transmission of real-time data. In smart homes, smart healthcare, and industrial IoT application systems, users need to remotely access or control IoT devices and send them specific instructions [2]. Without effective user authentication, attackers can impersonate legitimate users and send fake malicious instructions to IoT devices, threatening the security of the entire system. IoT user authentication protocols enable secure authentication and session key negotiation between users and IoT devices through an intermediate server, allowing users to access or control IoT devices directly and securely. Therefore, establishing a robust IoT authentication mechanism is crucial to ensuring these systems’ security [3].
As illustrated in Figure 2, in the IoT user authentication protocols, after the devices and users register, each entity obtains its own long-term key. Subsequently, the user and the IoT device use these long-term keys, as well as the temporary keys generated during authentication, to generate authentication messages. These messages are then exchanged between the two entities for mutual authentication and negotiation of session keys. However, IoT devices are easily captured physically when they are usually deployed in unattended environments. Attackers may gain access to long-term secrets through side-channel attacks [4,5]. In addition, servers may suffer from data leakage and unauthorized access due to malware or misconfigurations [6,7]. Given that IoT systems often involve sensitive data, including user location information, network activities, and consumption habits, as well as potentially confidential corporate or national security information, authentication and authorized data access have become essential security requirements for IoT applications. In addition, the design of authentication protocols is particularly challenging as IoT devices are resource-limited, usually powered by batteries, and have limited computing, storage, and communication capabilities [8].
In recent years, numerous IoT user authentication protocols [9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26] have been proposed as shown in Table 1. However, the existing schemes generally assume that the servers (registration center (RC) and intermediate server) are fully trusted, overlooking the potential threat of insider attackers. In real applications, server data breaches and unauthorized port listening events are common due to issues such as misconfigurations, memory leaks, and malware. In addition, insider-infected actions (such as employees, contractors, or partners) pose significant security risks to IoT systems [6,7]. During registration, the RC generates long-term keys for the IoT devices and stores them on both the devices and the intermediate server. This setup allows insiders on the servers to access the keys, potentially enabling insider attacks. For example, insider users on the intermediate server can perform insider impersonation attacks [9,10,12,13,14,15,17,19,22,23,24,25,26] or derive session keys negotiated between users and IoT devices, resulting in protocols with no key privacy security [9,10,12,13,15,26]. Another critical issue is the handling of ephemeral secrets, which are often precalculated and stored in insecure memory [27]. Unfortunately, this risk is largely neglected in current IoT user authentication protocols [9,10,12,13,14,15,16,17,18,19,20,21,22,24,25,26], leaving these schemes vulnerable to ephemeral secret leakage (ESL) attacks. Furthermore, many protocols lack essential features, such as perfect forward security (PFS) and anonymity. They are also prone to offline password guessing attacks and are inefficient for resource-constrained IoT devices. More importantly, with the rapid growth regarding IoT devices, intermediate servers must manage a large number of users and device connections, which makes the performance of authentication schemes highly dependent on the server’s computational and processing capabilities [25]. However, there is still a lack of substantial research focused on optimizing server overhead in the current studies.
The design of security protocols is based on the underlying security model, where the attacker model defines the potential capabilities and goals of the attackers. This model not only determines the security assumptions of the protocol but also directly shapes the evaluation framework for security analysis. In the existing research, the Dolev–Yao security model [29] and the eCK security model [30] are the most widely accepted. The Dolev–Yao model assumes that the attacker has full control over the communication channel, allowing him to intercept, modify, forge, and replay messages. The eCK model extends this by allowing the attacker to access sensitive information, such as long-term keys, session keys, and ephemeral secrets. However, the eCK model focuses mainly on two-party single-factor authentication protocols and does not fully address multifactor or three-party authentication scenarios. In recent years, there has been growing attention regarding attacker models for multifactor user authentication protocols. Yoneyama [31] extended the eCK model to password-based three-party authentication key-exchange protocols but did not account for threats related to smart card loss and offline password guessing attacks. Wang et al. [32] studied the impact of the loss of smart cards and offline password guessing attacks on the security of two-factor authentication protocols, and their results have been adopted as a standard in many subsequent schemes. However, their work did not address the leakage of ephemeral secrets. In conclusion, the existing security models for IoT user authentication fail to fully cover key security threats, such as insider attacks and ephemeral secrets.
To address the issues in the existing IoT user authentication protocols, we introduce a new security model, IoT-3eCK. This model is based on real-world network threats, enhances the attacker’s capabilities, and refines the evaluation criteria for IoT user authentication protocols. In the IoT-3eCK model, the servers are assumed to be semi-trusted entities, and the attackers may be insiders from either the RC or the intermediate server. The attacker has access to the registration information of users, servers, and IoT devices and can acquire the ephemeral secrets of all the protocol participants, including users, servers, and IoT devices. Based on this new security model, we analyze the Wang et al. scheme [25], identifying the challenges posed by insider and ESL attacks and uncovering the causes of their vulnerabilities. Then, we propose a new IoT user authentication protocol that effectively defends against insider attacks while meeting various security requirements. The protocol integrates a dynamic pseudonym-based anonymous authentication mechanism with an ECC key-exchange mechanism, ensuring anonymity and other critical security properties while significantly reducing the computational overhead on the intermediate server. The performance analysis shows that, compared to the existing solutions, the proposed protocol reduces communication overhead by more than 23%, computational overhead by over 22%, and, most notably, computational overhead on the intermediate server by over 95%, greatly improving the system efficiency.
The main contributions of this paper are as follows.
(1)
A new security model, IoT-3eCK, is proposed, which enhances the attacker’s capabilities regarding IoT user authentication protocols and refines the evaluation criteria for these protocols.
(2)
Based on the new security model, analysis of the Wang et al. scheme [25] is provided, identifying the challenges of insider and ESL attacks and uncovering the causes of their vulnerabilities.
(3)
A secure and efficient IoT user authentication protocol is introduced. The proposed scheme offers security properties such as key privacy and perfect forward security and is resilient to insider attacks, ESL attacks, and other common threats.
(4)
The security of the protocol is formally proven using the random oracle model, and its correctness is verified with the ProVerif 2.0 automated verification tool. In addition, performance comparisons demonstrate significant reductions in communication and computation costs.
The paper is structured as follows. Section 2 reviews the related work. Section 3 presents the proposed new security model. Section 4 provides a cryptanalysis of the scheme by Wang et al. [25]. Section 5 outlines the proposed IoT user authentication protocol. Section 6, Section 7, Section 8 and Section 9 present the security analysis and performance comparison, respectively. Finally, Section 10 concludes the paper.

2. Related Work

With low computational complexity and high efficiency, many user authentication protocols based on symmetric cryptography [33,34,35] have been proposed. However, these proposals require users and designated IoT devices to share symmetric keys beforehand, which is impractical due to the large number of IoT devices. Physically Unclonable Functions (PUFs), a promising lightweight hardware security primitive, have been used in numerous user authentication protocols for the IoT [3,36,37]. In these schemes, each entity needs to register one or more challenge–response pairs of its individual PUF with the server beforehand to enable authentication between the registered entity and the server, which leads to inflexibility and inefficiency. Halevi et al. [38] and Wang et al. [39] also indicated that most symmetric cryptography and hash-based user authentication proposals are insecure when dealing with user anonymity, PFS, and smart card security breach attacks. Public-key technology is vital for improving security, but it has high computational and communication overhead. Elliptic curve cryptography (ECC) has been adopted in IoT user authentication to balance security and efficiency because it provides a smaller key size compared to other methods with the same level of security [40,41].
In recent years, many ECC-based IoT user authentication protocols have been introduced. In 2016, Jiang et al. [9] introduced a user authentication protocol for wireless sensor networks (WSNs), a critical component of the IoT. This protocol employs two-factor authentication through temporary credentials and claims to resist various attacks, ensuring both the anonymity and untraceability of communications. However, the protocol assumes that the servers are fully trusted, neglecting the security threat posed by insider attackers within the servers. During registration, the RC generates and preloads long-term secrets for the sensors, storing these credentials on the intermediate server. This design exposes the protocol to insider impersonation attacks and key privacy issues, where insider users of the servers can impersonate sensors to complete authentication and key agreement with users, as well as obtain the session key negotiated between the user and the sensor during the authentication process. In addition, the scheme does not account for the possibility that an attacker may gain access to the ephemeral secret, making it vulnerable to ESL attacks. Furthermore, the scheme is also susceptible to offline password guessing attacks and does not provide PFS and timely typo detection. In 2017, Wu et al. [10] indicated that Chang et al. [11] were unable to resist offline password guessing attacks and could not maintain PFS. Then, they presented an improved one for WSNs, but it lacks user untraceability, key privacy, and PFS and suffers from offline password guessing, ESL, and insider sensor impersonation attacks. Challa et al. [12] introduced signature-based user authentication for the IoT. However, it is incapable of withstanding attacks of offline password guessing, impersonation, and insider IoT device impersonation, as well as failing to provide key privacy, user anonymity, and untraceability. In 2018, Li et al. [13] presented an IoT user authentication protocol for industrial IoT to ensure legitimate access to sensitive sensor data. But, this proposal [13] suffers from offline password guessing, replay, insider sensor impersonation, and impersonation attacks and lacks key privacy. Li et al. [14] identified the deficiencies of the scheme [9] and then presented an enhanced scheme for WSNs. However, the enhanced scheme [14] is prone to offline password guessing, insider sensor impersonation, and ESL attacks and cannot offer user untraceability, key privacy, and PFS. In 2019, Shuai et al. [15] presented an IoT user authentication scheme for smart homes. However, this scheme is subject to offline password guessing, insider IoT device impersonation, and ESL attacks and is unable to offer user untraceability, key privacy, and PFS. Lu et al. [28] introduced an IoT user authentication scheme for WSNs. Moreover, this scheme had a design flaw: i.e., an attacker could quickly determine the session key based on the sensor ID and the information detected throughout the open channels. In 2020, Li et al. [17] stated that most of the existing AKA proposals could not fulfill local password change and PFS while being vulnerable to stolen smart card attacks, and then introduced an improved version. Unfortunately, the scheme [17] is prone to sensor impersonation and offline password guessing attacks with poor usability. The server must enumerate the stored information and then calculate the relevant values to determine the sender’s ID when a reply message is received during authentication.
In 2021, Sadhukhan et al. [18] presented an authentication scheme for remote IoT users, but it suffers from replay, ESL, man-in-the-middle, and DoS attacks and cannot offer user anonymity and timely typo detection. Wazid et al. [19] introduced an IoT user authentication protocol to secure 6G-enabled networks in a box deployed in industrial applications. Wang et al. [25] revealed that the scheme [19] fails to provide user untraceability and PFS; it is also vulnerable to offline password guessing, desynchronization, and man-in-the-middle attacks. Additionally, the scheme lacks key privacy and cannot withstand insider IoT device impersonation attacks. Srinivas et al. [20] proposed an IoT user authentication scheme for IoT big data collection. However, this scheme [20] is fragile to device impersonation attacks and device session key compromise attacks and cannot afford user anonymity and PFS [22]. In 2022, Sutrala et al. [21] introduced an IoT user authentication scheme for software-defined network-based industrial cyberphysical systems [21]. Later, Wang et al. [23] stated that the scheme [21] is not able to resist smart card/device loss attacks and offline password guessing attacks and cannot offer user untraceability. Tanveer et al. [22] analyzed previous related IoT user authentication protocols and then proposed an improved version for the Internet of Drones. However, the scheme [22] cannot maintain user untraceability, PFS, or resistance to man-in-the-middle attacks and offline password guessing attacks. In 2023, Chen et al. [24] introduced a two-factor user authentication protocol for multi-gateway WSNs. Unfortunately, this scheme suffers from insider sensor impersonation and ESL attacks. Wang et al. [25] analyzed Wazid et al. [19] and then proposed an IoT user authentication scheme for cloud-assisted IoT with four parties prone to insider IoT device impersonation and ESL attacks. In 2024, Kumar et al. [26] proposed an IoT user authentication scheme to access sensitive data from sensor nodes by executives in coal mining scenarios. But, this scheme is not resistant to insider sensor impersonation attacks and ESL attacks, lacking PFS and key privacy.
In summary, the previous IoT user authentication schemes suffered from insider sensor impersonation attacks. Furthermore, most of the schemes are vulnerable to ESL and offline password guessing attacks, lack essential security features such as PFS, key privacy, and anonymity, or are unsuitable for resource-constrained IoT due to inefficiencies.

3. Security Model Based on Semi-Trusted Servers

This section defines a practical security model, IoT-3eCK, based on the network model. The model enhances the attacker’s capabilities and introduces an evaluation framework consisting of 10 attributes and 12 security goals, which supports a comprehensive analysis of IoT user authentication schemes.

3.1. IoT User Authentication Network Model

As illustrated in Figure 1, the network model consists of remote users, intermediate servers, IoT devices, and adversaries. RCs are specialized servers that are responsible for overseeing key generation, distribution, management, and communication activities within an application system or group. We assume that an IoT user authentication protocol, P , involves U i ( 1 i r ) , S j ( 1 j s ) and S k ( 1 k t ) , where r s , t s , r, s, and t denote the number of users, servers, and IoT devices, respectively. The servers are considered semi-trusted, meaning they will reliably execute the protocol but may also collaborate with other participants to potentially gain private information. Each remote user can dynamically join different systems or groups by registering with a different RC. However, a sensor can belong to a single system or group.

3.2. Adversary Model

To characterize the insider threat, we introduce the attacker capability A7: assume that A is an insider user of RC, capable of corrupting servers, learning the long-term private key of the servers, and eavesdropping on and stealing messages during the registration, login, and authentication phases. To address the threat of ephemeral key disclosure, we introduce the attacker capability A8: assume that A can obtain ephemeral secrets of the user, sensor, and RC. The primary capabilities of A in the new adversary model, IoT-3eCK, for the IoT user authentication protocol are as follows:
A1.
A takes full control over communication channels, intercepting, modifying, blocking, and deleting messages exchanged between the user, the RC, and the IoT devices at will.
A2.
A can offline all items in the set D i d × D p w of the space D i d and password space D p w within polynomial time.
A3.
A is able to capture the previous session keys between the user and the sensor.
A4.
A can learn the user’s passwords, extract long-term secrets from the smart card, and obtain the user’s biometrics, but not all three at the same time.
A5.
A is able to compromise the sensor and extract its long-term secrets.
A6.
A can obtain the secret key of RC when evaluating forward secrecy.
A7.
The adversary A could be an insider user of the RC or compromise the server S, gaining access to its long-term private key and intercepting/stalling messages during any phase (registration, log-in, authentication).
A8.
A can obtain ephemeral secrets of the user, sensor, and RC.

3.3. Evaluation Criteria

Our evaluation criteria are modified from widely accepted frameworks [2,8,25,42,43]. To mitigate insider attacks, C1 and C2 are introduced. First, during the registration phase, the authentication secrets must be protected, ensuring that the long-term secrets of the user and sensor, as well as the user’s password and biometric data, are not accessible to insider users of the RC. Second, insider users of intermediate servers, including those in the RC, should not have access to the session keys established between the user and the sensor. Furthermore, C10 has been improved to include resistance to ESL attacks and insider impersonation attacks, further strengthening its defenses against known threats.
C1.
No registering confidential exposure: When registering the long-term secrets of the user and sensor, the user’s password and biometrics cannot be derived by the insider user of RC.
C2.
Key privacy: The insider user of RC or the intermediate server cannot access the session keys between the user and the sensor.
C3.
No password verifier-table: RC does not store user passwords or any derived password values in a database.
C4.
Password-friendly: The user should freely choose and change an easy-to-remember password locally.
C5.
Sound repairability: The scheme enables the easy revocation of smart cards, that is, the users are able to revoke their cards with unchanging identity.
C6.
Mutual authentication and key agreement: The user and the sensor can verify each other and agree on a shared session key.
C7.
Forward secrecy: The shared session key could not be captured even if the adversary obtained the long-term secrets of the user, the RC, and the sensor.
C8.
Timely typo detection: If a user enters an incorrect password or biometrics when logging in, he or she will be informed in time.
C9.
User anonymity: The scheme is designed to protect user identity and prevent user activities from being traced.
C10.
Resistance to known attacks: The scheme resists known attacks, including ESL attacks, insider impersonation attacks, unknown key share attacks, known key attacks, smart card loss attacks, stolen verifier attacks, impersonation attacks, desynchronization attacks, parallel session attacks, replay attacks, offline password guessing attacks, key control, and node capture attack.

4. Analysis of Wang et al.’s Protocol

Wang et al. [25] proposed a secure and efficient IoT user authentication protocol for cloud-assisted IoT systems. Participants include IoT devices, gateways, cloud servers, and external users. Security analysis concluded that this scheme is vulnerable to insider impersonation attacks and ESL attacks.

4.1. Review of Wang et al.’s Protocol

The notations used are listed in Table 2.

4.1.1. Registration Phase

In the registration phase, the IoT device is registered with the gateway, and both the gateway and the user are registered with the cloud server. The cloud server first selects an elliptical curve E, with a base point P. After initialization, the cloud server possesses long-term secret keys x and y( Y = y · P ), shared with the user and the gateway, respectively. The cloud server distributes the gateway secret key X G k = h ( x G I D G k ) to the gateway as an authentication credential. The gateway and the IoT devices S k share a secret key X s k = h ( I D s k x G k ) , where x G k is the long-term secret key of the gateway.
The user U i registration process is as follows:
R1.
U i first selects the identity I D u i and password P W u i , and inputs the biometric factor B i o u i . Then, U i selects a random number a and calculates G e n ( B i o u i ) = ( δ u i , τ u i ) and R P W u i = h ( P W u i δ u i a ) . Next, U i sends the registration request { I D u i , R P W u i } to the cloud server.
R2.
The cloud server selects a timestamp T r g u i and a random number a u i and then calculates k u i = h ( I D u i y T r g u i ) and B u i = h ( R P W u i I D u i ) k u i . The cloud server stores { I D u i , T r g u i , a u i , H o n e y l i s t = N U L L } in the database and sends { B u i , B u i a u i , Y , P } to U i .
R3.
Upon receiving { B u i , B u i a u i , Y , P } , U i selects a random number a and then calculates k u i = B u i h ( R P W u i I D u i ) , R P W u i n e w = h ( P W u i δ u i a ) , A i = h ( I D u i R P W u i n e w k u i ) mod n 0 , B u i = h ( R P W u i n e w I D u i ) k u i , a u i = B u i ( B u i a u i ) . Finally, U i stores { A u i , B u i , a , A u i a u i , τ u i , Y , P , n 0 } .

4.1.2. Login and Authentication

If U i wants to access the IoT device S k , U i can initiate the following login and authentication request to the gateway as follows:
A1.
U i inputs { I D u i * , P W u i * , B i o u i * } and calculates δ u i * = R e p ( B i o u i * , τ u i ) , R P W u i * = h ( P W u i * δ u i * a ) , k u i * = B u i h ( R P W u i * I D u i ) , and A u i * = h ( I D u i * R P W u i * k u i * ) mod n 0 . Then, U i verifies whether A i * A i is valid. If it is true, U i selects r u i and computes a u i * = ( A u i a u i ) A u i , M 1 = r u i · Y , M 2 = r u i · P , M 3 = h ( M 2 M 1 ) ( I D u i * a u i * ) , M 4 = h ( M 1 M 2 M 3 ) I D s k , and M 5 = h ( k u i * I D i * M 1 M 2 I D s k ) . Finally, U i sends { M 2 , M 3 , M 4 , M 5 } to the cloud server.
A2.
After receiving { M 2 , M 3 , M 4 , M 5 } , the cloud server first calculates M 1 = y · M 2 and I D u i a u i = M 3 h ( M 2 M 1 ) . Then, it retrieves { T r g u i , a u i } using I D u i . If a u i a u i , the cloud server terminates the session; otherwise, the cloud server calculates k u i = h ( I D u i y T r g u i ) , I D s k = M 4 h ( M 1 M 2 M 3 ) , and M 5 = h ( k u i I D u i M 1 M 2 I D s k ) . If M 5 M 5 , the cloud server terminates the session; otherwise, it determines the gateway to which S k belongs, selects a random number r, and calculates X G k = h ( x G I D k ) , M 6 = h ( X G k M 2 ) r , M 7 = h ( M 6 r X G k ) I D s k , and M 8 = h ( M 2 M 6 M 7 r I D s k X G k ) . The cloud server then sends { M 2 , M 6 , M 7 , M 8 } to the gateway.
A3.
Upon receiving { M 2 , M 6 , M 7 , M 8 } , the gateway first calculates r = M 6 h ( X G k M 2 ) , I D s k = M 7 h ( M 6 r X G k ) , and M 8 = h ( M 2 M 6 M 7 r I D s k X G k ) . Then, it verifies whether M 8 = M 8 . If it is true, the gateway selects a random number r g and computes X s k = h ( x G k I D s k ) , M 9 = h ( X s k M 2 ) r g , and M 10 = h ( M 2 M 9 r g t I D s k X s k ) . The gateway then sends { M 2 , M 9 , M 10 } to S k .
A4.
Upon receiving { M 2 , M 9 , M 10 } , S k calculates r g = M 9 h ( X s k M 2 ) and M 10 = h ( M 2 M 9 r g I D s k X s k ) . If M 10 M 10 , S k terminates the session; otherwise, S k selects a random number r s k and then calculates M = r s k · M 2 and M 11 = r s k · P . Then, S k calculates the session key S K k i = h ( M 2 M 11 M ) and M 12 = h ( M 2 M 11 r g X s k I D s k ) . Finally, S k sends { M 11 , M 12 } to the gateway.
A5.
After receiving the response from S k , the gateway calculates M 12 = h ( M 2 M 11 I D s k r X G k ) . If M 12 M 12 , the gateway terminates the session; otherwise, the gateway calculates M 13 = h ( M 11 M 2 I D s k r X G k ) and sends { M 11 , M 13 } to the cloud server.
A6.
After receiving the response from the gateway, the cloud server calculates M 13 = h ( M 11 M 2 I D s k r X G k ) . If M 13 M 13 , the cloud server terminates the session; otherwise, it calculates M 14 = h ( M 1 M 2 I D u i I D s k k u i M 11 ) and sends { M 11 , M 14 } to U i .
A7.
Once U i receives the response from the cloud server, it calculates M 14 * = h ( M 1 M 2 I D i I D s k k M 11 ) . If M 14 * = M 14 , U i calculates S K i k = h ( M 2 M 11 r i · M 11 ) as the session key.

4.2. Flaws of Wang et al.’s Protocol

4.2.1. Vulnerability to Insider IoT Device Impersonation Attacks

Consider an attacker as an insider user of the gateway. The attacker first selects a random number r s k * and computes M * = r s k * · M 2 , M 11 * = r s k * · P , and S K k i * = h M 2 M 11 * M * ) . The attacker then calculates M 13 * = h ( M 11 * M 2 I D s k r X G k ) and sends { M 11 * , M 13 * } to the cloud server. Upon receiving { M 11 * , M 13 * } , the cloud server computes M 13 * = h ( M 11 * M 2 I D s k r X G k ) . Since M 13 * = M 13 * , the cloud server computes M 14 * = h ( M 1 M 2 I D u i I D s k k i M 11 * ) and sends { M 11 * , M 14 * } to U i . Upon receiving the response from the cloud server, U i calculates M 14 * = h ( M 1 M 2 I D u i I D s k k M 11 * ) . Clearly, M 14 * = M 14 * , and U i computes S K i k * = h ( M 2 M 11 * r u i · M 11 * ) as the session key. Similarly, insider users of the cloud server can also initiate impersonation attacks.

4.2.2. Vulnerability to ESL Attacks

If r u i is compromised, the attacker can combine the channel messages { M 2 , M 6 , M 7 , M 8 } and { M 11 , M 14 } to calculate S K i k = h ( M 2 M 11 r i · M 11 ) . Similarly, if r s k is leaked, the attacker can combine channel messages { M 2 , M 6 , M 7 , M 8 } and { M 11 , M 14 } to compute M = r s k · M 2 , M 11 = r s k · P , and S K k i = h ( M 2 M 11 M ) . Thus, the scheme is vulnerable to ESL attacks.

5. Proposed Protocol

The proposed protocol has four phases: system initialization, registration, login and authentication, and user password and biometric update.

5.1. System Initialization

The implementation of the system is carried out by RC S j online. Firstly, S j chooses an elliptic curve E ( a , b ) over Z q * = { 0 , 1 , , q 1 } with a base point P. In addition, a medium number d = 10 8 is chosen. Second, RC opts for its identifier I D s j Z q * and its long-term private key s s j Z q * and computes P K s j = s s j · P as its public key. Then, RC chooses two one-way hash functions, h ( · ) : { 0 , 1 } * { 0 , 1 } 256 and h 1 ( · ) : { 0 , 1 } * { 0 , 1 } 64 , for generating hashes and one-time credential identifiers, respectively. Finally, RC keeps s s j secure and issues the public parameters of the system { E ( a , b ) , q , P , I D s j , d , h ( · ) , h 1 ( · ) } .

5.2. Registration

5.2.1. IoT Device Registration

IoT device S k selects an RC S j to complete registration and obtain authentication credentials before the entry of the system. The registration process is as follows:
R1: 
S k selects its identifier I D s k Z q * and a random number d s k Z q * and then computes D s k = H ( I D s k d s k ) · P . Third, S k sends the registration requisition request message, { I D s k , D s k }, to S j through secure channels.
R2: 
In response, S j checks if I D s k has been registered. If so, S k is required for a new request. Otherwise, RC opts for a random number x s k Z q * as the partial private key of S k and computes P K s k = D s k + x s k · P as the public key of S k . After that, RC publishes { I D s k , P K s k } and replies { x s k , P K s k } to S k through secure channels. Lastly, RC computes w s k = h ( s s j · P K s k I D s k ) and stores { w s k } secretly.
R3: 
After receiving { x s k , P K s k } , S k computes s s k = ( h ( I D s k d s k ) + x s k ) mod q as its private key. Then, S k checks whether s s k · P ? = P K s k . If it holds, S k computes w s j = h ( s s k · P K s j I D s k ) and stores { I D s k , s s k , P K s k , w s j } .
Remark 1.
w s j = h ( s s k · P K s j I D s k ) = h ( s s k s s j · P I D s k ) = h ( s s j · P K s k I D s k ) = w s k

5.2.2. User Registration and Revocation

Users can dynamically join different systems through the registration processes shown in Figure 3. The fuzzy verifier  L V = h ( I D u i P W I D u i σ I D u i s I D u i ) mod d [2,44] is used to eliminate offline password guessing attacks. T u i is a temporary one-time credential assigned to the user U i and is marked with f l a g = 0 to indicate that T u i has not been used. A corresponding untraceable list L u i = { T u i , h 1 ( L u i [ 0 ] w t u i ) , , h 1 ( L u i [ n 2 ] w t u i ) } is generated and stored in RC, where n represents the number of times a user is permitted to re-initiate the authentication. After registration, U i stores { e s u i , L V , τ u i , P K u i , T u i , w t s j } . S j publishes { I D u i , P K u i } and stores { w t u i , L u i } secretly. A user account can be updated with the same process if it is frozen.

5.3. Login and Authentication

This phase between the user U i , the RC S j , and the sensor S k is shown in Figure 4.
A1: 
To begin, U i inputs I D u i , P W u i , and B I O u i . Then, U i calculates σ u i = Rep ( B I O u i , τ u i ) and s u i = e s u i h ( σ u i P W u i ) and obtains a verifier L V = h ( I D u i P W u i σ u i s u i ) mod n . Finally, U i verifies if L V ? = L V . If this condition is not met, the log-in process will end.
A2: 
U i chooses a random r u i Z q * and generates the current timestamp T 1 . Afterwards, U i calculates A u i = r u i · P K u i . If f l a g = 1 , it indicates that T u i has been used. In this case, U i updates T u i to T u i = h 1 ( T u i w t s j ) . Third, U i encodes the identity of the desired sensor S k into dynamic identity as C I D s k = I D s k h ( A u i w t s j T 1 ) . Finally, U i generates a verifier V u i = h ( C I D s k I D u i A u i T 1 w t s j ) and sends the request message M 1 = { A u i , T u i , C I D s k , T 1 , V u i } to S j .
A3: 
Upon receiving M 1 , S j verifies its freshness with the timestamp T 1 . Next, S j verifies U i using temporary credentials T u i . If T u i = L u i [ m ] ( m n ) and V u i = h ( C I D s k I D u i A u i T 1 w t u i ) , then S j confirms that the sender is U i and updates the untraceable list for T u i as follows: L u i = { L u i [ m + 1 ] , , L u i [ n ] , h 1 ( L u i [ n ] w t u i ) , } . Otherwise, S j will reject the session.
A4: 
S j generates the time stamp T 2 and encodes the identity of U i as E I D u i = I D u i h ( w s k T 2 ) . Finally, S j generates a verifier V s j = h ( I D u i I D s j w s k T 2 ) and sends the message M 2 = { A u i , T 2 , E I D u i , V s j } to the IoT device S k .
A5: 
Upon receiving M2, S k checks its freshness with the timestamp T 2 . Following that, S k decodes I D u i = E I D u i h ( w s j T 2 ) . Finally, S k verifies the authenticity of S j by checking whether V s j ? = h ( I D u i I D s j w s j T 2 ) and ensures the integrity of the message received. If not, S j will terminate the verification immediately.
A6: 
Firstly, S k selects a random r s k Z q * and generates the current timestamp T 3 . After that, S k calculates A s k = r s k · P K s k , S k i = ( r s k s s k mod q ) · A u i , and obtains the session key shared with U i as S K k i = h ( S k i I D u i I D s k ) . Then, S k encodes E I D s k = I D s k h ( A s k S k i ) . Third, S j generates its verifier as V s k = h ( I D s k A s k S k i T 3 ) . Finally, S j transmits the response message M 3 = { A s k , T 3 , E I D s k , V s k } to U i .
A7: 
Upon receiving M3, U i first checks its freshness with the timestamp T 3 . After that, U i calculates S i k = ( r u i s u i mod q ) · A s k . Third, U i verifies whether I D s k ? = E I D s k h ( A s k S i k ) and V s k ? = h ( I D s k T u i A s k S i k T 3 ) . If not, U i will terminate the session. Finally, U i obtains the session key shared with S k as S K i k = h ( S i k I D u i I D s k ) and updates T u i as T u i = h 1 ( T u i w t s j ) with f l a g = 0 .

5.4. User Password and Biometric Update

A registered user U i can renew her password and biometric information following the steps outlined below.
U i first inputs I D u i , P W u i , and B I O u i and then computes σ u i = Rep ( B I O u i , τ u i ) , s u i = e s u i h ( σ u i P W I D u i ) , and L V = h ( h ( I D u i P W I D u i σ u i s u i ) mod n ) . Third, U i checks if L V ? = L V . If so, U i inputs P W u i n e w and B I O u i n e w and computes ( σ u i n e w , τ u i ) = Gen t ( B I O u i n e w ) , e s u i n e w = s u i h ( σ u i n e w P W u i n e w ) , and L V n e w = h ( I D u i R P W u i n e w σ u i n e w s I D u i ) mod n . Finally, U i replaces { e s u i , L V } with { e s u i n e w , L V n e w } .

6. Formal Security Analysis

This section provides the formal proof of the proposed protocol in the IoT-3eCK security model.

6.1. Relevant Definitions

Participants: The proposed protocol involves three participants: U i , S j , and S k . Each participant has several instances denoted by I U i , I S j , and I S k ( i , j , k Z ), respectively. Any instance can be referred to as I I U i I S j I S k . A session identifier, S i d , is created by concatenating all messages sent and received for the current session. An instance can exist in three states. If the most recent expected protocol message is received, the instance enters the state a c c e p t . If an incorrect message is received, the instance transitions to the r e j e c t state. An instance will become ⊥ if the input is not responded to.
Partners: Instances I and I are considered p a r t n e r s only if all three conditions are met: (i) Both instances are currently in the a c c e p t state. (ii) They have mutually authenticated and shared the same S i d . (iii) They are partners with each other.
Freshness: An instance is considered fresh if A fails to obtain the session key S K k i (or S K i k ) between U i and S k by making S K R e v e a l ( I ) , E S R e v e a l ( I ) , or C o r r u p t ( I ) queries before performing a E x p i r e ( I ) query.
Adversary: Under the IoT-3eCK adversary model, A can interact with U i , S j , and S k through the following queries:
(1)
E x e c u t e ( ) : A can observe all messages transmitted between U i , S j , and S k .
(2)
S e n d ( I , m ) : A can send a message m to I and receive a response.
(3)
E S R e v e a l ( I ) : This query reveals the ephemeral secret key of I to A .
(4)
S K R e v e a l ( I ) : A can obtain the session key between I and its partner.
(5)
U C o r r u p t ( w ) : A can obtain the security credentials held by U i .
  • w = 0 : A acquires P W u i and B I O u i .
  • w = 1 : A acquires P W u i and { e s u i , L V , τ u i , T u i , w t s j } .
  • w = 2 : A acquires B I O u i and { e s u i , L V , τ u i , T u i , w t s j } .
(6)
R C C o r r u p t ( ) : A can retrieve all the security credentials held by S j .
(7)
S C o r r u p t ( ) : A can retrieve all the security credentials held by S k .
(8)
T e s t ( I ) : This query is used to simulate the semantic security of the session key.
  • If the session key is not established or I is not fresh, ⊥ will be returned.
  • Otherwise, a coin b { 0 , 1 } is flipped.
    If b = 1 , I returns the session key to A .
    If b = 0 , I returns a random string of the same length as the session key.
(9)
h ( M ) : The query provides A with a randomly generated number that serves as the hash output of M.
(10)
E x p i r e ( I ) : Once this query is executed, the session key held by I is deleted.

6.2. Provable Security Analysis

Before the security analysis, we first define the complexity assumptions. We then provide a formal proof to evaluate the security of the session key S K i k (or S K k i ) under the ROM model.
Let E ( a , b ) denote a non-singular elliptic curve over a finite field F q , G be an additive group of order q of E ( a , b ) , and P be the base point of the group.
Definition 1.
Elliptic Curve Discrete Logarithm (ECDL) Hardness Assumption: Given < P , x P G > , finding x Z q * is computationally hard, and the probability that A is able to resolve the problem, Adv ECDL ( A ) , is negligible for sufficiently small ϵ,
A d v ECDL ( A ) = P r [ A ( P , x P ) = x : x Z q * ] < ϵ
Definition 2.
Computational Diffie–Hellman (CDH) Hardness Assumption: Given < x P , y P G > , figuring out x y P G is computationally hard, and the probability of A resolving the problem is negligible for sufficiently small ϵ,
A d v CDH ( A ) = P r [ A ( x P , y P ) = x y P : x , y Z q * ] < ϵ
Definition 3.
The security of S K i k (or S K k i ) is modeled by the game G a m e UA ( I , A ) . In this game, A is allowed to perform one T e s t ( I ) query, where I is both accept and fresh , and I returns a single bit b . A can issue many other queries to I.
Let P r [ S u c c ( A ) ] denote the probability that A successfully wins the game G a m e UA ( I , A ) . The advantage of A in breaking the semantic security of S K i k (or S S K k i ) is defined as
A d v UA ( A ) = | 2 P r [ b = b ] 1 | = | 2 P r S u c c ( A ) 1
Definition 4.
In the context of the adversarial model eCK, a user authentication scheme is semantically secure if A d v UA ( A ) is negligible for any adversary.
Theorem 1.
Let A be an adversary that can break the semantic security of S K i k (or S S K k i ) by creating up to q e E x e c u t e ( ) queries and q h h ( ) and q s S e n d ( ) queries, all within polynomial time t. Let the random numbers and hash outputs be l-bit values, the password dictionary space be N, following Zipf’s law as in [17], and the biometric secret key have a length of l b bits with a false-positive probability of ε f p . Then, the advantage of A is that
A d v UA ( A ) ( q h 2 + 3 q h + 3 q s ) 2 l + ( q s + q e ) 2 2 ( q 1 ) + ( 2 max { q s 2 l b , q s 2 l b + q s ε b , C q s s } + 3 q s 2 l + 3 q s q 1 ) max { A d v ECDL ( A ) , Ad v CDH ( A ) }
where C and s are Zipf’s parameters.
Proof. 
The semantic security of S S K i k (or S S K k i ) is defined by a series of games Game I ( i = 0 , 1 , , 5 ) . In these games, S i represents the value of b in the T e s t ( I ) query correctly predicted by A , and P r [ S i ] denotes the probability that the event S i will occur.
G a m e 0 : The game begins by simulating a real attack in ROM mode. Thus, we have the following:
A d v U A ( A ) = 2 P r [ S 0 ] 1
G a m e 1 : In this game, A can be the E x e c u t e ( ) query to obtain M 1 , M 2 , and M 3 exchanged between ( U i , S j , and S k . Then, A can use S K R e v e a l ( I ) and T e s t ( I ) to verify whether the calculated key S S K k i (or S K i k ) is genuine or not. Since S K k i (or S K i k ) cannot be determined directly from these messages, there is no distinguishable difference between G a m e 0 and G a m e 1 . Therefore,
P r [ S 1 ] = P r [ S 0 ]
Three lists are used to store related results: L h for the inputs and outputs of h ( ) queries, L h A for the answers to h ( ) queries asked by A , and L E for the inputs and outputs of E x e c u t e ( ) queries.
G a m e 2 : The game ends when message transcripts and hash queries collide. The components of messages M 1 , M 2 , and M 3 are evenly distributed. Based on the birthday paradox, we obtain
| P r [ S 2 ] P r [ S 1 ] | ( q s + q e ) 2 2 ( q 1 ) + q h 2 2 l + 1
G a m e 3 : In this game, A attempts to forge the messages M 1 , M 2 , and M 3 without access to the oracle. The process is as follows:
  • Constructing M1: A needs to issue h ( ) queries to successfully construct M 1 . Thus, the following values must be in L h A : ( A u i B u i , ) , ( I D s k I D u i B u i T u i , V u i ) . The probability of success is ( q h + q s ) 2 l .
  • Constructing M2: Similarly, we have ( T s j , ) , ( I D u i I D s j T s j , V s j ) L h A , and the probability is ( q h + q s ) 2 l .
  • Constructing M3: Again, we have ( A s k , ) , ( I D s k I D u i T s k V s k ) L h A , and the probability is ( q h + q s ) 2 l .
Thus, G a m e 3 is indistinguishable from game G a m e 2 unless A successfully constructs M 1 , M 2 , and M 3 . Thus,
| P r [ S 3 ] Pr [ S 2 ] | 3 ( q h + q s ) 2 l
G a m e 4 : This game terminates if A is able to retrieve S K k i (or S K i k ). If A manages to compute the session key, this implies that it has solved the ECDL or ECD problems. Furthermore, the tuple ( r u i s u i r s k s s k · P I D i I D j ) must be stored in L h A . The following cases may occur for A to compute S K k i or S K i k :
(1)
A issues U C o r r u p t ( w ) and S C o r r u p t ( ) .
  • w = 0 : A acquires P W u i and B I O u i , and then A guesses s u i in S e n d ( ) queries with a success probability of q s 2 l .
  • w = 1 : A acquires P W u i and { e s u i , L V , τ u i , T u i , w t s j } , and then A attempts to obtain B I O u i using two methods. A can guess δ u i in S e n d ( ) queries with l b bits with probability q s 2 l b , or replace B I O u i with collected biometric data with a probability of q s · ε b , where ε b is the probability of similarity of the biometric data. So, the probability is q s 2 l b + q s · ε b .
  • w = 2 : A acquires B I O u i and { e s u i , L V , τ u i , T u i , w t s j } , and then A attempts to guess P W u i in q s queries. According to Zipf’s law, the probability of password distribution is C q s s , where C and s are Zipf’s parameters.
Next, A issues an S C o r r u p t ( ) to obtain s s k of S k , and then A attempts to guess r s k using q s queries with the probability of q s q 1 .
(2)
A issues U C o r r u p t ( w ) and E S R e v e a l ( S k ) .
Firstly, A issues a U C o r r u p t ( w ) query as summarized above. Next, A issues an E S R e v e a l ( S k ) query to obtain the ephemeral secret r s k of S k . Then, A attempts to guess s s k within q s attempts, with a probability of q s 2 l .
(3)
A issues E S R e v e a l ( U i ) and S C o r r u p t ( ) .
Firstly, A obtains r u i and s s k . Then, A attempts to guess s s k and r s k .
(4)
A issues E S R e v e a l ( U i ) and E S R e v e a l ( S k ) .
Firstly, A obtains r u i and r s k . Then, A tries to guess s s k and s s k .
In all the above cases, A cannot figure out S K i k (or S K i k ) unless it has solved the problem of ECDL or ECD. Hence,
| P r [ S 4 ] P r [ S 3 ] | ( 2 max { q s 2 l , q s 2 l b + q s ε b , C q s s } + 3 q s ( q 1 ) + 3 q s 2 l ) max { A d v ECDL ( A ) , A d v CDH ( A ) }
G a m e 5 : This game emulates G a m e 4 , but the T e s t ( ) query will terminate if A issues an h ( S i k I D u i I D s k ) query. The probability of A acquiring S K i k is at most q h 2 / 2 l + 1 . Therefore,
| P r [ S 5 ] P r [ S 4 ] | q h 2 / 2 l + 1
Without proper input to the h ( ) query, A cannot differentiate the actual session key from a random one. Therefore,
P r [ S 5 ] = 1 / 2
Given all the probabilities and conditions above, Theorem 1 holds. □

7. Automatic Verification Using ProVerif

ProVerif is a powerful tool for the formal verification of cryptographic protocols. Written in Prolog, it uses Horn clauses and P I algorithms to perform its tasks. ProVerif is capable of precisely modeling a variety of cryptographic primitives, including shared-key cryptography, public-key cryptography, hash functions, and Diffie–Hellman key-exchange protocols, along with supporting rewriting rules and equations. The tool can demonstrate several important security properties, such as reachability properties, correspondence assertions, and observational equivalence.
The proposed scheme has been verified formally using ProVerif. Table 3 illustrates the processes for U i , as outlined in Section 4. In this setup, s c h i j represents a private channel that facilitates communication between U i and S j during the registration phase, while c h i j and c h k i are public channels, with U i and S j communicating over c h i j and U i and S k communicating over c h k i during login and authentication. The three participants execute their respective processes, and the scheme is simulated to run in parallel as ( ( ! U s e r ) | ( ! S k ) | ( ! R C ) ) .
As shown in Table 4, queries and results confirm that A is unable to break the authentication process or determine session keys, ephemeral keys, and long-term keys. The proposed scheme ensures high levels of anonymity, consistency, and mutual authentication.

8. Analysis of Security Features

8.1. User Anonymity and Untracibility

During authentication, each T u i is used only once, regardless of whether authentication is successful, and the values of T u i and other authentication parameters are unique for each session. Furthermore, due to the secrecy of w s j and w u i , even insider users of RC cannot determine T u i . As a result, the scheme ensures anonymity and untraceability.

8.2. Perfect Forward Security

Even if long-term secrets s u i and s s k are compromised, A is still unable to deduce the session key S K i k , for S K i k = h ( S i k I D u i I D s k ) , where S i k = ( r u i s u i mod q ) · A s k and A s k = r s k · P K s k . This is due to the fact that the ephemeral secrets r u i and r s k are unknown to A . Also, even if A is aware of s u i and s s k , he/she cannot deduce S K k i .

8.3. Key Privacy

During registration, the system does not store or expose password-related data, nor are any password authentication tables maintained. The user information { I D u i , P K u i , T u i , w t u i } maintained by RC does not consist of the user’s password and its variants. The long-term keys of U i and S k are neither generated by the RC nor known to it. Furthermore, the component of session keys S i k = ( r u i s u i mod q ) · A s k and S k i = ( r s k s s k mod q ) · A u i does not involve RC. Due to the hardness of the ECDL and ECD problems, A cannot figure out s u i and s s k even if S i k or S k i are exposed. In a nutshell, no insider user of RC can break the security of the proposal.

8.4. Ephemeral Secret Leakage Attack Resistance

Resistance to ESL attacks comprises the fact that, even if A captures the ephemeral keys, r u i and r s k , he/she is unable to obtain the session key S K i k or S S K k i . For S K i k = h ( S i k D u i I D s k ) , where S i k = ( r u i s u i mod q ) · A s k and A s k = r s k · P K s k , even if r u i and r s k are compromised, A cannot deduce S K i k because the long-term keys s u i and s s k are unknown to him. Also, even if A is aware of r u i and r s k , she cannot deduce S S K k i .

8.5. IoT Node Capture Attack Resistance

Sensors may be positioned in unattended environments and physically captured by A . The credentials { I D s k , s s k , P K s k , I D s j , w s j } can then be easily retrieved. In the protocol, different sensors have different credentials. Therefore, it only leads to the disclosure of session keys between S k and user U i , but not between the uncorrupted sensor S k and user U i . In other words, the proposed scheme is resistant to IoT node capture attacks and limits the impact of such compromises to the specific nodes affected.

8.6. Timely Typo Detection

The parameter L V stored on the user’s device enables immediate validation of user inputs. If the user inputs an incorrect ID or password, the computed value L V will differ from the stored value L V . As a result, the log-in request will be rejected, ensuring prompt detection and mitigation of typographical errors during authentication.

9. Performance Comparison

9.1. Security Feature Comparison

As shown in Table 5, the comparison of security features indicates that the proposal offers better security and functionality than the related scheme [17,19,20,21,22,25,26]. Compared to existing schemes, the recommended approach effectively provides anonymity, untraceability, PFS, key privacy, and resistance to insider impersonation, ESL, man-in-the-middle, and other attacks.

9.2. Communication Cost

Assume that the lengths of the random number (R), hash output (H), identity (ID), ECC point (G), and timestamp (TS) are 128, 256, 256, 384, and 32 bits, respectively. In the proposed scheme, three messages M 1 , M 2 , and M 3 are transmitted during the login and authentication phase, where M 1 = { A u i , T I D u i , C I D s k , T 1 , V u i } , M 2 = { A u i , T 2 , E I D u i , V s j } , and M 3 = { A s k , T 3 , E I D s k , V s k } . The lengths of M 1 , M 2 , and M 3 are 384 + 128 + 128 + 32 + 256 = 928 bits, 384 + 32 + 128 + 256 = 800 bits, and 384 + 32 + 128 + 256 = 800 bits. The total communication cost is { 928 + 800 + 800 = 2528 } bits. The communication overheads of [17,19,20,21,22,25,26] are 3584, 4384, 3296, 3872, 3680, 3456, and 3392 bits, respectively. Table 6 shows that the proposed scheme reduces communication costs from 23% to 42%.

9.3. Computation Cost

To compare the computational overhead of different schemes, the run times of other cryptographic primitives are tested. A laptop with Intel Core i5-8250U 1.60 GHZ + 16 GB RAM (Intel Corporation, Santa Clara, CA, USA) and Windows 11 serves as the server. A Raspberry Pi 3 Model B+ (Raspberry Pi Ltd., Cambridge, UK) board with ARM Cortex-A53 1.4 GHz + 1 GB RAM (ARM Ltd., Cambridge, UK) serves as the sensor node and user. When p = 2 192 , the elliptic curve is Curve25519, and the point length is 384 bits; the average running time is shown in Table 7. Table 8 illustrates that our scheme reduces computation costs by comparing 22% to 56% with the related scheme. In particular, the computational overhead of the intermediate server is reduced by more than 95%. These results highlight significant optimization of resource consumption in the proposed scheme, particularly in resource-constrained IoT environments and scenarios where the intermediate server is connected to many nodes.

10. Conclusions

In IoT systems such as smart homes and smart healthcare, IoT user authentication protocols enable secure authentication and session key negotiation between users and IoT devices through an intermediate server, thereby ensuring that users can securely access sensor data directly or control IoT devices remotely. However, the existing IoT user authentication schemes typically assume that the server is fully trusted, ignoring the risk of potential attacks from inside entities. For example, an insider user may launch an insider impersonation attack and steal the session key negotiated between the user and the end device. In addition, most of the existing protocols lack key security properties, such as effective defense against ESL attacks and offline password guessing attacks, as well as perfect forward security. Furthermore, as the scale of IoT devices grows dramatically, intermediate servers need to manage a large number of user and device connections, making the performance of authentication schemes highly dependent on the computational power of the servers.
The design of security protocols is based on the security model, and the existing security model for IoT user authentication still has limitations, making it difficult to comprehensively deal with insider attacks and temporary random number leakage. To enhance the security of IoT user authentication protocols, this paper proposes a new security model for IoT user authentication, IoT-3eCK, which assumes that the intermediate server is semi-trusted and enhances the attacker model to improve the security requirements of IoT user authentication protocols. Based on this security model, this paper designs an enhanced and efficient IoT user authentication protocol. In the registration phase, the protocol ensures that long-term secrets, user passwords, and biometric data of users and end devices are not deduced by insider users in the registration center, effectively preventing internal attacks. In the authentication phase, the protocol combines a dynamic pseudo-identity anonymization mechanism and an ECC key-exchange mechanism to ensure that the protocol satisfies additional security properties. The performance analysis shows that, compared to the existing schemes, the protocol reduces the communication cost by more than 22% and the computational overhead by more than 23%, especially on the intermediate server side by more than 95%, which significantly improves system efficiency. In addition, the security of the new protocol is rigorously proved using a randomized predicate machine model and verified using an automated verification tool.

Author Contributions

Conceptualization, S.H.; methodology, S.H.; software, S.H.; validation, S.H.; formal analysis, S.H.; investigation, S.H. and L.C.; resources, S.H.; data curation, S.H.; writing—original draft preparation, S.H.; writing—review and editing, S.H., Y.Z., Y.G., Y.C., W.Z. and L.C.; visualization, S.H.; supervision, S.H. and L.C.; project administration, S.H., Y.C. and L.C.; funding acquisition, S.H. and L.C. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by National Natural Science Foundation of China (Grant 62302324), in part by Sichuan Province Science and Technology Support Program (Grants 2024NSFSC0500 and 2024YFHZ0023), and in part by the Fundamental Research Funds for the Central Universities (Grant YJ202420).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within the article. The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding authors.

Conflicts of Interest

The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

References

  1. Lin, J.; Yu, W.; Zhang, N.; Yang, X.; Zhang, H.; Zhao, W. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications. IEEE Internet Things J. 2017, 4, 1125–1142. [Google Scholar] [CrossRef]
  2. Wang, D.; Li, W.; Wang, P. Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks. IEEE Trans. Ind. Inform. 2018, 14, 4081–4092. [Google Scholar] [CrossRef]
  3. Gope, P.; Das, A.K.; Kumar, N.; Cheng, Y. Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks. IEEE Trans. Ind. Inform. 2019, 15, 4957–4968. [Google Scholar] [CrossRef]
  4. Prouff, E.; Rivain, M.; Bevan, R. Statistical Analysis of Second Order Differential Power Analysis. IEEE Trans. Comput. 2009, 58, 799–811. [Google Scholar] [CrossRef]
  5. Wang, P.J.; Zhang, Y.J.; Zhang, X.L. Research of differential power analysis countermeasures. Dian Zi Yu Xin Xi Xue = Bao J. Electron. Inf. Technol. 2012, 34, 2774–2784. [Google Scholar] [CrossRef]
  6. Abulencia, J. Insider attacks: Human-factors attacks and mitigation. Comput. Fraud. Secur. 2021, 2021, 14–17. [Google Scholar] [CrossRef]
  7. Robayo, T.A. The Enemy Within: A Framework for Understanding the Lifecycle of the Malicious Insider Threat to Information Systems. Ph.D. Thesis, Saint Leo University, Saint Leo, FL, USA, 2022. [Google Scholar]
  8. Wang, D.; Wang, P. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound. IEEE Trans. Dependable Secur. Comput. 2018, 15, 708–722. [Google Scholar]
  9. Jiang, Q.; Ma, J.; Wei, F.; Tian, Y.; Shen, J.; Yang, Y. An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. J. Netw. Comput. Appl. 2016, 76, 37–48. [Google Scholar] [CrossRef]
  10. Wu, F.; Xu, L.; Kumari, S. A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security. J. Ambient. Intell. Humaniz. Comput. 2017, 8, 101–116. [Google Scholar] [CrossRef]
  11. Chang, C.C.; Le, H.D. A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 2016, 15, 357–366. [Google Scholar] [CrossRef]
  12. Challa, S.; Wazid, M.; Das, A.K.; Kumar, N.; Goutham Reddy, A.; Yoon, E.J.; Yoo, K.Y. Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications. IEEE Access 2017, 5, 3028–3043. [Google Scholar]
  13. Li, X.; Niu, J.; Bhuiyan, M.Z.A.; Wu, F.; Karuppiah, M.; Kumari, S. A Robust ECC-Based Provable Secure Authentication Protocol with Privacy Preserving for Industrial Internet of Things. IEEE Trans. Ind. Inform. 2018, 14, 3599–3609. [Google Scholar]
  14. Li, X.; Niu, J.; Kumari, S.; Wu, F.; Sangaiah, A.K.; Choo, K.K.R. A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J. Netw. Comput. Appl. 2018, 103, 194–204. [Google Scholar]
  15. Shuai, M.; Yu, N.; Wang, H.; Xiong, L. Anonymous authentication scheme for smart home environment with provable security. Comput. Secur. 2019, 86, 132–146. [Google Scholar]
  16. Yeh, H.L.; Chen, T.H.; Liu, P.C.; Kim, T.H.; Wei, H.W. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography. Sensors 2011, 11, 4767–4779. [Google Scholar] [CrossRef]
  17. Li, X.; Peng, J.; Obaidat, M.S.; Wu, F.; Khan, M.K.; Chen, C. A Secure Three-Factor User Authentication Protocol with Forward Secrecy for Wireless Medical Sensor Network Systems. IEEE Syst. J. 2020, 14, 39–50. [Google Scholar]
  18. Sadhukhan, D.; Ray, S.; Biswas, G.P.; Khan, M.K.; Dasgupta, M. A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography. J. Supercomput. 2021, 77, 1114–1151. [Google Scholar]
  19. Wazid, M.; Das, A.K.; Kumar, N.; Alazab, M. Designing Authenticated Key Management Scheme in 6G-Enabled Network in a Box Deployed for Industrial Applications. IEEE Trans. Ind. Inform. 2021, 17, 7174–7184. [Google Scholar]
  20. Srinivas, J.; Das, A.K.; Wazid, M.; Vasilakos, A.V. Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System. IEEE Internet Things J. 2021, 8, 7727–7744. [Google Scholar]
  21. Sutrala, A.K.; Obaidat, M.S.; Saha, S.; Das, A.K.; Alazab, M.; Park, Y. Authenticated Key Agreement Scheme with User Anonymity and Untraceability for 5G-Enabled Softwarized Industrial Cyber-Physical Systems. IEEE Trans. Intell. Transp. Syst. 2022, 23, 2316–2330. [Google Scholar]
  22. Tanveer, M.; Khan, A.U.; Kumar, N.; Hassan, M.M. RAMP-IoD: A Robust Authenticated Key Management Protocol for the Internet of Drones. IEEE Internet Things J. 2022, 9, 1339–1353. [Google Scholar] [CrossRef]
  23. Wang, Q.; Wang, D. Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices. IEEE Trans. Inf. Forensics Secur. 2023, 18, 597–612. [Google Scholar] [CrossRef]
  24. Chen, C.; Guo, H.; Wu, Y.; Gao, Y.; Liu, J. A novel two-factor multi-gateway authentication protocol for WSNs. Ad Hoc Netw. 2023, 141, 103089. [Google Scholar] [CrossRef]
  25. Wang, C.; Wang, D.; Duan, Y.; Tao, X. Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things. IEEE Trans. Inf. Forensics Secur. 2023, 18, 2961–2976. [Google Scholar] [CrossRef]
  26. Kumar, C.M.; Dwivedi, S.K.; Brindha, M.; Al-Shehari, T.; Alfakih, T.; Alsalman, H.; Amin, R. REPACA: Robust ECC based privacy-controlled mutual authentication and session key sharing protocol in coalmines application with provable security. Peer-to-Peer Netw. Appl. 2024, 17, 4264–4285. [Google Scholar] [CrossRef]
  27. Krawczyk, H. HMQV: A high-performance secure diffie-hellman protocol. In Advances in Cryptology—CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, CA, USA, 14–18 August 2005; Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer: Berlin/Heidelberg, Germany, 2005; Volume 3621, pp. 546–566. [Google Scholar]
  28. Lu, Y.; Xu, G.; Li, L.; Yang, Y. Anonymous three-factor authenticated key agreement for wireless sensor networks. Wirel. Netw. 2019, 25, 1461–1475. [Google Scholar] [CrossRef]
  29. Dolev, D.; Yao, A. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
  30. LaMacchia, B.; Lauter, K.; Mityagin, A. Stronger security of authenticated key exchange. In Provable Security: First International Conference, ProvSec 2007, Wollongong, Australia, 1–2 November 2007; Springer: Berlin/Heidelberg, Germany, 2007; pp. 1–16. [Google Scholar]
  31. Yoneyama, K. Efficient and strongly secure password-based server aided key exchange. Inf. Media Technol. 2009, 4, 1046–1059. [Google Scholar] [CrossRef]
  32. Wang, D.; He, D.; Wang, P.; Chu, C.H. Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment. IEEE Trans. Dependable Secur. Comput. 2014, 12, 428–442. [Google Scholar] [CrossRef]
  33. Das, M.L. Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 2009, 8, 1086–1090. [Google Scholar]
  34. Gope, P.; Hwang, T. A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks. IEEE Trans. Ind. Electron. 2016, 63, 7124–7132. [Google Scholar] [CrossRef]
  35. Jiang, Q.; Zeadally, S.; Ma, J.; He, D. Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 2017, 5, 3376–3392. [Google Scholar]
  36. Subramani, J.; Maria, A.; Rajasekaran, A.S.; Al-Turjman, F. Lightweight Privacy and Confidentiality Preserving Anonymous Authentication Scheme for WBANs. IEEE Trans. Ind. Inform. 2022, 18, 3484–3491. [Google Scholar]
  37. Gope, P.; Sikdar, B. An Efficient Privacy-Preserving Authenticated Key Agreement Scheme for Edge-Assisted Internet of Drones. IEEE Trans. Veh. Technol. 2020, 69, 13621–13630. [Google Scholar] [CrossRef]
  38. Halevi, S.; Krawczyk, H. Public-Key Cryptography and Password Protocols. ACM Trans. Inf. Syst. Secur. 1999, 2, 230–268. [Google Scholar]
  39. Wang, D.; Wang, P. Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Netw. 2014, 20, 1–15. [Google Scholar] [CrossRef]
  40. Hankerson, D.; Menezes, A.J.; Vanstone, S. Guide to Elliptic Curve Cryptography; Springer: New York, NY, USA, 2003. [Google Scholar]
  41. Gura, N.; Patel, A.; Wander, A.; Eberle, H.; Shantz, S.C. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In Cryptographic Hardware and Embedded Systems—CHES 2004: 6th International Workshop Cambridge, MA, USA, 11–13 August 2004; Springer: Berlin/Heidelberg, Germany, 2004; pp. 119–132. [Google Scholar]
  42. Srinivas, J.; Das, A.K.; Li, X.; Khan, M.K.; Jo, M. Designing Anonymous Signature-Based Authenticated Key Exchange Scheme for Internet of Things-Enabled Smart Grid Systems. IEEE Trans. Ind. Inform. 2021, 17, 4425–4436. [Google Scholar]
  43. Guo, Y.; Guo, Y. CS-LAKA: A Lightweight Authenticated Key Agreement Protocol with Critical Security Properties for IoT Environments. IEEE Trans. Serv. Comput. 2023, 16, 4102–4114. [Google Scholar]
  44. Wang, P.; Li, B.; Shi, H.; Shen, Y.; Wang, D.; Li, F. Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments. Secur. Commun. Netw. 2019, 2019, 2516963. [Google Scholar] [CrossRef]
Figure 1. Structure of IoT systems.
Figure 1. Structure of IoT systems.
Sensors 25 02013 g001
Figure 2. IoT user authentication protocol.
Figure 2. IoT user authentication protocol.
Sensors 25 02013 g002
Figure 3. User registration and revocation.
Figure 3. User registration and revocation.
Sensors 25 02013 g003
Figure 4. Login and authentication.
Figure 4. Login and authentication.
Sensors 25 02013 g004
Table 1. Summary of relevant ECC-based user AKA protocols.
Table 1. Summary of relevant ECC-based user AKA protocols.
SchemeYearShortcomings
Jiang et al. [9]2016Prone to offline password guessing, ESL, and insider sensor impersonation attacks; lacking key privacy, FPS, and timely typo detection.
Wu et al. [10]2017Prone to offline password guessing, ESL, and insider sensor impersonation attacks; lacking untraceability, key privacy, and FPS.
Challa et al. [12]2017Prone to offline password guessing, impersonation, and insider IoT device impersonation attacks; lacking key privacy, anonymity, and untraceability; has high computation.
Li et al. [13]2018Prone to offline password guessing, replay, ESL, insider sensor impersonation, and impersonation attacks; lacking key privacy.
Li et al. [14]2018Prone to offline password guessing, insider sensor impersonation, and ESL attacks; lacking user untraceability and PFS.
Shuai et al. [15]2019Prone to offline password guessing, insider IoT device impersonation, and ESL attacks; lacking user untraceability, key privacy, and PFS.
Lu et al. [28]2019Based on the sensor ID and the information detected throughout the open channels, an attacker can quickly determine the session key.
Li et al. [17]2020Prone to insider sensor impersonation, impersonation, and ESL attacks; has poor usability.
Sadhukhan et al. [18]2021Prone to replay, ESL, man-in-the-middle, and DoS attacks; lacking user anonymity and timely typo detection.
Wazid et al. [19]2021Prone to offline password guessing, insider sensor impersonation, desynchronization, and man-in-the-middle attacks; lacking user untraceability and PFS; has high computation.
Srinivas et al. [20]2021Prone to session key compromise and device impersonation attacks; lacking user anonymity and PFS; has high computation.
Sutrala et al. [21]2022Prone to smart card/device loss and offline password guessing attacks; lacking user untraceability; has high computation.
Tanveer et al. [22]2022Prone to man-in-middle, insider sensor impersonation, and offline password guessing attacks; lacking user untraceability and PFS.
Chen et al. [24]2023Prone to insider sensor impersonation and ESL attacks; has poor usability.
Wang et al. [25]2023Prone to insider IoT device impersonation and ESL attacks.
Kumar et al. [26]2024Prone to insider sensor impersonation attacks and ESL attacks; lacking PFS and key privacy.
Table 2. Notations of the protocols.
Table 2. Notations of the protocols.
NotationDescription
A Adversary
U i , I D u i , P W u i , B I O u i User and his/her identity, password, biometric
S j , I D s j Sever (register left) and its identity
S k , I D s k IoT device and its identity
s / P K Private keys/public keys
rRandom numbers
TTimestamps
S S K The session key
G e n ( ) / R e p ( ) Biometric key generation/reproduction algorithm
σ u i / τ u i Biometric secret key/public reproduction parameter
e t Fuzzy extractor error tolerance threshold value
w s k , w s j Shared secrets of RC and IoT device
w t u i , w t s j Shared secrets of RC and user
T u i , L u i User dynamic credentials and lists
xSecret values shared by cloud servers and gateways
y , Y Secret values shared by cloud servers and users
X G k , x G k Gateway’s secret key
X s k Secret key of IoT device
Table 3. Codes for users with ProVerif.
Table 3. Codes for users with ProVerif.
let User=
new dui:bitstring;
let MIDui = Mul (Hash (con (dui, PWui)), P) in
out (schij, (IDui, MIDui));
in (schij, (uxui:bitstring,uPKui: bitstring, uTui: bitstring));
let sui = Add (Hash (con (dui, PWui)), uxui) in
let PKui = Mul (sui, P) in
if PKui = uPKui then
let esui = xor (sui, Hash (con (BIOui, PWui))) in
let LV = Mod (Hash (con (con (con (IDui, PWui), BIOui), sui)), d) in
let wsj = Hash (con (Mul (sui, uPKsj), IDui)) in
!
(
event startAuthSk;
let usui = xor (esui, Hash (con (BIOui, PWui))) in
let uLV = Mod (Hash (con (con (con (IDui, PWui), BIOui), usui)), n) in
if uLV = LV then
new TSSeedui:bitstring;
let T1 = generate_Timeline (TSSeedui) in
let Aui = Mul(rui,PKui) in
let EIDsk = xor (IDsk, Hash (con(con (Aui, Bui),)wsj)) in
let Vui = Hash(con(con(con(con(EIDsk, IDui), Aui), T1), wsj)) in
out (chij, (Aui,uTui, EIDsk, T1, Vui));
in (chki, (sAsk: bitstring,sT3: bitstring,sEIDsk: bitstring,
sTui: bitstring,sVsk:bitstring));
let Sik = Mul (mul (rui, sui), sAsk) in
let uIDsk = xor (sEIDsk, Hash (con(sAsk,Sik))) in
let uTui = Hash (con (xor (sTui, Hash (con(sAsk,Sik))),wsj)) in
let uVsk = Hash (con (con (con(con (uIDsk, IDui),sAsk), Sik), sT3))
in
if uVsk = sVsk then
let SKik = Hash (con (con (Sik,IDui), uIDsk))in
event endAuthUi;
0
).
Table 4. Simulation results.
Table 4. Simulation results.
ResultTarget
RESULT Weak secret IDui is true (bad not derivable)Anonymity
RESULT Weak secret IDsK is true (bad not derivable)Anonymity
RESULT not attacker(sui[]) is trueLong-term secret security
RESULT not attacker(ssj[]) is trueLong-term secret security
RESULT not attacker(ssk[]) is trueLong-term secret security
RESULT not attacker(rui[]) is trueEphemeral secret security
RESULT not attacker(rsk[]) is trueEphemeral secret security
RESULT not attacker (SSKik[]) is trueSession key security
RESULT not attacker (SSKki[]) is trueSession key security
RESULT inj-event(endAuthUi) ⇒ inj-event(startAuthUi) is trueConsistent
RESULT inj-event(endAuthSk) ⇒ inj-event(startAuthSk) is trueConsistent
Table 5. Security feature comparison.
Table 5. Security feature comparison.
SchemeF1F2F3F4F5F6F7F8F9F10F11F12F13F14F15
 [17]××××
 [19]×××××××
 [20]×××××××
 [21]×××××
 [22]×××××
 [25]××
 [26]××××
Ours
F1: Anonymity and untraceability; F2: PFS; F3: key privacy; F4: offline password guessing attack resistance; F5: ephemeral secret leakage attack resistance; F6: smart card loss attack resistance; F7: insider impersonation attack resistance; F8: man-in-the-middle attack resistance; F9: replay attack resistance; F10: IoT node capture attacks; F11: password-friendly; F12: timely typo detection; F13: mutual authentication and key agreement; F14: password/biometric update locally; F15: no password authentication table. ✓: supporting a functional feature or ensuring security; ×: lacking a functional feature or not ensuring security.
Table 6. Communication costs.
Table 6. Communication costs.
SchemeUserTASensorTotal (bit)Total (↓%)
OursG + H + TS + 2ID = 928G + H + TS + ID = 800G + H + TS + ID = 8002528-
[17]G + H + 2ID = 8962G + 4H = 1792G + 2H = 896358429.5%
[19]G + 3H + TS + 2ID = 1440G + 3H + 2TS + 3ID = 1600G + 3H + 2TS + ID = 1344438441.1%
[20]G + 3H + TS + ID = 1312G + 2H + TS = 928G + 2H + TS + ID = 1056329623.3%
[21]G + 2H + TS + 3ID = 1312G + 3H + 2TS + ID = 13442G + H + 2TS + ID = 1216387234.7%
[22]G + 2H + TS + 2ID = 11842G + H + R + TS + ID = 14402G + H + TS = 1056368031.3%
[25]G + H + R + 2ID = 11522G + 2H + R + ID = 1644G + H = 640345626.8%
[26]G + H + TS + 2ID = 9282G + 2H + 2R + 2TS + 2ID = 2122H + TS = 384332824.0%
↓: reduction in the overhead of our scheme over existing schemes.
Table 7. Run times of different cryptographic primitives.
Table 7. Run times of different cryptographic primitives.
NotationCryptographic PrimitiveRCUser/Sensor
T e m ECC point multiplication 1.774 3.747
T e a ECC point addition 0.026 0.041
T h Hash operation 0.016 0.032
T a e AEGIS 0.033 0.051
T f e T e m Fuzzy extractors 1.774 3.747
Table 8. Computation costs.
Table 8. Computation costs.
SchemeUser (ms)RC (ms)RC (↓%)Sensor (ms)Total (ms)Total (↓%)
Ours T f e + 2 T e m + 8 T h 11.497 5 T h 0.08 - 2 T e m + 5 T h 7.654 19.231 -
[17] T f e + 3 T e m + 9 T h 15.276 T e m + 8 T h 1.902 95.8% 2 T e m + 4 T h 7.622 24.8 22.5%
[19] T f e + 5 T e m + T e a + 19 T h 23.131 5 T e m + T e a + T h 8.912 99.1% 4 T e m + T e a + 12 T h 15.413 47.456 59.5%
[20] T f e + 5 T e m + T e a + 17 T h 23.067 2 T e m + 10 T h 3.708 97.8% 4 T e m + T e a + 8 T h 15.285 42.06 54.3%
[21] T f e + 5 T e m + 3 T e a + 16 T h 23.117 3 T e m + 2 T e a + 9 T h 5.518 98.6% 4 T e m + 2 T e a + 8 T h 15.326 43.961 56.3%
[22] 3 T a e + T f e + 3 T e m + 6 T h 15.333 3 T a e + T e m + 2 T h 1.905 95.8% 2 T a e + 2 T e m + 3 T h 7.692 24.93 22.9%
[25] 3 T a m + T f e + 8 T h 15.244 T e m + 10 T h 1.934 95.9% 2 T e m + 4 T h 7.622 24.8 22.5%
[26] 3 T e m + T e a + T f e + 11 T h 15.381 4 T a e + T e a + 9 T h 7.266 98.9% 2 T a e + 6 T h 7.686 30.333 36.6%
↓: reduction in the overhead of our scheme over existing schemes.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hu, S.; Zhang, Y.; Guo, Y.; Zhong, W.; Chen, Y.; Chen, L. Efficient IoT User Authentication Protocol with Semi-Trusted Servers. Sensors 2025, 25, 2013. https://doi.org/10.3390/s25072013

AMA Style

Hu S, Zhang Y, Guo Y, Zhong W, Chen Y, Chen L. Efficient IoT User Authentication Protocol with Semi-Trusted Servers. Sensors. 2025; 25(7):2013. https://doi.org/10.3390/s25072013

Chicago/Turabian Style

Hu, Shunfang, Yuanyuan Zhang, Yanru Guo, Wang Zhong, Yanru Chen, and Liangyin Chen. 2025. "Efficient IoT User Authentication Protocol with Semi-Trusted Servers" Sensors 25, no. 7: 2013. https://doi.org/10.3390/s25072013

APA Style

Hu, S., Zhang, Y., Guo, Y., Zhong, W., Chen, Y., & Chen, L. (2025). Efficient IoT User Authentication Protocol with Semi-Trusted Servers. Sensors, 25(7), 2013. https://doi.org/10.3390/s25072013

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop