Abstract
The Internet of Things (IoT) is omnipresent in every industry and has extended its footprint in various domains. This IoT device augmentation in today’s smart world demands lightweight and secure authentication mechanisms for resource-constrained types of devices. This work proposed new authentication and key management schemes to equip these devices by leveraging lightweight cryptographic mechanisms. The proposed approach utilized various multi-device authentication scenarios such as end node to (edge) gateway, Gateway to Gateway and Node to Node through the gateway. In an IoT ecosystem, two end nodes have the same session key, which may be used for more secure communication. The robustness of the proposed mechanism is instantiated with the message exchange process of various scenarios and thorough cryptanalysis of the most common network intrusion attacks. Also, this proposed methodology provides more efficiency than existing works concerning communication overhead and computing complexity.
Similar content being viewed by others
Data availability
All data generated or analysed during this study are included in this published article.
References
Ostad-Sharif, A., Arshad, H., Nikooghadam, M., & Abbasinezhad-Mood, D. (2019). Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme. Future Generation Computer Systems, 100, 882–892.
Amin, R., Islam, S. H., Biswas, G., Khan, M. K., Leng, L., & Kumar, N. (2016). Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Computer Networks, 101, 42–62.
Jiang, Q., Zeadally, S., Ma, J., & He, D. (2017). Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access, 5, 3376–3392.
Guo, H., Gao, Y., Xu, T., Zhang, X., & Ye, J. (2019). A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks. Ad Hoc Networks, 95, 101965.
Aghili, S. F., Mala, H., Shojafar, M., & Peris-Lopez, P. (2019). LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT. Future Generation Computer Systems, 96, 410–424.
Zhang, L., Zhang, Y., Tang, S., & Luo, H. (2018). Privacy protection for e-health systems by means of dynamic authentication and three-factor key agreement. IEEE Transactions on Industrial Electronics, 65(3), 2795–2805.
Gupta, A., Tripathi, M., Shaikh, T. J., & Sharma, A. (2019). A lightweight anonymous user authentication and key establishment scheme for wearable devices. Computer Networks, 149, 29–42.
Das, A. K., Wazid, M., Kumar, N., Khan, M. K., Choo, K. K. R., & Park, Y. (2017). Design of secure and lightweight authentication protocol for wearable devices environment. IEEE Journal of Biomedical and Health Informatics, 22(4), 1310–1322.
Amin, R., Kumar, N., Biswas, G. P., Iqbal, R., & Chang, V. (2018). A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Future Generation Computer Systems, 78, 1005–1019.
Wazid, M., Das, A. K., & Vasilakos, A. V. (2018). Authenticated key management protocol for cloud-assisted body area sensor networks. Journal of Network and Computer Applications, 123, 112–126.
Venkatasubramanian, K. K., Banerjee, A., & Gupta, S. K. S. (2009). PSKA: Usable and secure key agreement scheme for body area networks. IEEE Transactions on Information Technology in Biomedicine, 14(1), 60–68.
Li, C. T., Wu, T. Y., Chen, C. L., Lee, C. C., & Chen, C. M. (2017). An efficient user authentication and user anonymity scheme with provably security for IoT-based medical care system. Sensors, 17(7), 1482.
Watro, R., Kong, D., Cuti, S. F., Gardiner, C., Lynn, C., & Kruus, P. (2004). TinyPK: securing sensor networks with public key technology. Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks (pp. 59-64)
Wong, K. H., Zheng, Y., Cao, J., & Wang, S. (2006). A dynamic user authentication scheme for wireless sensor networks. IEEE international conference on sensor networks, ubiquitous, and trustworthy computing (SUTC'06) (Vol. 1, pp. 8-pp). IEEE
Xu, J., Zhu, W.-T., & Feng, D.-G. (2009). An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces, 31(4), 723–728.
Anuradha, M. P., & Lino Fathima Chinna Rani, K. (2022). Blockchain technology for IoT edge devices and data security. Advances in Computers, 127, 379–412.
Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.
He, D., Gao, Y., Chan, S., Chen, C., & Bu, J. (2010). An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks, 10(4), 361–371.
Yuan, J., Jiang, C., & Jiang, Z. (2010). A biometric-based user authentication for wireless sensor networks. Wuhan University Journal of Natural Sciences, 15(3), 272–276.
Yeh, H.-L., Chen, T.-H., Liu, P.-C., Kim, T.-H., & Wei, H.-W. (2011). A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 11(5), 4767–4779.
Islam, S. H., & Biswas, G. (2011). A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Journal of Systems and Software, 84(11), 1892–1898.
Das, A. K., Sharma, P., Chatterjee, S., & Sing, J. K. (2012). A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Journal of Network and Computer Applications, 35(5), 1646–1656.
Xue, K., Ma, C., Hong, P., & Ding, R. (2013). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications, 36(1), 316–323.
Nižetić, S., Šolić, P., González-De, D. L. D. I., & Patrono, L. (2020). Internet of things (IoT): Opportunities, issues and challenges towards a smart and sustainable future. Journal of Cleaner Production, 274, 122877.
Li, C.-T., Weng, C.-Y., & Lee, C.-C. (2013). An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors, 13(8), 9589–9603.
Turkanovic, M., & Holbl, M. (2013). An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Elektronika ir Elektrotechnika, 19(6), 109–117.
Farash, M. S., Attari, M. A., & Kumari, S. (2017). Cryptanalysis and improvement of a three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps. International Journal of Communication Systems, 30(1), e2912.
Turkanović, M., Brumen, B., & Hölbl, M. (2014). A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Networks, 20, 96–112.
He, D., Kumar, N., & Chilamkurti, N. (2015). A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences, 321, 263–277.
Kalra, S., & Sood, S. K. (2015). Secure authentication scheme for IoT and cloud servers. Pervasive and Mobile Computing, 24, 210–223.
Rizzardi, A., Sicari, S., Miorandi, D., & Coen-Porisini, A. (2016). AUPS: An open source AUthenticated publish/subscribe system for the internet of things. Information Systems, 62, 29–41.
Amin, R., & Biswas, G. (2015). Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card. Arabian Journal for Science and Engineering, 40(11), 3135–3149.
Farash, M. S., Islam, S. H., & Obaidat, M. S. (2015). A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks. Concurrency and Computation: Practice and Experience, 27(17), 4897–4913.
Heydari, M., Sadough, S. M. S., Farash, M. S., Chaudhry, S. A., & Mahmood, K. (2016). An efficient password-based authenticated key exchange protocol with provable security for mobile client–client networks. Wireless Personal Communications, 88(2), 337–356.
Amin, R., & Biswas, G. (2016). A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Networks, 36, 58–80.
Mehta, M., & Patel, K. (2020). A review for IoT authentication–current research trends and open challenges. Materials Today: Proceedings. https://doi.org/10.1016/j.matpr.2020.10.859
Kaveh, M., Martín, D., & Mosavi, M. R. (2020). A lightweight authentication scheme for V2G communications: A PUF-based approach ensuring cyber/physical security and identity/location privacy. Electronics, 9(9), 1479.
Irshad, A., Sher, M., Chaudhary, S. A., Naqvi, H., & Farash, M. S. (2016). An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging registration centre. The Journal of Supercomputing, 72(4), 1623–1644.
Bakkiam-Deebak, D., & AL-Turjman, F. (2021). Lightweight privacy-aware secure authentication scheme for cyber-physical systems in the edge intelligence era. Concurrency and Computation: Practice and Experience, 35, e6510.
Mohit, P., Amin, R., & Biswas, G. (2017). Design of authentication protocol for wireless sensor network-based smart vehicular system. Vehicular Communications, 9, 64–71.
Irshad, A., Sher, M., Ashraf, M. U., Alzahrani, B. A., Wu, F., Xie, Q., & Kumari, S. (2017). An improved and secure chaotic-map based multi-server authentication protocol based on Lu et al. and Tsai and Lo’s scheme. Wireless Personal Communications, 95(3), 3185–3208.
Wu, F., Li, X., Sangaiah, A. K., Xu, L., Kumari, S., Wu, L., & Shen, J. (2018). A lightweight and robust two-factor authentication scheme for personalised healthcare systems using wireless medical sensor networks, future gener. Computing Systems, 82, 727–737.
Mishra, D., Vijayakumar, P., Sureshkumar, V., Amin, R., Islam, S. H., & Gope, P. (2018). Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multimedia Tools and Applications, 77(14), 18295–18325.
Srinivas, J., Das, A. K., Wazid, M., & Kumar, N. (2018). Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial Internet of Things. IEEE Transactions on Dependable and Secure Computing, 17(6), 1133–1146.
Lawal, M. A., Shaikh, R. A., & Hassan, S. R. (2021). A DDoS attack mitigation framework for IoT networks using fog computing. Procedia Computer Science, 182, 13–20.
Oh, J., Yu, S., Lee, J., Son, S., Kim, M., & Park, Y. (2021). A secure and lightweight authentication protocol for IoT-based smart homes. Sensors, 21(4), 1488.
Chen, C. M., Chen, L., Huang, Y., Kumar, S., & Wu, J. M. (2021). T, “Lightweight authentication protocol in edge-based smart grid environment.” EURASIP Journal on Wireless Communications and Networking, 2021, 1–18.
Zargar, S., Shahidinejad, A., & Ghobaei-Arani, M. (2021). A lightweight authentication protocol for IoT-based cloud environment. International Journal of Communication Systems, 34(11), e4849.
Krishnasrija, R., Mandal, A. K., & Cortesi, A. (2023). A lightweight mutual and transitive authentication mechanism for IoT network. Ad Hoc Networks, 138, 103003.
Ryu, J., Oh, J., Kwon, D., Son, S., Lee, J., Park, Y., & Park, Y. (2022). Secure ECC-based three-factor mutual authentication protocol for telecare medical information system. IEEE Access, 10, 11511–11526.
Borgohain, P., & Choudhury, H. (2023). A lightweight D2D authentication protocol for relay coverage scenario in 5G mobile network. Computer Networks, 225, 109679.
Lee, J., Oh, J., & Park, Y. (2023). A secure and anonymous authentication protocol based on three-factor wireless medical sensor networks. Electronics, 12(6), 1368.
Acknowledgements
The authors are thankful to the Department of Science & Technology, New Delhi, India (SR/FST/ETI-371/2014) and SASTRA Deemed University for their financial and infrastructure support.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors do not have conflicts of interest associated with this publication.
Ethical approval
This article does not contain any studies with human participants or animals performed by any authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Ramya, S., Doraipndian, M. & Amirtharajan, R. LAPE2D: Lightweight Authentication Protocol to Secure End and Edge Devices in Iot Framework. Wireless Pers Commun 131, 2217–2239 (2023). https://doi.org/10.1007/s11277-023-10539-5
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-023-10539-5