Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns
Abstract
:1. Introduction
- (1)
- We review existing ECC-based anonymous AKA schemes for IoT-based systems and identify key limitations, such as lack of resynchronization mechanisms and high computational overhead.
- (2)
- We introduce two novel AKA protocols, PUAKA and RCAKA, tailored to traffic patterns. PUAKA ensures efficient anonymous authentication in the periodic update pattern, while RCAKA supports both anonymous authentication and resynchronization in the remote control pattern.
- (3)
- We provide a formal security analysis of our proposals, demonstrating mutual authentication, anonymity, PFS, and resilience against ESL, KCI, and impersonation attacks.
- (4)
- Our protocols significantly reduce computational and communication overhead while offering more robust security features compared to existing schemes.
2. Preliminaries
2.1. Network Model
2.2. Complexity Assumptions
2.3. IoT Traffic Pattern
- (1)
- Periodic update: sensors and actuators send updated status reports, such as smart meter readings (e.g., gas, electricity, water), to the server periodically at intervals configured by the server.
- (2)
- Remote control: The server sends commands to the sensors and actuators to control them remotely, such as remotely starting or stopping smart home devices.
- (3)
- Event driven: The sensor sends real-time emergency messages to the server when a parameter exceeds a threshold and a given phenomenon occurs, such as a fire or tsunami.
- In the event-driven pattern, participants must share symmetric keys in advance to ensure timely data transmission as soon as an event occurs. In this paper, we focus on periodic update and remote control patterns.
3. Proposed Scheme
3.1. Initialization
- T1:
- The TA chooses a curve with a base point P, and the additive group G of order q.
- T2:
- The TA chooses two one-way hash functions:
- -
- , which is used to generate the hash values and the verifier.
- -
- , which is used to generate the one-time pseudonym identity.
- T3:
- Finally, the TA loads the parameters , along with their own identifier, onto each server and end device.
3.2. Registration
- R1:
- selects a random , computes , and transmits the registration request to the TA through a secure channel. Likewise, selects , computes , and sends to the TA.
- R2:
- The TA chooses a random for with a valid identifier and calculates the public key and the one-time pseudonym identity for the S. Similarly, the TA selects for and computes .
- R3:
- The TA stores and . Then, the TA transmits to and to securely.
- R4:
- Once the response is received, computes as its private key and checks if . If true, the S computes the signature shared with the SP and stores .
- Similarly, the SP computes , , and . Then, the SP initializes the pattern of RCAKA, . Finally, the SP stores . When a blocked or new end device, , registers, the TA delivers to through secure channels.
3.3. Authentication and Key Agreement
3.3.1. PUAKA
- PA1:
- First, selects a random nonce , computes , and generates its verifier . Finally, sends the authentication request to .
- PA2:
- In response, first checks the received to identify the sender. If is not recognized, the session is terminated. Next, verifies the completeness of and the effectiveness of by confirming that is valid. If this verification fails, aborts.
- PA3:
- Then, selects a random nonce , computes , and derives the session key . The session key is then computed as . updates the pseudonym identity of S as and calculates its verifier . Finally, sends the reply message to .
- PA4:
- Upon receiving the response, computes the session key and updates the pseudonym identity as . then verifies the equivalence . If the check is satisfied, derives the session key , updates with , and completes the authentication and session key agreement.
3.3.2. RCAKA
- RA1:
- First, generates a random nonce and a timestamp . Next, computes .If the type is , selects another random and constructs a new pseudonym identity for the client S as . Subsequently, masks by computing , where is a shared secret between and . Furthermore, computes the verifier . Finally, sends the resynchronization and authentication request message to .If the type is not , calculates a verifier and sends the authentication request message to .
- RA2:
- When receiving , first verifies the freshness of . Next, if , de-masks , then checks . If the condition is satisfied, updates with . Otherwise, verifies if . If it is not satisfied, will terminate.
- RA3:
- begins by selecting a random nonce and generating a timestamp . Secondly, calculates and derives the session key . The session key is used to compute . Next, masks its identity using . Afterward, computes its verifier as . Finally, sends the reply message to .
- RA4:
- Upon receiving , first confirms the freshness of . Then, calculates the session key and recovers by de-masking using . Next, computes the session key . Finally, verifies the equivalence of the verifier: . If the condition does not hold, the session is terminated.
4. Formal Security Proof
4.1. Participant
- Accept: An oracle I reaches state when it receives the latest expected protocol message.
- Reject: If the oracle accepts an incorrect message, it enters the reject state.
- ⊥: If I does not receive any response, then it switches to the state ⊥.
4.2. Adversary Model
- (1)
- : can obtain the messages from and from .
- (2)
- : transmits a message to I and receives a response according to the PUAKA protocol.
- (3)
- : has the ability to compromise I and retrieve its long-term secrets.
- (4)
- : The session key owned by I can be obtained by .
- (5)
- : The ephemeral secrets of I can be acquired by .
- (6)
- : The output of a randomized hash for a given message m can be obtained for .
- (7)
- : This query is designed to define the semantic security of the session key. If no session key of I is defined, the query returns ⊥. Otherwise, a private coin d is flipped. If , the actual session key is returned to ; otherwise, a random value of the same size is returned. The objective of the adversary is to distinguish between the real session key and a random one.
- (8)
- : The session key held by I will be deleted by this query.
4.3. Formal Security Analysis
- (1)
- For , if , the probability is at most .
- (2)
- For , if , the probability is at most .
- (1)
- obtains both long-term private keys, and , by issuing and queries. Then, attempts to obtain information about and via queries. The attack probability is at most .
- (2)
- issues and , then obtains and . Afterward, attempts to retrieve information about and via queries. The attack probability is at most .
- (3)
- issues and , then obtains and . It then attempts to retrieve information about and via queries. The attack probability is at most .
- (4)
- issues and , then obtains and . then attempts to retrieve information about and via queries. The attack probability is at most .
5. Descriptive Security Analysis
5.1. Anonymity
5.2. Perfect Forward Secrecy
5.3. Ephemeral Secret Leakage Attack Resistance
5.4. No Key Escrow Problem
5.5. IoT Node Capture Attack Resistance
5.6. Key Compromise Impersonation Attack Resistance
5.7. Impersonation Attack Resistance
5.8. Man-in-the-Middle Attack Resistance
6. Performance Comparison
6.1. Computation Cost
6.2. Communication Cost
6.3. Performance Comparison
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
IoT | Internet of Things |
AKA | Authentication and key agreement |
TA | Trusted authority |
DoS | Denial of Service |
ECC | Elliptic Curve Cryptography |
WBAN | Wireless body area networks |
WSN | Wireless sensor networks |
SG | Smart grid |
PFS | Perfect forward security |
KCI | Key compromise impersonation |
ESL | Ephemeral secret leakage |
References
- Al-Fuqaha, A.I.; Guizani, M.H.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
- Vangala, A.; Das, A.K.; Mitra, A.; Das, S.K.; Park, Y. Blockchain-Enabled Authenticated Key Agreement Scheme for Mobile Vehicles-Assisted Precision Agricultural IoT Networks. IEEE Trans. Inf. Forensics Secur. 2023, 18, 904–919. [Google Scholar] [CrossRef]
- Zhang, Q.; Wu, J.; Zhong, H.; He, D.; Cui, J. Efficient Anonymous Authentication Based on Physically Unclonable Function in Industrial Internet of Things. IEEE Trans. Inf. Forensics Secur. 2023, 18, 233–247. [Google Scholar] [CrossRef]
- Wang, D.; Wang, P. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound. IEEE Trans. Dependable Secur. Comput. 2018, 15, 708–722. [Google Scholar] [CrossRef]
- Tsai, J.L.; Lo, N.W. Secure Anonymous Key Distribution Scheme for Smart Grid. IEEE Trans. Smart Grid 2016, 7, 906–914. [Google Scholar] [CrossRef]
- He, D.; Zeadally, S.; Kumar, N.; Lee, J.H. Anonymous Authentication for Wireless Body Area Networks with Provable Security. IEEE Syst. J. 2017, 11, 2590–2601. [Google Scholar] [CrossRef]
- Odelu, V.; Das, A.K.; Wazid, M.; Conti, M. Provably Secure Authenticated Key Agreement Scheme for Smart Grid. IEEE Trans. Smart Grid 2018, 9, 1900–1910. [Google Scholar] [CrossRef]
- Saeed, M.; Liu, Q.Y.; Tian, G.Y.; Gao, B.; Li, F. AKAIoTs: Authenticated key agreement for Internet of Things. Wirel. Netw. 2019, 25, 3081–3101. [Google Scholar] [CrossRef]
- Garg, S.; Kaur, K.; Kaddoum, G.; Rodrigues, J.J.P.C.; Guizani, M. Secure and Lightweight Authentication Scheme for Smart Metering Infrastructure in Smart Grid. IEEE Trans. Ind. Inform. 2020, 16, 3548–3557. [Google Scholar] [CrossRef]
- Chaudhry, S.A.; Nebhan, J.; Yahya, K.; Al-Turjman, F. A Privacy Enhanced Authentication Scheme for Securing Smart Grid Infrastructure. IEEE Trans. Ind. Inform. 2022, 18, 5000–5006. [Google Scholar] [CrossRef]
- Chaudhry, S.A.; Yahya, K.; Garg, S.; Kaddoum, G.; Hassan, M.M.; Zikria, Y.B. LAS-SG: An Elliptic Curve-Based Lightweight Authentication Scheme for Smart Grid Environments. IEEE Trans. Ind. Inform. 2023, 19, 1504–1511. [Google Scholar] [CrossRef]
- Park, K.; Lee, J.; Das, A.K.; Park, Y. BPPS: Blockchain-Enabled Privacy-Preserving Scheme for Demand-Response Management in Smart Grid Environments. IEEE Trans. Dependable Secur. Comput. 2023, 20, 1719–1729. [Google Scholar] [CrossRef]
- Zhang, Y.; Chen, J.; Huang, B.; Peng, C. An Efficient Password Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography. Inf. Technol. Control 2014, 43, 390–401. [Google Scholar] [CrossRef]
- Hu, S.; Chen, Y.; Zheng, Y.; Xing, B.; Li, Y.; Zhang, L.; Chen, L. Provably Secure ECC-Based Authentication and Key Agreement Scheme for Advanced Metering Infrastructure in the Smart Grid. IEEE Trans. Ind. Inform. 2023, 19, 5985–5994. [Google Scholar] [CrossRef]
- Wu, Y.; Guo, H.; Han, Y.; Li, S.; Liu, J. A Security-Enhanced Authentication and Key Agreement Protocol in Smart Grid. IEEE Trans. Ind. Inform. 2024, 20, 11449–11457. [Google Scholar] [CrossRef]
- Hu, S.; Jiang, S.; Miao, Q.; Yang, F.; Zhou, W.; Duan, P. Provably secure ECC-based anonymous authentication and key Agreement for IoT. Appl. Sci. 2024, 14, 3187. [Google Scholar] [CrossRef]
- Nikaein, N.; Laner, M.; Zhou, K.; Svoboda, P.; Drajic, D.; Popovic, M.; Krco, S. Simple Traffic Modeling Framework for Machine Type Communication. In Proceedings of the ISWCS 2013—The Tenth International Symposium on Wireless Communication Systems, Ilmenau, Germany, 27–30 August 2013; VDE: Offenbach, Germany, 2013. [Google Scholar]
- Wang, C.; Wang, D.; Duan, Y.; Tao, X. Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things. IEEE Trans. Inf. Forensics Secur. 2023, 18, 2961–2976. [Google Scholar] [CrossRef]
- Wu, F.; Xu, L.; Li, X.; Kumari, S.; Karuppiah, M.; Obaidat, M.S. A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography. IEEE Syst. J. 2019, 13, 2830–2838. [Google Scholar] [CrossRef]
- LaMacchia, B.; Lauter, K.; Mityagin, A. Stronger Security of Authenticated Key Exchange. In International Conference on Provable Security; Susilo, W., Liu, J.K., Mu, Y., Eds.; Springer: Berlin/Heidelberg, Germany, 2007; pp. 1–16. [Google Scholar]
- Yang, Z.; He, J.; Tian, Y.; Zhou, J. Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things. IEEE Trans. Ind. Inform. 2020, 16, 6584–6596. [Google Scholar] [CrossRef]
Notation | Description | Notation | Description |
---|---|---|---|
S | Sensor or actuator | Server | |
Trust authority | Adversary | ||
Entity-generated partial private key | -generated partial private key | ||
Temporary secret of entity i | Temporary public key of entity i | ||
/ | Private/public key of entity i | Timestamp of entity i | |
Session key of entity i | One-time pseudonym identity |
Scheme | End Device (ms) | Server (ms) | Total (ms) | Decline |
---|---|---|---|---|
PUAKA | 2 + 4 | 2 + 4 | - | |
RCAKA(PU) | 2 + 5 | 2 + 6 | - | |
RCAKA(RC) | 2 + 4 | 2 + 4 | - | |
[10] | 4 + 4 | 4 + 4 | 49% | |
[14] | 3 + + 4 | 3 + + 4 | 33% | |
[15] | 4 + 2 + 6 | 4 + 2 + 6 | 50% | |
[16] | 3 + 3 | 3 + 3 | 32% |
Scheme | End Device (Bits) | Server (Bits) | Total (Bits) |
---|---|---|---|
PUAKA | G + H + ID = 608 | G + H = 544 | 1152 |
RCAKA(PU) | G + H + ID + TS = 640 | G + H + ID + TS = 640 | 1280 |
RCAKA(RC) | G + H + TS = 576 | G + H + ID + TS = 640 | 1216 |
[10] | G + H + TS + ID = 640 | G + H + TS = 576 | 1216 |
[14] | G + H + R + TS + ID = 800 | G + H + R + TS + ID = 800 | 1600 |
[15] | G + 2H + 2TS + ID = 832 | G + H + TS + ID = 640 | 1472 |
[16] | G + H + TS + ID = 640 | G + H + TS = 576 | 1216 |
Scheme | F1 | F2 | F3 | F4 | F5 | F6 | F7 | F8 | F9 | F10 | F11 | F12 | F13 | F14 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
[10] | ✔ | ✔ | ✔ | ✔ | × | ✔ | ✔ | ✔ | ✔ | ✔ | × | ✔ | ✔ | × |
[14] | × | ✔ | ✔ | × | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | × | × |
[15] | ✔ | ✔ | ✔ | × | ✔ | ✔ | × | × | ✔ | ✔ | ✔ | ✔ | ✔ | × |
[16] | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | × |
Ours | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hu, S.; Zhang, Y.; Guo, Y.; Chen, Y.; Chen, L. Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns. Sensors 2025, 25, 897. https://doi.org/10.3390/s25030897
Hu S, Zhang Y, Guo Y, Chen Y, Chen L. Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns. Sensors. 2025; 25(3):897. https://doi.org/10.3390/s25030897
Chicago/Turabian StyleHu, Shunfang, Yuanyuan Zhang, Yanru Guo, Yanru Chen, and Liangyin Chen. 2025. "Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns" Sensors 25, no. 3: 897. https://doi.org/10.3390/s25030897
APA StyleHu, S., Zhang, Y., Guo, Y., Chen, Y., & Chen, L. (2025). Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns. Sensors, 25(3), 897. https://doi.org/10.3390/s25030897