Smart City Gnosys

Smart city article details

Title A Lightweight Three Factor Authentication Framework For Iot Based Critical Applications
ID_Doc 2343
Authors Saqib M.; Jasra B.; Moon A.H.
Year 2022
Published Journal of King Saud University - Computer and Information Sciences, 34, 9
DOI http://dx.doi.org/10.1016/j.jksuci.2021.07.023
Abstract IoT is emerging as a massive web of heterogeneous networks estimated to interconnect over 41 billion devices by 2025, generating around 79 zettabytes of data. The heterogeneous network shall bring in a plethora of digital services leveraging cloud and communication technologies to drive smart city applications. As users access these services remotely in a ubiquitous environment over public channels, it becomes imperative to secure their communication. Both entity and message authentication emerge as a critical security primitive to thwart unauthorized access and prevent the falsification of messages. While researchers have given due attention to achieving mutual authentication between the subscriber (remote user) and gateway node (broker), the mutual authentication between the gateway node and an IoT sensor node is left to be desired. It could be done at the peril of a rogue or a shadow IoT device unauthorizedly joining an IoT-based network. Some of the widely used IoT-specific application layer protocols like constrained application protocol (COAP) and message queue telemetry transport (MQTT) protocol are not inherently equipped with adequate security safeguards. They, therefore, rely on underlying transport layer security protocols, which are highly computationally intensive. To address this issue, this paper proposes a three-factor authentication framework suitable for IoT-driven critical applications based upon identity, password and a digital signature scheme. The framework employs publish-subscribe pattern leveraging elliptical curve cryptography (ECC) and computationally low hash chains. The formal and informal security analysis shows that the framework is resistant to different types of cryptographic attacks. Furthermore, the automated validation performed with the Scyther tool verifies that there are no cryptographic attacks found on any of the claims stated in the proposed framework. Finally, a comparison of the framework security features, computational, and communication overheads is carried out with other existing protocols. © 2021 The Authors
Author Keywords Constrained application protocol; Internet of things; Message queue telemetry transport; Mutual authentication; Scyther; Session key; Three-factor authentication


Similar Articles


Id Similarity Authors Title Published
35255 View0.882Singh Y.; Singh A.Lightweight Cryptography Approach For Multifactor Authentication In Internet Of ThingsMysuruCon 2022 - 2022 IEEE 2nd Mysore Sub Section International Conference (2022)
4458 View0.872Abi-Char P.E.; Nader P.; Mahfouz S.A Secure And Lightweight Authenticated Key Agreement Protocol For Distributed Iot Applications2020 43rd International Conference on Telecommunications and Signal Processing, TSP 2020 (2020)
43749 View0.871Lee J.; Oh J.; Kwon D.; Kim M.; Yu S.; Jho N.-S.; Park Y.Puftap-Iot: Puf-Based Three-Factor Authentication Protocol In Iot Environment Focused On Sensing DevicesSensors, 22, 18 (2022)
4520 View0.87Son S.; Kwon D.; Park Y.A Security Analysis Of "A Privacy-Preserving Three-Factor Authentication System For Iot-Enabled Wireless Sensor Networks"International Conference on Information Networking (2025)
35244 View0.868Khalique A.; Siddiqui F.; Ahad M.A.; Hussain I.Lightweight Authentication For Iot Devices (Laid) In Sustainable Smart CitiesScientific Reports, 15, 1 (2025)
477 View0.867Huang C.; Yan K.A Blockchain Based Fast Authentication Framework For Iot Networks With Trusted HardwareProceedings - 2020 IEEE 22nd International Conference on High Performance Computing and Communications, IEEE 18th International Conference on Smart City and IEEE 6th International Conference on Data Science and Systems, HPCC-SmartCity-DSS 2020 (2020)
35254 View0.866Rajesh S.M.; Prabha R.Lightweight Cryptographic Approach To Address The Security Issues In Intelligent Applications: A SurveyIDCIoT 2023 - International Conference on Intelligent Data Communication Technologies and Internet of Things, Proceedings (2023)
2330 View0.865Krishnasrija R.; Mandal A.K.; Cortesi A.A Lightweight Mutual And Transitive Authentication Mechanism For Iot NetworkAd Hoc Networks, 138 (2023)
43598 View0.864Ding Z.; Xie Q.Provably Secure Dynamic Anonymous Authentication Protocol For Wireless Sensor Networks In Internet Of ThingsSustainability (Switzerland), 15, 7 (2023)
23109 View0.861Ullah S.; Nasir H.M.; Kadir K.; Khan A.; Memon A.; Azhar S.; Khan I.; Ashraf M.End-To-End Encryption Enabled Lightweight Mutual Authentication Scheme For Resource Constrained Iot NetworkComputers, Materials and Continua, 82, 2 (2025)