Smart City Gnosys

Smart city article details

Title Anonymous Authentication Scheme Based On Physically Unclonable Function And Biometrics For Smart Cities
ID_Doc 9651
Authors Nyangaresi V.O.; AlRababah A.A.; Yenurkar G.K.; Chinthaginjala R.; Yasir M.
Year 2025
Published Engineering Reports, 7, 1
DOI http://dx.doi.org/10.1002/eng2.13079
Abstract Smart cities amalgamate technologies such as Internet of Things, big data analytics, and cloud computing to collect and analyze large volumes of data from varied sources which facilitate intelligent surveillance, enhanced energy management systems, and environmental monitoring. The ultimate goal of these smart cities is to offer city residents with better services, opportunities, and quality of life. However, the vulnerabilities in the underlying smart city technologies, interconnection of heterogeneous devices, and transfer of data over the open public channels expose these networks to a myriad of security and privacy threats. Therefore, many security solutions have been presented in the literature. However, the majority of these techniques still have numerous performance, privacy, and security challenges that need to be addressed. To this end, we present an anonymous authentication scheme for the smart cities based on physically unclonable function and user biometrics. Its formal security analysis using the Real-Or-Random (ROR) model demonstrates the robustness of the negotiated session key against active and passive attacks. In addition, the informal security analysis shows that it supports salient functional and security features such as mutual authentication, key agreement, perfect key secrecy, anonymity, and untraceability. It is also shown to withstand typical smart city threats such as side-channeling, offline guessing, session key disclosure, eavesdropping, session hijacking, privileged insider, and impersonation attacks. Moreover, comparative performance shows that it incurs the lowest energy and computation costs at relatively low communication overheads.
Author Keywords anonymity; authentication; biometrics; privacy; PUF; security; sensors; smart city


Similar Articles


Id Similarity Authors Title Published
3800 View0.92Kim C.; Son S.; Park Y.A Privacy-Preserving Authentication Scheme Using Puf And Biometrics For Iot-Enabled Smart CitiesElectronics (Switzerland), 14, 10 (2025)
4211 View0.894Alotaibi A.; Aldawghan H.; Aljughaiman A.A Review Of The Authentication Techniques For Internet Of Things Devices In Smart Cities: Opportunities, Challenges, And Future DirectionsSensors, 25, 6 (2025)
50219 View0.893Nyangaresi V.O.; Abduljabbar Z.A.; Mutlaq K.A.-A.; Bulbul S.S.; Ma J.; Aldarwish A.J.Y.; Honi D.G.; Al Sibahee M.A.; Neamah H.A.Smart City Energy Efficient Data Privacy Preservation Protocol Based On Biometrics And Fuzzy Commitment SchemeScientific Reports, 14, 1 (2024)
4353 View0.885Meshram, C; Ibrahim, RW; Deng, LZ; Shende, SW; Meshram, SG; Barve, SKA Robust Smart Card And Remote User Password-Based Authentication Protocol Using Extended Chaotic Maps Under Smart Cities EnvironmentSOFT COMPUTING, 25, 15 (2021)
47585 View0.881Gupta S.; Alharbi F.; Alshahrani R.; Kumar Arya P.; Vyas S.; Elkamchouchi D.H.; Soufiene B.O.Secure And Lightweight Authentication Protocol For Privacy Preserving Communications In Smart City ApplicationsSustainability (Switzerland) , 15, 6 (2023)
7844 View0.879Alfouzan F.A.; Kim K.; Alzahrani N.M.An Efficient Framework For Securing The Smart City Communication NetworksSensors, 22, 8 (2022)
30124 View0.877Gokul N.B.; Sankaran S.Identity Based Security Framework For Smart CitiesInternational Symposium on Advanced Networks and Telecommunication Systems, ANTS, 2020-December (2020)
47941 View0.876Ross, A; Banerjee, S; Chowdhury, ASecurity In Smart Cities: A Brief Review Of Digital Forensic Schemes For Biometric DataPATTERN RECOGNITION LETTERS, 138 (2020)
915 View0.875Kotian A.L.; Abhishek B.; Allapur A.R.; Gowda A.; Gowda A.A Comprehensive Review Of Different Frameworks For Ensuring Data Privacy And Security For Iot Networks In Smart City3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025 (2025)
47744 View0.874Rathore M.M.; Jararweh Y.; Raheel M.; Paul A.Securing High-Velocity Data: Authentication And Key Management Model For Smart City Communication2019 4th International Conference on Fog and Mobile Edge Computing, FMEC 2019 (2019)