Elliptic curve cryptography and biometrics for iot authentication

The Internet of Things (IoT) is now present in every aspect of our daily lives because of its ability to offer remote services. Unfortunately, the insecure transmission of user data in open channels caused by this significant use of IoT networks makes it vulnerable to malicious use. Hence,...

Full description

Saved in:
Bibliographic Details
Main Authors: Dargaoui Souhayla, Azrour Mourade, El Allaoui Ahmad, Guezzaz Azidine, Alabdulatif Abdulatif, Ahmad Sultan, Innab Nisreen
Format: Article
Language:English
Published: Faculty of Technical Sciences in Cacak 2025-01-01
Series:Serbian Journal of Electrical Engineering
Subjects:
Online Access:https://doiserbia.nb.rs/img/doi/1451-4869/2025/1451-48692502223D.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849421319166230528
author Dargaoui Souhayla
Azrour Mourade
El Allaoui Ahmad
Guezzaz Azidine
Alabdulatif Abdulatif
Ahmad Sultan
Innab Nisreen
author_facet Dargaoui Souhayla
Azrour Mourade
El Allaoui Ahmad
Guezzaz Azidine
Alabdulatif Abdulatif
Ahmad Sultan
Innab Nisreen
author_sort Dargaoui Souhayla
collection DOAJ
description The Internet of Things (IoT) is now present in every aspect of our daily lives because of its ability to offer remote services. Unfortunately, the insecure transmission of user data in open channels caused by this significant use of IoT networks makes it vulnerable to malicious use. Hence, the security of the user’s data is now a serious matter in an IoT environment. Since authentication may prevent hackers from recovering and using data transmitted between IoT devices, researchers have proposed many lightweight IoT authentication protocols over the past decades. Many of these protocols are built around two authentication factors. They cannot guarantee unlinkability and perfect forward secrecy, as well as withstand well-known attacks such as node capture, DOS attack, stolen verifier, Denning-Sacco attack, and GWN bypass. This paper proposes an Elliptic Curve Cryptography (ECC) -based authentication protocol that is anonymous and exploits three authentication factors to ensure all security services and withstand well-known attacks. Our provided protocol is secure and can resist known attacks, as demonstrated by both informal security analysis and formal security proof using ProVerif. Lastly, our protocol and other protocols are compared in terms of computational costs, communication costs, and security features.
format Article
id doaj-art-64d0cc07fb444bc89cbb26d14799a389
institution Kabale University
issn 1451-4869
2217-7183
language English
publishDate 2025-01-01
publisher Faculty of Technical Sciences in Cacak
record_format Article
series Serbian Journal of Electrical Engineering
spelling doaj-art-64d0cc07fb444bc89cbb26d14799a3892025-08-20T03:31:30ZengFaculty of Technical Sciences in CacakSerbian Journal of Electrical Engineering1451-48692217-71832025-01-0122222324110.2298/SJEE2502223D1451-48692502223DElliptic curve cryptography and biometrics for iot authenticationDargaoui Souhayla0https://orcid.org/0009-0006-8080-0252Azrour Mourade1https://orcid.org/0000-0003-1575-8140El Allaoui Ahmad2https://orcid.org/0000-0002-8897-3565Guezzaz Azidine3https://orcid.org/0000-0003-1058-5420Alabdulatif Abdulatif4https://orcid.org/0000-0003-0646-5872Ahmad Sultan5https://orcid.org/0000-0002-3198-7974Innab Nisreen6https://orcid.org/0000-0003-4412-7727IMIA Laboratory, MSIA Team, Faculty of Sciences and Techniques, Moulay Ismail University of Meknes, Errachidia, MoroccoIMIA Laboratory, MSIA Team, Faculty of Sciences and Techniques, Moulay Ismail University of Meknes, Errachidia, MoroccoIMIA Laboratory, MSIA Team, Faculty of Sciences and Techniques, Moulay Ismail University of Meknes, Errachidia, MoroccoHigher School of Technology, Cadi Ayyad University, MoroccoDepartment of Computer Science, College of Computer, Qassim University, Buraydah, Saudi ArabiaDepartment of Computer Science, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi ArabiaDepartment of Computer Science and Information Systems, College of Applied Sciences, AlMaarefa University, Riyadh, Saudi ArabiaThe Internet of Things (IoT) is now present in every aspect of our daily lives because of its ability to offer remote services. Unfortunately, the insecure transmission of user data in open channels caused by this significant use of IoT networks makes it vulnerable to malicious use. Hence, the security of the user’s data is now a serious matter in an IoT environment. Since authentication may prevent hackers from recovering and using data transmitted between IoT devices, researchers have proposed many lightweight IoT authentication protocols over the past decades. Many of these protocols are built around two authentication factors. They cannot guarantee unlinkability and perfect forward secrecy, as well as withstand well-known attacks such as node capture, DOS attack, stolen verifier, Denning-Sacco attack, and GWN bypass. This paper proposes an Elliptic Curve Cryptography (ECC) -based authentication protocol that is anonymous and exploits three authentication factors to ensure all security services and withstand well-known attacks. Our provided protocol is secure and can resist known attacks, as demonstrated by both informal security analysis and formal security proof using ProVerif. Lastly, our protocol and other protocols are compared in terms of computational costs, communication costs, and security features.https://doiserbia.nb.rs/img/doi/1451-4869/2025/1451-48692502223D.pdfauthenticationiotelliptic curve cryptographymulti-factor securitybiometrics
spellingShingle Dargaoui Souhayla
Azrour Mourade
El Allaoui Ahmad
Guezzaz Azidine
Alabdulatif Abdulatif
Ahmad Sultan
Innab Nisreen
Elliptic curve cryptography and biometrics for iot authentication
Serbian Journal of Electrical Engineering
authentication
iot
elliptic curve cryptography
multi-factor security
biometrics
title Elliptic curve cryptography and biometrics for iot authentication
title_full Elliptic curve cryptography and biometrics for iot authentication
title_fullStr Elliptic curve cryptography and biometrics for iot authentication
title_full_unstemmed Elliptic curve cryptography and biometrics for iot authentication
title_short Elliptic curve cryptography and biometrics for iot authentication
title_sort elliptic curve cryptography and biometrics for iot authentication
topic authentication
iot
elliptic curve cryptography
multi-factor security
biometrics
url https://doiserbia.nb.rs/img/doi/1451-4869/2025/1451-48692502223D.pdf
work_keys_str_mv AT dargaouisouhayla ellipticcurvecryptographyandbiometricsforiotauthentication
AT azrourmourade ellipticcurvecryptographyandbiometricsforiotauthentication
AT elallaouiahmad ellipticcurvecryptographyandbiometricsforiotauthentication
AT guezzazazidine ellipticcurvecryptographyandbiometricsforiotauthentication
AT alabdulatifabdulatif ellipticcurvecryptographyandbiometricsforiotauthentication
AT ahmadsultan ellipticcurvecryptographyandbiometricsforiotauthentication
AT innabnisreen ellipticcurvecryptographyandbiometricsforiotauthentication