Elliptic curve cryptography and biometrics for iot authentication
The Internet of Things (IoT) is now present in every aspect of our daily lives because of its ability to offer remote services. Unfortunately, the insecure transmission of user data in open channels caused by this significant use of IoT networks makes it vulnerable to malicious use. Hence,...
Saved in:
| Main Authors: | , , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Faculty of Technical Sciences in Cacak
2025-01-01
|
| Series: | Serbian Journal of Electrical Engineering |
| Subjects: | |
| Online Access: | https://doiserbia.nb.rs/img/doi/1451-4869/2025/1451-48692502223D.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849421319166230528 |
|---|---|
| author | Dargaoui Souhayla Azrour Mourade El Allaoui Ahmad Guezzaz Azidine Alabdulatif Abdulatif Ahmad Sultan Innab Nisreen |
| author_facet | Dargaoui Souhayla Azrour Mourade El Allaoui Ahmad Guezzaz Azidine Alabdulatif Abdulatif Ahmad Sultan Innab Nisreen |
| author_sort | Dargaoui Souhayla |
| collection | DOAJ |
| description | The Internet of Things (IoT) is now present in every aspect of our daily
lives because of its ability to offer remote services. Unfortunately, the
insecure transmission of user data in open channels caused by this
significant use of IoT networks makes it vulnerable to malicious use. Hence,
the security of the user’s data is now a serious matter in an IoT
environment. Since authentication may prevent hackers from recovering and
using data transmitted between IoT devices, researchers have proposed many
lightweight IoT authentication protocols over the past decades. Many of
these protocols are built around two authentication factors. They cannot
guarantee unlinkability and perfect forward secrecy, as well as withstand
well-known attacks such as node capture, DOS attack, stolen verifier,
Denning-Sacco attack, and GWN bypass. This paper proposes an Elliptic Curve
Cryptography (ECC) -based authentication protocol that is anonymous and
exploits three authentication factors to ensure all security services and
withstand well-known attacks. Our provided protocol is secure and can resist
known attacks, as demonstrated by both informal security analysis and formal
security proof using ProVerif. Lastly, our protocol and other protocols are
compared in terms of computational costs, communication costs, and security
features. |
| format | Article |
| id | doaj-art-64d0cc07fb444bc89cbb26d14799a389 |
| institution | Kabale University |
| issn | 1451-4869 2217-7183 |
| language | English |
| publishDate | 2025-01-01 |
| publisher | Faculty of Technical Sciences in Cacak |
| record_format | Article |
| series | Serbian Journal of Electrical Engineering |
| spelling | doaj-art-64d0cc07fb444bc89cbb26d14799a3892025-08-20T03:31:30ZengFaculty of Technical Sciences in CacakSerbian Journal of Electrical Engineering1451-48692217-71832025-01-0122222324110.2298/SJEE2502223D1451-48692502223DElliptic curve cryptography and biometrics for iot authenticationDargaoui Souhayla0https://orcid.org/0009-0006-8080-0252Azrour Mourade1https://orcid.org/0000-0003-1575-8140El Allaoui Ahmad2https://orcid.org/0000-0002-8897-3565Guezzaz Azidine3https://orcid.org/0000-0003-1058-5420Alabdulatif Abdulatif4https://orcid.org/0000-0003-0646-5872Ahmad Sultan5https://orcid.org/0000-0002-3198-7974Innab Nisreen6https://orcid.org/0000-0003-4412-7727IMIA Laboratory, MSIA Team, Faculty of Sciences and Techniques, Moulay Ismail University of Meknes, Errachidia, MoroccoIMIA Laboratory, MSIA Team, Faculty of Sciences and Techniques, Moulay Ismail University of Meknes, Errachidia, MoroccoIMIA Laboratory, MSIA Team, Faculty of Sciences and Techniques, Moulay Ismail University of Meknes, Errachidia, MoroccoHigher School of Technology, Cadi Ayyad University, MoroccoDepartment of Computer Science, College of Computer, Qassim University, Buraydah, Saudi ArabiaDepartment of Computer Science, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi ArabiaDepartment of Computer Science and Information Systems, College of Applied Sciences, AlMaarefa University, Riyadh, Saudi ArabiaThe Internet of Things (IoT) is now present in every aspect of our daily lives because of its ability to offer remote services. Unfortunately, the insecure transmission of user data in open channels caused by this significant use of IoT networks makes it vulnerable to malicious use. Hence, the security of the user’s data is now a serious matter in an IoT environment. Since authentication may prevent hackers from recovering and using data transmitted between IoT devices, researchers have proposed many lightweight IoT authentication protocols over the past decades. Many of these protocols are built around two authentication factors. They cannot guarantee unlinkability and perfect forward secrecy, as well as withstand well-known attacks such as node capture, DOS attack, stolen verifier, Denning-Sacco attack, and GWN bypass. This paper proposes an Elliptic Curve Cryptography (ECC) -based authentication protocol that is anonymous and exploits three authentication factors to ensure all security services and withstand well-known attacks. Our provided protocol is secure and can resist known attacks, as demonstrated by both informal security analysis and formal security proof using ProVerif. Lastly, our protocol and other protocols are compared in terms of computational costs, communication costs, and security features.https://doiserbia.nb.rs/img/doi/1451-4869/2025/1451-48692502223D.pdfauthenticationiotelliptic curve cryptographymulti-factor securitybiometrics |
| spellingShingle | Dargaoui Souhayla Azrour Mourade El Allaoui Ahmad Guezzaz Azidine Alabdulatif Abdulatif Ahmad Sultan Innab Nisreen Elliptic curve cryptography and biometrics for iot authentication Serbian Journal of Electrical Engineering authentication iot elliptic curve cryptography multi-factor security biometrics |
| title | Elliptic curve cryptography and biometrics for iot authentication |
| title_full | Elliptic curve cryptography and biometrics for iot authentication |
| title_fullStr | Elliptic curve cryptography and biometrics for iot authentication |
| title_full_unstemmed | Elliptic curve cryptography and biometrics for iot authentication |
| title_short | Elliptic curve cryptography and biometrics for iot authentication |
| title_sort | elliptic curve cryptography and biometrics for iot authentication |
| topic | authentication iot elliptic curve cryptography multi-factor security biometrics |
| url | https://doiserbia.nb.rs/img/doi/1451-4869/2025/1451-48692502223D.pdf |
| work_keys_str_mv | AT dargaouisouhayla ellipticcurvecryptographyandbiometricsforiotauthentication AT azrourmourade ellipticcurvecryptographyandbiometricsforiotauthentication AT elallaouiahmad ellipticcurvecryptographyandbiometricsforiotauthentication AT guezzazazidine ellipticcurvecryptographyandbiometricsforiotauthentication AT alabdulatifabdulatif ellipticcurvecryptographyandbiometricsforiotauthentication AT ahmadsultan ellipticcurvecryptographyandbiometricsforiotauthentication AT innabnisreen ellipticcurvecryptographyandbiometricsforiotauthentication |