Elliptic curve cryptography and biometrics for iot authentication
The Internet of Things (IoT) is now present in every aspect of our daily lives because of its ability to offer remote services. Unfortunately, the insecure transmission of user data in open channels caused by this significant use of IoT networks makes it vulnerable to malicious use. Hence, the secur...
        Saved in:
      
    
          | Published in | Serbian journal of electrical engineering Vol. 22; no. 2; pp. 223 - 241 | 
|---|---|
| Main Authors | , , , , , , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
            Faculty of Technical Sciences in Cacak
    
        01.01.2025
     | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 1451-4869 2217-7183 2217-7183  | 
| DOI | 10.2298/SJEE2502223D | 
Cover
| Abstract | The Internet of Things (IoT) is now present in every aspect of our daily lives because of its ability to offer remote services. Unfortunately, the insecure transmission of user data in open channels caused by this significant use of IoT networks makes it vulnerable to malicious use. Hence, the security of the user?s data is now a serious matter in an IoT environment. Since authentication may prevent hackers from recovering and using data transmitted between IoT devices, researchers have proposed many lightweight IoT authentication protocols over the past decades. Many of these protocols are built around two authentication factors. They cannot guarantee unlinkability and perfect forward secrecy, as well as withstand well-known attacks such as node capture, DOS attack, stolen verifier, Denning-Sacco attack, and GWN bypass. This paper proposes an Elliptic Curve Cryptography (ECC) -based authentication protocol that is anonymous and exploits three authentication factors to ensure all security services and withstand well-known attacks. Our provided protocol is secure and can resist known attacks, as demonstrated by both informal security analysis and formal security proof using ProVerif. Lastly, our protocol and other protocols are compared in terms of computational costs, communication costs, and security features. | 
    
|---|---|
| AbstractList | The Internet of Things (IoT) is now present in every aspect of our daily lives because of its ability to offer remote services. Unfortunately, the insecure transmission of user data in open channels caused by this significant use of IoT networks makes it vulnerable to malicious use. Hence, the security of the user?s data is now a serious matter in an IoT environment. Since authentication may prevent hackers from recovering and using data transmitted between IoT devices, researchers have proposed many lightweight IoT authentication protocols over the past decades. Many of these protocols are built around two authentication factors. They cannot guarantee unlinkability and perfect forward secrecy, as well as withstand well-known attacks such as node capture, DOS attack, stolen verifier, Denning-Sacco attack, and GWN bypass. This paper proposes an Elliptic Curve Cryptography (ECC) -based authentication protocol that is anonymous and exploits three authentication factors to ensure all security services and withstand well-known attacks. Our provided protocol is secure and can resist known attacks, as demonstrated by both informal security analysis and formal security proof using ProVerif. Lastly, our protocol and other protocols are compared in terms of computational costs, communication costs, and security features. | 
    
| Author | El, Allaoui Ahmad, Sultan Dargaoui, Souhayla Azrour, Mourade Guezzaz, Azidine Alabdulatif, Abdulatif Innab, Nisreen  | 
    
| Author_xml | – sequence: 1 givenname: Souhayla orcidid: 0009-0006-8080-0252 surname: Dargaoui fullname: Dargaoui, Souhayla organization: IMIA Laboratory, MSIA Team, Faculty of Sciences and Techniques, Moulay Ismail University of Meknes, Errachidia, Morocco – sequence: 2 givenname: Mourade orcidid: 0000-0003-1575-8140 surname: Azrour fullname: Azrour, Mourade organization: IMIA Laboratory, MSIA Team, Faculty of Sciences and Techniques, Moulay Ismail University of Meknes, Errachidia, Morocco – sequence: 3 givenname: Allaoui orcidid: 0000-0002-8897-3565 surname: El fullname: El, Allaoui organization: IMIA Laboratory, MSIA Team, Faculty of Sciences and Techniques, Moulay Ismail University of Meknes, Errachidia, Morocco – sequence: 4 givenname: Azidine orcidid: 0000-0003-1058-5420 surname: Guezzaz fullname: Guezzaz, Azidine organization: Higher School of Technology, Cadi Ayyad University, Morocco – sequence: 5 givenname: Abdulatif orcidid: 0000-0003-0646-5872 surname: Alabdulatif fullname: Alabdulatif, Abdulatif organization: Department of Computer Science, College of Computer, Qassim University, Buraydah, Saudi Arabia – sequence: 6 givenname: Sultan orcidid: 0000-0002-3198-7974 surname: Ahmad fullname: Ahmad, Sultan organization: Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia – sequence: 7 givenname: Nisreen orcidid: 0000-0003-4412-7727 surname: Innab fullname: Innab, Nisreen organization: Department of Computer Science and Information Systems, College of Applied Sciences, AlMaarefa University, Riyadh, Saudi Arabia  | 
    
| BookMark | eNplkNtKw0AQhhepYK298wHyAEb3vMllqVErBS_U6zDZQ7slzYZNquTtjbaI4NwMDN98_PyXaNKExiJ0TfAtpXl29_pcFFRgSim7P0NTSolKFcnYBE0JFyTlmcwv0LzrdngcqagScooWRV37tvc60Yf4YRMdh7YPmwjtdkigMUnlw9720esucSEmPvQJHPqtbcYf6H1ortC5g7qz89OeofeH4m35lK5fHlfLxTrVlDCTOk1MBSIThFIptdVMGAEcK-sok5I7hx0oYNpiboUQGdeES1CKZ2NcytkMrY5eE2BXttHvIQ5lAF_-HELclBDHULUtJTdYa6xcxTmvdJbrqqLSEK7yHFiWj6706Do0LQyfUNe_QoLL7zrLbmftqU4z8jdHXsfQddG6f_jf9tkXzlB3sQ | 
    
| Cites_doi | 10.1109/GLOBECOM48099.2022.10001345 10.1016/j.sysarc.2022.102698 10.1007/978-3-031-70411-6_10 10.3390/s22187075 10.1016/j.jnca.2017.07.001 10.1016/j.comcom.2022.08.003 10.1109/SSPS.2017.8071559 10.1007/978-3-031-56292-1_38 10.1109/TIE.2016.2585081 10.1016/j.adhoc.2022.103003 10.1109/JIOT.2023.3246065 10.32604/cmc.2021.014966 10.1155/2021/5546334 10.26599/TST.2023.9010033 10.1002/dac.4139 10.1109/TII.2022.3194956 10.1016/j.neucom.2022.05.099 10.1007/978-3-031-25662-2_13 10.1109/JIOT.2022.3184293 10.1002/ett.3745 10.1016/j.ins.2015.02.010 10.32604/cmc.2024.047625 10.1016/j.iot.2021.100493 10.1016/j.micpro.2022.104722 10.1016/j.adhoc.2022.102997 10.1109/TIT.1983.1056650 10.1109/IRASET60544.2024.10548705 10.1016/j.sysarc.2022.102763 10.32604/cmc.2019.03760 10.1016/j.compeleceng.2022.108495 10.52549/ijeei.v12i1.5170 10.3390/sym14112394 10.1145/3607720.3607723 10.1016/j.comnet.2022.109077 10.1007/978-3-031-35751-0_8 10.1201/9781003587552-8 10.1155/2021/4799223 10.1016/j.oceaneng.2022.110894 10.1049/iet-net.2019.0009 10.1109/CCNC46108.2020.9045264 10.1007/s40860-020-00098-y 10.26599/TST.2023.9010032 10.1016/j.jnca.2016.10.001 10.1016/j.procs.2023.01.084 10.1201/9781003430735-1 10.1016/j.cose.2018.06.004 10.1016/j.comcom.2022.10.016 10.1016/j.dcan.2022.11.001 10.3390/s21041488 10.1371/journal.pone.0234631 10.1109/TSUSC.2017.2716953 10.1109/CCNC.2019.8651825  | 
    
| ContentType | Journal Article | 
    
| DBID | AAYXX CITATION ADTOC UNPAY DOA  | 
    
| DOI | 10.2298/SJEE2502223D | 
    
| DatabaseName | CrossRef Unpaywall for CDI: Periodical Content Unpaywall DOAJ Directory of Open Access Journals  | 
    
| DatabaseTitle | CrossRef | 
    
| DatabaseTitleList | CrossRef | 
    
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Engineering | 
    
| EISSN | 2217-7183 | 
    
| EndPage | 241 | 
    
| ExternalDocumentID | oai_doaj_org_article_64d0cc07fb444bc89cbb26d14799a389 10.2298/sjee2502223d 10_2298_SJEE2502223D  | 
    
| GroupedDBID | 53S 5VS AAYXX ABDBF ACUHS ADBBV ALMA_UNASSIGNED_HOLDINGS BCNDV CITATION ESX GROUPED_DOAJ I-F IPNFZ KQ8 MK~ OK1 P2P RIG TUS ADTOC UNPAY  | 
    
| ID | FETCH-LOGICAL-c213d-fc1dba58512266cec35d5a407ef23664ff0fa7a3ce04e55584c146a7748000243 | 
    
| IEDL.DBID | UNPAY | 
    
| ISSN | 1451-4869 2217-7183  | 
    
| IngestDate | Fri Oct 03 12:50:42 EDT 2025 Wed Oct 01 15:20:48 EDT 2025 Wed Oct 01 05:40:58 EDT 2025  | 
    
| IsDoiOpenAccess | true | 
    
| IsOpenAccess | true | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Issue | 2 | 
    
| Language | English | 
    
| License | http://creativecommons.org/licenses/by-nc-nd/4.0 cc-by-nc-nd  | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-c213d-fc1dba58512266cec35d5a407ef23664ff0fa7a3ce04e55584c146a7748000243 | 
    
| ORCID | 0000-0002-8897-3565 0009-0006-8080-0252 0000-0003-0646-5872 0000-0002-3198-7974 0000-0003-1575-8140 0000-0003-4412-7727 0000-0003-1058-5420  | 
    
| OpenAccessLink | https://proxy.k.utb.cz/login?url=http://www.doiserbia.nb.rs/ft.aspx?id=1451-48692502223D | 
    
| PageCount | 19 | 
    
| ParticipantIDs | doaj_primary_oai_doaj_org_article_64d0cc07fb444bc89cbb26d14799a389 unpaywall_primary_10_2298_sjee2502223d crossref_primary_10_2298_SJEE2502223D  | 
    
| ProviderPackageCode | CITATION AAYXX  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2025-01-01 | 
    
| PublicationDateYYYYMMDD | 2025-01-01 | 
    
| PublicationDate_xml | – month: 01 year: 2025 text: 2025-01-01 day: 01  | 
    
| PublicationDecade | 2020 | 
    
| PublicationTitle | Serbian journal of electrical engineering | 
    
| PublicationYear | 2025 | 
    
| Publisher | Faculty of Technical Sciences in Cacak | 
    
| Publisher_xml | – name: Faculty of Technical Sciences in Cacak | 
    
| References | ref13 ref12 ref15 ref14 ref53 ref52 ref11 ref10 ref54 ref17 ref16 ref19 ref18 ref51 ref50 ref46 ref45 ref48 ref47 ref42 ref41 ref44 ref43 ref49 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 ref35 ref34 ref37 ref36 ref31 ref30 ref33 ref32 ref2 ref1 ref39 ref38 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 ref29  | 
    
| References_xml | – ident: ref53 doi: 10.1109/GLOBECOM48099.2022.10001345 – ident: ref24 doi: 10.1016/j.sysarc.2022.102698 – ident: ref54 doi: 10.1007/978-3-031-70411-6_10 – ident: ref26 doi: 10.3390/s22187075 – ident: ref43 doi: 10.1016/j.jnca.2017.07.001 – ident: ref28 doi: 10.1016/j.comcom.2022.08.003 – ident: ref39 doi: 10.1109/SSPS.2017.8071559 – ident: ref5 doi: 10.1007/978-3-031-56292-1_38 – ident: ref37 doi: 10.1109/TIE.2016.2585081 – ident: ref25 doi: 10.1016/j.adhoc.2022.103003 – ident: ref12 doi: 10.1109/JIOT.2023.3246065 – ident: ref21 doi: 10.32604/cmc.2021.014966 – ident: ref35 doi: 10.1155/2021/5546334 – ident: ref8 doi: 10.26599/TST.2023.9010033 – ident: ref47 – ident: ref38 doi: 10.1002/dac.4139 – ident: ref27 doi: 10.1109/TII.2022.3194956 – ident: ref48 doi: 10.1016/j.neucom.2022.05.099 – ident: ref3 doi: 10.1007/978-3-031-25662-2_13 – ident: ref30 doi: 10.1109/JIOT.2022.3184293 – ident: ref16 doi: 10.1002/ett.3745 – ident: ref42 doi: 10.1016/j.ins.2015.02.010 – ident: ref2 doi: 10.32604/cmc.2024.047625 – ident: ref33 doi: 10.1016/j.iot.2021.100493 – ident: ref32 doi: 10.1016/j.micpro.2022.104722 – ident: ref23 doi: 10.1016/j.adhoc.2022.102997 – ident: ref46 doi: 10.1109/TIT.1983.1056650 – ident: ref11 doi: 10.1109/IRASET60544.2024.10548705 – ident: ref22 doi: 10.1016/j.sysarc.2022.102763 – ident: ref20 doi: 10.32604/cmc.2019.03760 – ident: ref31 doi: 10.1016/j.compeleceng.2022.108495 – ident: ref1 doi: 10.52549/ijeei.v12i1.5170 – ident: ref50 doi: 10.3390/sym14112394 – ident: ref7 doi: 10.1145/3607720.3607723 – ident: ref51 doi: 10.1016/j.comnet.2022.109077 – ident: ref4 doi: 10.1109/IRASET60544.2024.10548705 – ident: ref10 doi: 10.1007/978-3-031-35751-0_8 – ident: ref36 doi: 10.1201/9781003587552-8 – ident: ref49 doi: 10.1155/2021/4799223 – ident: ref52 doi: 10.1016/j.oceaneng.2022.110894 – ident: ref15 doi: 10.1049/iet-net.2019.0009 – ident: ref44 doi: 10.1109/CCNC46108.2020.9045264 – ident: ref18 doi: 10.1007/s40860-020-00098-y – ident: ref9 doi: 10.26599/TST.2023.9010032 – ident: ref41 doi: 10.1016/j.jnca.2016.10.001 – ident: ref13 doi: 10.1016/j.procs.2023.01.084 – ident: ref6 doi: 10.1201/9781003430735-1 – ident: ref45 doi: 10.1016/j.cose.2018.06.004 – ident: ref29 doi: 10.1016/j.comcom.2022.10.016 – ident: ref34 doi: 10.1016/j.dcan.2022.11.001 – ident: ref17 doi: 10.3390/s21041488 – ident: ref14 doi: 10.1371/journal.pone.0234631 – ident: ref40 doi: 10.1109/TSUSC.2017.2716953 – ident: ref19 doi: 10.1109/CCNC.2019.8651825  | 
    
| SSID | ssj0000672756 | 
    
| Score | 2.2811813 | 
    
| Snippet | The Internet of Things (IoT) is now present in every aspect of our daily lives because of its ability to offer remote services. Unfortunately, the insecure... | 
    
| SourceID | doaj unpaywall crossref  | 
    
| SourceType | Open Website Open Access Repository Index Database  | 
    
| StartPage | 223 | 
    
| SubjectTerms | authentication biometrics elliptic curve cryptography iot multi-factor security  | 
    
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEF6kF-1BfGJ9sQf1FtxsdjfZY9WWUtCLFryFfYJS0tKmSv-9s0ksEQ9evIbAhG-SmW82M98gdMUE95x5H1Eb64iliYu09CqSCrgrUbEgPgwnPz6J0YSNX_lra9VX6Amr5YFr4G4Fs8QYknrNGNMmk0ZrKmzMUikVZNsQfUkmW8VUE4ODrnk1WsShSMqErLveKZXZ7fN4MIDUH1Ljw498VMn2d9H2qpir9aeaTlu5ZriHdhuSiPv1w-2jLVccoG5LOvAQ9UOzBXzuBpvV4sNhs1jPy0Z-GqvC4mquPsjvLzHwUvw2K7EK3exF2ZzSHaHJcPByP4qadQiRoXFiI29iq1X4jQeUSRhnEm65goLMeZoIAYATr1KVGEeYCzJezEAYVMDvMlIJDx6jTjEr3AnCjCfec8qzVIOjBJOeOuMoeMaIhOi4h66_QcnntepFDtVCAC9vg9dDdwGxzT1Bq7q6AB7MGw_mf3mwh242eP-ytnx3rrFmT__D2hnaoWGFb3WKco465WLlLoBXlPqyeoW-ABFKyCs priority: 102 providerName: Directory of Open Access Journals  | 
    
| Title | Elliptic curve cryptography and biometrics for iot authentication | 
    
| URI | http://www.doiserbia.nb.rs/ft.aspx?id=1451-48692502223D https://doaj.org/article/64d0cc07fb444bc89cbb26d14799a389  | 
    
| UnpaywallVersion | publishedVersion | 
    
| Volume | 22 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2217-7183 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000672756 issn: 2217-7183 databaseCode: KQ8 dateStart: 20030101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2217-7183 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000672756 issn: 2217-7183 databaseCode: DOA dateStart: 20030101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVEBS databaseName: Academic Search Ultimate customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn eissn: 2217-7183 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000672756 issn: 2217-7183 databaseCode: ABDBF dateStart: 20101101 isFulltext: true titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn providerName: EBSCOhost  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Lb9swDCa65LD10HUvLHsEOqy7ObVlSbaPyZqgKNBiwBogOxmSLBV9wAkcZ0P360s6Tpuil_VqyBAkUuRHifwI8E0o6aXwPuBFZAKRxC4wmddBphG7hjpSoafi5NMzdTwVJzM5e7i6oKxKPMvUjeRSD0ozqJaHNC-x09KLqZAY8aQqQ8dNju3oBXSVRBDege707Ofwd1NL1I6htnIIuAO0vvE65Z3zLD1cXjnX_l48ckYNZ_8uvFyVC337V9_cbDmayWuYbcp11vkl14NVbQb231P2xueuYR_2WvDJhmtteQM7rnwLu1uUhO9gSEkcaEYss6vqj2O2ul3ULa0102XBmnp9ovVfMsS77HJeM01Z8mXd3v69h-lkfP7jOGjbLASWR3EReBsVRtPzIEIxZZ2NZSE1BnrO81gpFGTodaJj60LhiB5MWDSvGnFjGjaEhh-gU85L9xGYkLH3kss0MagASmSeO-s4StyqODRRDw42-50v1mwaOUYhJJf818l4vNmSHoxIGPdjiAO7-TCvLvL2SOVKFKG1YeKNEMLYNLPGcFVEIskyjTisB9_vRflktm0t-PS_Az_DK07tf5sbmC_QqauV-4qYpDZ96A5HR6NJv4np-6023gEYut8N | 
    
| linkProvider | Unpaywall | 
    
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1RT9swED5BeRg8bDCY1m0gP8DeUhLHdpLHAkUICYQElbqnyHZsBENplaab2K_fXZpCES_wGjmy7Dv7vjvffQewL5T0Ungf8CIygUhiF5jM6yDTiF1DHanQU3HyxaU6G4rzkRw9hy4oqxLPMnUjudO90vSq6SHNS-y09GIqJHo8qcrQcJNhO1mFNSURhHdgbXh51f_V1BK1Y6itHALuAG_feJ7yznmWHk7vnWt_L14Yo4azfwM-zMqJfvyrHx6WDM3pJxgtynXm-SW_e7Pa9Oy_1-yN713DJnxswSfrz7VlC1Zc-Rk2ligJt6FPSRx4jVhmZ9Ufx2z1OKlbWmumy4I19fpE6z9liHfZ3bhmmrLky7qN_u3A8HRwc3wWtG0WAsujuAi8jQqj6XkQoZiyzsaykBodPed5rBQKMvQ60bF1oXBEDyYsXq8acWMaNoSGX6BTjkv3FZiQsfeSyzQxqABKZJ476zhK3Ko4NFEXDhb7nU_mbBo5eiEkl_z6fDBYbEkXjkgYT2OIA7v5MK5u8_ZI5UoUobVh4o0Qwtg0s8ZwVUQiyTKNOKwLP59E-Wq2ZS349taB32GdU_vfJgLzAzp1NXO7iElqs9fq33_7Q9ym | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Elliptic+curve+cryptography+and+biometrics+for+iot+authentication&rft.jtitle=Serbian+journal+of+electrical+engineering&rft.au=Dargaoui+Souhayla&rft.au=Azrour+Mourade&rft.au=El+Allaoui+Ahmad&rft.au=Guezzaz+Azidine&rft.date=2025-01-01&rft.pub=Faculty+of+Technical+Sciences+in+Cacak&rft.issn=1451-4869&rft.eissn=2217-7183&rft.volume=22&rft.issue=2&rft.spage=223&rft.epage=241&rft_id=info:doi/10.2298%2FSJEE2502223D&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_64d0cc07fb444bc89cbb26d14799a389 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1451-4869&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1451-4869&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1451-4869&client=summon |