Abstract
The growth of the Internet of Things (IoT) has created many problems. A wise example is presented by the design of secure, efficient authentication and key agreement (AKA) protocols. A novel three-factor AKA protocol for the IoT is presented in this paper. The scheme integrates password, biometric, and device-based factors that achieved strong security, which gives anonymity to the user, achieves forward secrecy, and makes the scheme resilient to various attacks like replay, impersonation, and de-synchronization. It also adds a safe lost-password-reset functionality, which makes the protocol more usable. Security analysis proves its strength against the typical adversary, while performance evaluation shows that the solution is better than existing solutions in terms of computational and communication efficiency. The work proposes a practical and scalable security solution for IoT systems, which satisfies the high security standard but within the constraints of an IoT system.
1. Introduction
The Internet of Things (IoT) is part of the new generation of information technology. This thing–thing interconnection system forms an intelligent programme. The IoT combines massive sensor and intelligent terminal communication technology [1]. The essence of the world of things—a comprehensive perception of the environment, reliable transmission of mass data, and intelligent processing of information—makes it possible to control and manage objects. The IoT is a key engine driving economic and societal digital transformation and high-quality development, as the application scenarios extend from smart homes to industrial manufacturing, smart cities, environmental monitoring, intelligent healthcare, and other critical fields.
However, these conveniences and increased efficiencies also bring with them serious security challenges due to the rapid proliferation and deep use of the IoT [2]. In this situation, reliable security systems are no longer optional, but necessary for the system to be trusted. Secure access control mechanisms that rely on reliable identity authentication play a critical role in preventing unauthorized data theft and malicious command injection.
Usually, IoT systems exhibit heavy resource asymmetry; there are powerful cloud servers and resourceful user terminals alongside a huge number of extremely resource-scarce sensor nodes. Due to limited computing power and battery life, the latter finds it difficult to bear the overhead of traditional cryptographic protocols [3]. Because of this reality, lightweight security schemes must be designed for heterogeneous environments [2]. The three-layer model (User–Gateway–Sensor Node) is an almost universally adopted model that uses the gateway as a trusted third party to offload the authentication burden. However, many existing schemes that are based on this model still suffer from serious drawbacks. Some are efficient but sacrifice security. Thus, they fail to achieve the basic properties like user anonymity, forward secrecy, and so on. Two properties should be achieved, and at the same time, they suffer from high latency. Other schemes, while achieving these security properties, suffer from other attacks such as gateway bypass, node capture, etc. [4].
In this work, we address the above issues and propose a new authentication and key agreement protocol that is intended to be used in IoT three-layer architecture for usefulness–security trade-off. The proposed protocol integrates lightweight security provisions that enable it to efficiently run on devices with limited resources without compromising the security strength required for sensitive applications, unlike existing schemes. It also provides a password reset and recovery system that is useful when users forget their passwords.
The principal contributions of this work can be summarized as follows:
- We present a mutual authentication and key agreement scheme that facilitates the establishment of a secure session by the user with the sensor node through the gateway, significantly reducing their overhead on sensor nodes.
- We can show by both formal and informal security analysis that the suggested protocol can withstand replay, impersonation, de-synchronization attacks, and user anonymity; forward secrecy is guaranteed in this scheme.
- In comparison with state-of-the-art schemes, the protocol has overall advantages regarding security attributes and performance metrics. Due to its low communication and computational overhead, it is suitable for large-scale resource-constrained IoT environments.
- A secure password-reset procedure is designed to handle user scenarios in case they forget their passwords. Moreover, the usability and robustness of the protocol have been enhanced for actual deployments.
The remainder of this paper is organized as follows: Section 2 reviews related work on IoT authentication protocols. Section 3 introduces the system model, threat assumptions, and cryptographic foundations. Section 4 elaborates on the detailed steps of the proposed protocol. Security analysis and performance evaluation are conducted in Section 5 and Section 6, respectively. Finally, Section 7 concludes the paper and outlines future research directions.
2. Related Work
From a methodological perspective, existing authentication protocols for WSN systems can be broadly categorized into two-factor authentication and three-factor AKA designs, depending on their assumed security scope and guaranteed properties. In this work, we focus on three-factor AKA protocols that operate under comparable system models and security objectives, including (i) explicit session key agreement for subsequent secure communications, (ii) design for a user–gateway–sensor architecture, where the gateway supports resource-constrained sensor nodes, and (iii) practical usability features such as secure credential update or recovery mechanisms. For instance, Yu et al. proposed a relevant prior two-factor authentication protocol with formal verification [5]. While such schemes constitute important early contributions, they do not target a comparable security scope to three-factor AKA protocols—e.g., they do not provide explicit session key agreement, PUF-based device binding, forgotten-password recovery, or resilience against desynchronization attacks. Therefore, as these two-factor schemes are not designed for the three-factor AKA setting (password, smart card, and biometrics), we exclude them from the set of baseline schemes in our security and performance evaluations to maintain fairness, consistency of underlying assumptions, and comparability of results. The baseline inclusion criteria are summarized in Appendix A.
In recent years, research on Authentication and Key Agreement (AKA) protocols for the Internet of Things (IoT) and Wireless Sensor Networks (WSN) has predominantly focused on lightweight three-factor designs, hardware-based root-of-trust mechanisms (e.g., Physical Unclonable Functions, PUFs), and formal security verification under strong adversarial models. Central to these efforts is the use of lightweight cryptographic techniques that facilitate the tightly coupled derivation of session keys from password, device, and biometric factors. Additionally, the incorporation of dynamic identities and the use of one-time random numbers have become key strategies for achieving a balance between high security and low computational overhead in resource-constrained devices. The security of these protocols is typically proven using formal methods, such as BAN logic, AVISPA, and ProVerif, which help mitigate security risks and ensure the robustness of the underlying protocol design [6,7,8,9].
The effort of Sahoo et al. in three-factor authentication with ECC [6] provides a bidirectional authentication scheme with dynamic identities, thus achieving low communication overhead and optimized sensor load. The proposed scheme of Sahoo et al. is useful for 5G WSNs and IoT systems that need to support high concurrency and low latency. Security proofs are according to the Random oracle model. Huang [7] suggested an ECC-based three-factor AKA scheme for general WSNs, which was shown to be secure against impersonation, and session-specific, stolen-verifier, and replay attacks as proven through BAN logic and ProVerif. Moreover, it was shown to be resistant to other attacks. Vinoth et al. [8] introduced a multifactor authentication scheme in the industrial IoT space, which allows using multiple devices to access the IoT environment. After a detailed analysis performed by Sun [10], it was found that it was vulnerable to impersonation, replay, and desynchronization attacks. Following this, the authors modified their existing protocol. Likewise, multi-gateway WSNs and hierarchical gateway architectures have also inspired the proposed techniques for improved cross-domain roaming, high availability, and efficient communication. These methods feature optimizations to balance the number of communication rounds and the load on edge nodes [11]. Moreover, various works tried to reduce the computational cost of ECC by using non-traditional number-theoretic foundations. One three-factor protocol based on Chebyshev chaotic mappings has been proposed, with security proofs in the RoR and BAN models emphasizing the freshness of the session [12].
To achieve noise robustness and privacy protection, biometrics are embedded into authentication protocols. The use of fuzzy extractors and auxiliary data is at the heart of this application, which transforms unstable biometric templates into stable key shares that contribute to session key generation. This mechanism effectively reduces the chance of linkability and template leakage, which are important security concerns in three-factor authentication schemes. When it comes to privacy-sensitive applications like healthcare, they include other mechanisms like honey lists and controlled disclosure to strike a balance between anonymity and accountability, enabling features like local password updates and resilient recovery from device loss. The use of hardware-based trust models is also on the rise. This is especially true when it comes to PUFs integrated into AKA protocols. PUFs offer a key material and a physically unclonable identity that is generated from the random microvariations that transpired during device manufacturing. This is very useful against device cloning, physical capture, and side-channel attacks. It also functions well in a hostile environment. In the IoMT and in medical WSNs, PUFs have been embedded into a three-factor AKA protocol, where CRPs bind session keys with its unique hardware feature. Thus, they are able to greatly reduce the risk of static keys being stored and device replication. These solutions also focus on tackling key optimization problems such as CRP management, environmental robustness, and error correction to make PUF-based solutions applicable in ultra-low-power devices [13,14,15,16].
Continued systematic cryptanalysis and iterative enhancement of existing protocols are critical directions for improving the security of AKA protocols. The analysis by Kumar et al. [17] on various three-factor schemes showed that substantial loss of smart card security is possible with offline password guessing attacks, insider attacks, and de-synchronization attacks. As per their findings, they proposed a modified version of the protocol, which had security proofs and performance evaluations in the random oracle model. The following studies have strengthened these protocols with a focus on user anonymity, unlinkability, device-side state, key rotation, and other important aspects. These improvements give complete security against adversaries who can make use of session key leaks and temporary secrets [10,18].
3. Preliminaries
3.1. System Model
The Internet of Things authentication system model has three main participants, which are the user, the gateway node, and the sensor node. By rationally partitioning functions, this model resolves conflicts between the resource constraints and security requirements for IoT [19].
The user is the ultimate requestor of data, initiating data access requests to sensor nodes with devices such as mobile terminals. Sensor nodes undertake the collection of environmental data and are usually constrained by resources; in particular, limited computation capability, memory capacity, and energy availability. The gateway node is the system’s safe central core of the system. Having processing power far superior to sensor nodes, the gateway node takes care of the registration of both users and sensor nodes. In addition, it helps the user and sensor node achieve mutual authentication and secure communication.
Under the model, the user needs to authenticate with the sensor node before starting their communication. The authentication process encompasses an offline registration phase, wherein the user and the sensor node provide their registration details to the gateway node separately. This gateway generates and securely delivers initial authentication credentials for the devices. When a user initiates an access request, they first submit their authentication information to the gateway. Once verified by the gateway, it helps mutually authenticate the user and the target sensor node. The successful authentication not only verifies the legitimacy of the communicating parties, but also enables the user and sensor node to negotiate a temporary session key. This session key keeps any following data transmissions private and unaltered. The authentication process of this model is shown in Figure 1.
Figure 1.
System model.
The primary advantage of this model lies in the rationality of its architectural design. The gateway node, acting as a trusted intermediary, does the heavy lifting of the authentication process, while the very resource-constrained sensor nodes are only tasked with simple computations. This division of labor satisfies the low power consumption requirements of IoT terminals while also enabling reliable identity authentication and key agreement, thus providing a practical and feasible security foundation for large-scale IoT applications [20].
3.2. Adversary Model
To precisely evaluate the security of the authentication protocol, it is essential to explicitly define the adversary’s capabilities, thereby establishing a formal adversary model. Although the Dolev-Yao model [21] serves as a standard for such analysis, stricter assumptions regarding the adversary’s power are necessary to address emerging threats like side-channel attacks [22]. Accordingly, we define an adversary with the following capabilities:
- The adversary can perform offline exhaustive attacks on the user identity space and the weak password space.
- The adversary can extract sensitive information stored in entities such as smart cards via means like side-channel analysis.
- The adversary has full control over the public channel, meaning they can eavesdrop on, intercept, tamper with, replay, or block any message in transit.
- When evaluating an n-factor authentication protocol, it is assumed that the adversary has compromised n-1 authentication factors. This assumption is used solely to assess the protocol’s robustness under partial credential leakage, and it does not imply that the smart cards, passwords, or biometrics are always considered unprotected during normal operation.
- The adversary may have obtained a temporary session key from a past session through other means. For evaluating forward secrecy, it is assumed that the adversary has obtained the long-term private key(s) of one or more parties.
3.3. Fuzzy Extractor (FE)
Intra-class noise refers to the natural variations in the biometric signature of the same user. Fuzzy extractors are meant to remove this noise, such that a biometric input that is nearly the same can produce the exact same output. Its operational principle consists of two core phases:
- The Generation function : This function takes the user’s initial biometric template as input. It generates a secret output and a public auxiliary data .
- The Reproduction function : This function takes a new biometric sample , and public auxiliary data as input during the subsequent verification. As long as is close enough to the original , the function can reproduce the same secret output which means that the biometric reading can tolerate minor variations.
3.4. Physical Unclonable Function (PUF)
A Physical Unclonable Function, often referred to as a PUF, is a security mechanism that employs distinct and unavoidable microscopic physical variations that occur during semiconductor fabrication, giving every physical entity a unique digital fingerprint. Usually integrated in integrated circuits, PUF is a physically observable unconventional response generated by the intrinsic physical characteristics when stimulated by an input challenge signal, denoted as . The response to this challenge is determined by the internal physical structure of the chip. It gives the chip a very high degree of uniqueness and randomness. This results in chips made in the same batch having a unique PUF response. The fact that these devices do not rely on any specific secure storage makes them ideal for lightweight action, as performed in the case of IoT sensor nodes for the purposes of device authentication and key derivation.
4. Proposed Scheme
The proposed protocol primarily comprises the following phases: initialization, user registration, sensor node registration, and authentication login. In addition, auxiliary phases for forgotten password reset and password/biometric update are designed. For ease of reading, the main symbols used in the proposed protocol are summarized in Appendix B.
4.1. Initialization Phase
The gateway establishes two tables in its secure memory: for storing sensor node parameters and for user credentials. then selects a system master key , specifies a symmetric encryption scheme , and designates cryptographic hash functions and , where is reserved for fuzzy verification on the user side.
4.2. User Registration Phase
Figure 2 illustrates the user registration process, with the specific steps as follows:
Figure 2.
User registration phase.
- 1.
- The user selects the identity and the password , and collects biometric information . selects a random number , and computes , , , and , then transmits the registration information to the gateway node via a secure channel. The secure channel during the registration phase can be realized through practical means, such as an out-of-band channel, pre-shared credentials during device provisioning, or physical access at deployment time.
- 2.
- Upon receiving the user registration information, verifies whether exists in . If a match is found, rejects the registration request. Otherwise, selects two random numbers a and b, assigns and , sets , and computes , , and . then inserts the tuple into . Finally, writes to a smart card and sends it to through a secure channel.
- 3.
- Upon receiving the registration response, randomly selects a polynomial of degree and computes . Subsequently, chooses N security questions with corresponding answers , selects N distinct points on the polynomial , and computes secret shares for each point. Finally, initializes a state flag as and stores in .
Notably, the number of security questions N should be selected by balancing security strength and usability in practical IoT deployments. A small value of N reduces user burden but may weaken resistance against guessing or social engineering attacks, while an excessively large N increases cognitive load and degrades user experience, especially for long-lived or frequently accessed IoT systems. In typical scenarios, we recommend choosing N in the range of 4 to 6, which provides sufficient entropy for secure password recovery while maintaining acceptable usability.
4.3. Sensor Node Registration Phase
The sensor node selects the identity and a challenge , generates a random number , and computes . Using the PUF function, it generates the response . Subsequently, transmits and to the gateway . checks whether duplicates any record in the database. If no duplicates are found, it computes , stores and , and transmits back to . Upon receiving , calculates and stores and . The process of sensor node registration is shown in Figure 3.
Figure 3.
Sensor node registration phase.
4.4. Authentication Phase
During the authentication phase, messages are exchanged among the user, the gateway node, and the sensor node. To prevent replay attacks, upon receiving a message, the receiving entity is required to follow the Common Message Acceptance Rule (CMAR). For any received authentication message carrying a timestamp , the receiver performs described as follows:
- 1.
- Freshness: check ; otherwise reject.
- 2.
- Anti-replay (strict ordering): maintain a lightweight last-accepted timestamp record for the sender and reject if .
- 3.
- Authentication: verify the message-specific authenticator.
- 4.
- Upon successful verification, update ; otherwise reject. The record is updated only after successful authentication and is initialized to 0.
The process during the authentication phase is shown in Figure 4, and the specific steps are as follows:
Figure 4.
Authentication phase (all receivers additionally apply the common message acceptance rule for freshness and replay prevention).
- 1.
- inserts into a terminal and enters , , and provides biometric input . computes values , , , , , and , then verifies whether equals the stored value . If the verification fails, terminates the session. Otherwise, it checks the state flag. If , computes and updates . Subsequently, selects the identity of the target sensor node to be accessed, generates a random number , acquires the current timestamp , and computes values , , and . Finally, sends the message to .
- 2.
- Upon receiving the user login request, processes it according to the common message acceptance rule (CMAR) described above. Then, searches the for a pair and operates according to the following rules:
- If a pair exists where , retrieves the corresponding and , computes values , , , , and , and verifies whether equals . If the check fails, terminates the session and rejects the login request. Otherwise, performs the reassignments , , and .
- If a pair exists where , retrieves the corresponding and , computes values , , , and , and verifies whether equals . If the check fails, terminates the session and rejects the login request.
- If no pair exists where either or , terminates the session and rejects the login request.
After completing the aforementioned operations, acquires a new timestamp and queries using to retrieve the corresponding and . then computes and , and subsequently transmits the message to the sensor node . - 3.
- Upon receiving the message from , first processes it according to the common message acceptance rule (CMAR) described above. Subsequently, computes values , , and , and subsequently verifies whether equals . If the verification fails, the session is terminated. If successful, generates a new random number , acquires a fresh timestamp , and computes values , , , and . Finally, transmits the response message back to .
- 4.
- Upon receipt of the message from , processes it according to the common message acceptance rule (CMAR) described above. then computes and , and checks whether the locally computed equals the received . If not, terminates the session. Otherwise, acquires a new timestamp and computes and . Finally, transmits the response message back to .
- 5.
- Following the receipt of the authentication response, processes it according to the common message acceptance rule (CMAR) described above. Subsequently, computes and . If the equivalence is confirmed, the mutual authentication is deemed successful and a session key is established. To conclude the process, assigns and resets .
4.5. Forgotten Password Reset Phase
If user forgets his password , initiates the reset process by entering the identity , providing the biometric , and inserting the smart card . then sequentially submits the answers to the N security questions. Following this, computes and . Upon correct response to all N security questions, successfully reconstructs the polynomial , computes , and executes operations and . Subsequently, enters a new password , computes , , , and , and finally updates by overwriting the existing , , and with new values , , and .
4.6. Password/Biometrics Update Phase
inserts into the terminal and enters and , and provides biometric . executes a verification algorithm to authenticate ’s identity, consistent with the process described in the login and authentication phase. If the verification is successful, then inputs a new password , provides a new biometric , and computes values , , , , and . Subsequently, randomly selects a new private polynomial, of degree , chooses N new security questions with corresponding answers , selects N distinct points on the polynomial , and computes secret shares for each point. Furthermore, updates the by overwriting the existing stored data with these newly computed values.
5. Security Analysis
5.1. Correctness Verification
To formally verify the correctness of the authentication protocol, we employ BAN logic [23], which was introduced by Burrows, Abadi, and Needham in 1989. BAN logic is widely adopted in the analysis of authentication and key agreement protocols for IoT and wireless sensor networks due to its clear abstraction of authentication beliefs, message freshness, and key establishment goals. Its interpretability makes it particularly suitable for reasoning about mutual authentication and session key agreement in resource-constrained IoT environments. This logic characterizes authentication goals using modal operators, and its associated formal notation and rules provide the foundational methodology for protocol verification, as specified in Table 1. These definitions are generic and not specific to the proposed scheme.
Table 1.
Standard BAN logic notations and inference rules.
The verification process commences with the idealization of the protocol messages and the postulation of initial assumptions. Following this, the authentication goals are formalized. The process concludes with the application of logical inference rules to satisfy all defined goals. The corresponding details for the idealization, assumptions/goals, and derivations are provided in Table 2, Table 3, and Table 4, respectively.
Table 2.
Idealized forms.
Table 3.
Assumptions and goals.
Table 4.
Analysis based on BAN logic.
5.2. Informal Security Analysis
We demonstrate that the proposed protocol has critical security features and demonstrates resilience against a range of well-known attacks.
5.2.1. Anonymity and Untraceability
During the login and authentication phase, an adversary may intercept messages transmitted over public channels among the user, the gateway node, and sensor nodes. However, in the proposed protocol, none of the messages generated throughout this phase contain the user’s identity identifier . Consequently, the attacker cannot obtain any identity-related information, thus ensuring the anonymity of the user. Furthermore, the pseudo-identity is updated after each session, and random numbers and are regenerated randomly per session. Thus, for the same user, the information transmitted over the public channel differs between sessions, making it infeasible for an adversary to determine whether two distinct sessions originate from the same user. As a result, the proposed protocol also achieves untraceability of the user.
5.2.2. Mutual Authentication
The formal verification results using BAN logic indicate that the user and the sensor node are convinced of the authenticity of each other and the session key. This result provably verifies that the proposed protocol successfully achieves mutual authentication.
5.2.3. Session Key Agreement
According to the protocol description, the user and the sensor node collaboratively establish a session key during the authentication phase, which will be used for their subsequent secure communication.
5.2.4. Perfect Forward Secrecy
Assume that an attacker accidentally captures ’s long-term private key , the nonce , ’s long-term private key , and ’s long-term private key , in addition to intercepting previously transmitted information over the public channel. In the proposed protocol, the session key is calculated as , where the session key is determined by the nonce of the current session. However, is updated via a hash function after each session. As a result, even if the attacker obtains the current , the one-way nature of the hash function prevents them from deriving the nonce from previous sessions, thus making it impossible to compute past session keys. Therefore, the proposed protocol ensures forward security effectively.
5.2.5. N-Factor Security
In this subsection, we analyze a worst-case scenario in which the adversary compromises authentication factors, including the smart card via side-channel attacks, to evaluate the robustness of the proposed three-factor design. Among the three security factors considered in the protocol, the password is cryptographically weaker than the smart card and the biometric. Consider a scenario in which an adversary obtains the smart card (extracting its data through a side-channel attack) and also steals the user’s biometric. The adversary could then attempt to guess the identity and password , and calculate , , , , and . Due to the fuzzy verification mechanism, there are approximately 10,000 candidate pairs that can satisfy the verification condition. Distinguishing the correct credentials from this set would require the adversary to perform about 10,000 online login attempts, which is computationally prohibitive. Moreover, such a high volume of attempts can be easily detected and blocked by .
5.2.6. Forgotten Password Reset
The proposed protocol incorporates a secure forgotten password recovery function. A user who has forgotten their password can regain access only by correctly providing their identities, biometrics, and correct answers to all security questions. Successful verification of these factors allows the reconstruction of the polynomial and grants the authorization to reset the password.
5.2.7. Resistance Against Man-in-the-Middle (MITM) Attack
The analysis of the Man-in-the-Middle (MITM) attack relies on the results derived from BAN logic (as discussed in Section 4), which formalizes the mutual authentication process in the proposed protocol. This analysis demonstrates that the protocol can effectively prevent MITM attacks by ensuring that both the user and sensor node authenticate each other through a secure session establishment process.
5.2.8. Resistance Against Replay Attack
Each authentication message (–) carries a timestamp and includes a hash-based authenticator (, , and ), so any modification will be detected. In addition to the freshness check , the protocol adopts the common message acceptance rule (CMAR): each receiver maintains a lightweight last-accepted timestamp record for its peer and rejects any message with a non-increasing timestamp (i.e., ). The last-accepted record is updated only after successful authentication. Therefore, any replay of – will be detected and rejected, even if replayed within . Consequently, replay attacks are effectively prevented.
5.2.9. Resist Known Session-Specific Temporary Information Attack
and successfully negotiate and establish a session key . Even if an adversary obtains the temporary random numbers and from the current session, the correct session key cannot be calculated without knowing the long-term secret of . Therefore, the proposed protocol is resistant to known session-specific temporary information attacks.
5.2.10. Resistance Against De-Synchronization Attack
To effectively resist de-synchronization attacks, it is crucial to maintain synchronization between and , particularly for the pseudo-identity and . The proposed protocol incorporates a on the side and stores the last two pseudo-identifiers ( and ) for each user on the side to preserve synchronization. The mechanism for maintaining synchronization is explained in two attack scenarios. First, if blocks the authentication message , will update and set , while , not having received , will not update its , leading to a temporary state of de-synchronization. However, since , will not increment again in the subsequent login request. Upon receiving this request, can resynchronize by computing , thus restoring the consistency of the state. Second, if intercepts the message , completes the update of (with recording the previous value), but , not having received , cannot update . When initiates a new session, will detect that the submitted matches the stored . This identifies a de-synchronization attempt, triggering a resynchronization of and according to Step 2 of the authentication phase, which recovers protocol state consistency. In summary, through the flag mechanism and the dual pseudo-identity storage strategy, the protocol can maintain or recover synchronization between the user and the gateway even after message interception, effectively resisting de-synchronization attacks.
To ensure a fair and meaningful evaluation, we compare our protocol with four representative and recent three-factor AKA schemes that share similar system models and security objectives, while schemes operating under different authentication factors or security scopes are excluded from the comparative analysis. Table 5 compares the security properties achieved by our proposed protocol with those of four recently counterparts.
Table 5.
Comparison of security features.
6. Performance Analysis
Given that the registration phase for both the user and the sensor node is a one-time operation, and password/biometric updates are infrequent, the performance comparison focuses on the authentication phases.
6.1. Computational Performance Analysis
The computational performance comparison is based on counting the cryptographic operations executed by each entity during one complete authentication session. The following notations are used: , , , and , representing the time cost of a single hash operation, fuzzy extractor operation, PUF operation, symmetric encryption/decryption, and elliptic curve point multiplication, respectively. The time consumption for string concatenation and XOR operations is considered insignificant and is ignored. We evaluated the computational overhead following the experimental environment described by Wu et al. [13], which utilized a platform with the following specifications: an Intel(R) Core(TM) i7-13700K CPU (5.40 GHz), 32.0 GB RAM, with Windows 10 OS. The execution times for various operations are summarized in Table 6, indicating that the fuzzy extractor function requires a running time similar to that of an ECC point multiplication operation [24].
Table 6.
Computation times for operations (ms).
During the authentication phase of the scheme proposed by Wu et al. [13], the user performs six hash operations and one fuzzy extraction operation when initiating a login request. After receiving the response from the gateway node , the user further performs three hash operations. Therefore, the total computational cost at the user side consists of nine hash operations and one fuzzy extraction operation. Upon receiving the user’s login request, the executes eight hash operations, two operations, and one fuzzy extraction operation. After obtaining the response message from the sensor node , the additionally performs four hash operations. As a result, the total computational overhead at the amounts to twelve hash operations, two operations, and one fuzzy extraction operation. Meanwhile, after receiving message , the sensor node performs a total of six hash operations, one operation, and one fuzzy extraction operation.
In the authentication phase of the scheme introduced by Sahoo et al. [6], the user incurs four hash operations, one fuzzy extraction operation, one elliptic curve point multiplication, and one symmetric encryption when generating the login request. Upon receiving the reply from the gateway node , the user carries out two additional hash operations and one symmetric decryption. Hence, the overall computational burden at the user side includes six hash operations, one fuzzy extraction operation, one elliptic curve point multiplication, and two symmetric cryptographic operations. At the gateway node, four hash operations, one symmetric encryption, one symmetric decryption, and one elliptic curve point multiplication are executed upon processing the user’s login request. Subsequently, after the response from the sensor node is received, the performs two further hash operations along with one elliptic curve point multiplication. Accordingly, the cumulative computational cost at the amounts to six hash operations, two symmetric cryptographic operations, and two elliptic curve point multiplications. For the sensor node, once the message from the gateway node is obtained, the authentication procedure requires seven hash operations, two elliptic curve point multiplications, one symmetric encryption, and one symmetric decryption in total.
With respect to the authentication phase in the scheme presented by Huang et al. [7], the user executes seven hash operations, one fuzzy extraction operation, and three elliptic curve point multiplications while constructing the login request. After the feedback from the gateway node is received, the user additionally conducts ten hash operations and one elliptic curve point multiplication. Consequently, the user-side computation involves a total of seventeen hash operations, one fuzzy extraction operation, and four elliptic curve point multiplications. On the gateway side, processing the user’s login request requires ten hash operations together with one elliptic curve point multiplication. Once the response from the sensor node is obtained, the proceeds to carry out seven further hash operations and an additional elliptic curve point multiplication. Therefore, the overall computational effort at the amounts to seventeen hash operations and two elliptic curve point multiplications. From the perspective of the sensor node, upon reception of the message from the gateway node, the authentication procedure entails eight hash operations and three elliptic curve point multiplications in total.
For the authentication procedure in the scheme developed by Kumar et al. [17], the user carries out five hash operations, one fuzzy extraction operation, and two symmetric encryption operations when submitting the login request. After receiving the return message from the gateway node , the user performs two additional hash operations and two symmetric decryption operations. Accordingly, the total computational requirement at the user side consists of seven hash operations, one fuzzy extraction operation, and four symmetric cryptographic operations. At the gateway node, two symmetric encryption operations and one symmetric decryption operation are executed during the processing of the user’s login request. Following the reception of the response from the sensor node , the conducts two hash operations together with one symmetric encryption and one symmetric decryption. Hence, the aggregate computational cost incurred by the includes five hash operations and five symmetric cryptographic operations. As for the sensor node, once the message forwarded by the gateway node is received, a total of four hash operations, one symmetric encryption, and one symmetric decryption are required to complete the authentication process.
In the authentication phase of our proposed scheme, the user computes seven hash operations and one fuzzy extraction operation while initiating the login request. Upon receiving the response from the gateway node , the user further computes four hash operations. As such, the overall computational load at the user side is limited to eleven hash operations and one fuzzy extraction operation. For the gateway node, eight hash operations are required to process the user’s login request, followed by four additional hash operations after the response from the sensor node is obtained. Consequently, the total computational cost incurred by the amounts to twelve hash operations. Regarding the sensor node, after receiving the message from the gateway node, the authentication procedure involves six hash operations and one operation in total.
This comparative analysis of computational overhead, presented in Table 7, shows that our proposed protocol outperforms four recent counterparts [6,7,13,17].
Table 7.
Computational overhead comparison (ms).
6.2. Communication Performance Analysis
In this subsection, we compare the communication performance of the proposed protocol with the four protocols mentioned above. The communication performance comparison considers only the authentication messages exchanged over the public channel. The bit lengths of all parameters and message components are explicitly defined, and the total communication overhead is obtained by summing the sizes of all transmitted messages. The bit widths for the parameters in the protocol are defined as follows: random number (256 bits), hash value (256 bits), PUF challenge (128 bits), identity (128 bits), elliptic curve point (256 bits), and timestamp (32 bits). Concurrently, the output of the symmetric encryption is defined as an integer multiple of 128 bits (i.e., its block size).
In the authentication phase of the scheme proposed by Wu et al. [13], a total of four messages, namely , , , and , are transmitted among the participating entities. In these messages, , , , and denote hash values, while , , and represent timestamps. In addition, corresponds to the identity of the sensor node, and denotes the PUF challenge. The values , , , and are obtained through XOR operations, whose lengths are determined by the longer operands involved, resulting in bit-lengths of 256 bits, 512 bits, 256 bits, 256 bits and 512 bits, respectively. Consequently, the total size of the transmitted information in this scheme amounts to bits.
In the authentication phase of the scheme proposed by Sahoo et al. [6], four messages, denoted as , , , and , are exchanged during the authentication procedure. In these messages, , , , and represent hash values, whereas , , and correspond to timestamps. Moreover, denotes a point on the elliptic curve. The value is generated through a XOR operation, whose length is determined by the longer operand and is equal to 256 bits. In addition, , and are the outputs of symmetric encryption. According to the lengths of their corresponding plaintexts, the sizes of , and are 512 bits, 1024 bits and 128 bits, respectively. Consequently, the total amount of transmitted data in this scheme is bits.
In the authentication phase of the scheme proposed by Huang et al. [7], four messages, namely , , , and , are transmitted during the authentication process. In these messages, , and denote points on the elliptic curve, while , , , , and represent hash values. In addition, , , and are timestamps. The values , , , , , , and are generated through XOR operations, whose bit-lengths are determined by the longer operands involved and are equal to 512 bits, 256 bits, 256 bits, 256 bits, 256 bits, 256 bits, 256 bits and 256 bits, respectively. Consequently, the total amount of transmitted information in this scheme is bits.
In the authentication phase of the scheme proposed by Kumar et al. [17], four messages, denoted as , , and , are exchanged during the authentication process. In these messages, , , and represent timestamps, while and denote hash values. In addition, , , , and are the outputs of symmetric encryption, whose lengths are integer multiples of 128 bits. Based on the lengths of the corresponding plaintexts, the sizes of , , , and are 640 bits, 1152 bits, 1408 bits, 896 bits and 896 bits, respectively. The value is generated through a XOR operation, and its bit-length is determined by the longer operand involved, resulting in a length of 1152 bits. Consequently, the total amount of transmitted information in this scheme is bits.
During the authentication phase, the proposed protocol exchanges a total of four messages ( to ). The composition of is as follows:
- : User’s pseudo-identity, 128 bits.
- : Generated by XORing the concatenation of the random number and the sensor node’s identity with a hash value (using cyclic padding). Its length equals the sum of the bit lengths of and , i.e., 256 bits + 128 bits.
- : Hash output, 256 bits.
- : Timestamp, 32 bits.
The length of is 800 bits. The lengths of , , and are subsequently derived as 800, 800, and 672 bits, respectively. Consequently, the aggregate communication cost for the authentication phase is 3072 bits. A comparison with four recent relevant protocols, presented in Table 8, further confirms that our protocol holds an advantage in communication overhead.
Table 8.
Communication overhead comparison.
7. Discussion
The proposed protocol for three-factor authentication and key agreement seeks to resolve security and efficiency issues in the Internet of Things (IoT) environment. The protocol enables secure communication in extremely constrained settings, which are often seen in the IoT, by using lightweight cryptographic operations. The protocol enjoys a high level of security, as the integration of Physical Unclonable Functions (PUFs) for device authentication and fuzzy extractors for biometric authentication have low cost. This is essential for applications that require both safety and real-time performance in industrial IoT and healthcare systems.
This protocol also features a secure and easy-to-use password reset procedure, which is a useful solution to the problem of lost passwords in IoT systems. The reset was structured to combine biometric verification with security questions and will ensure that accounts can be reset without exposing anyone to the system. The importance of this feature significantly increases in case the user has to interact with such a device for a long time in large-scale IoT deployments.
A follow-up stage of research could include assessments of how well the protocol can operate in environments with more capable computing resources. Furthermore, integrating additional trust models, such as decentralized identities or blockchain-based authentication, could further enhance the protocol’s security and scalability in more complex IoT ecosystems.
8. Conclusions
This work proposes a new three-factor authentication and key agreement protocol for the IoT that solves security and performance problems in the resource-constrained environment. The protocol employs password, biometric and device-based authentication for enhanced security features. Furthermore, user anonymity, forward secrecy, and other attacks are resistant to it. Additionally, enabling a secure forgotten password reset feature enhances the overall user experience while maintaining a high level of security. The proposed scheme is more efficient than the existing schemes and has been shown by performance evaluations to be practical for large-scale IoT deployment.
The analysis and the comparison of performance of the protocol show that it is useful to provide reliable and scalable security services for IoT systems. Nonetheless, additional optimization of other trust models for high-capacity IoT devices can also be referenced from future works. In summary, this work provides a secure, efficient, and scalable solution that will aid in advancing the state of security in the IoT.
Author Contributions
Conceptualization, Y.Y. and K.W.; methodology, Y.Y.; software, Y.Y.; validation, Y.Y., K.W., H.L. and K.Z.; formal analysis, Y.Y. and H.L.; investigation, K.W.; resources, K.Z.; data curation, K.Z.; writing—original draft preparation, Y.Y. and H.L.; writing—review and editing, Y.Y.; visualization, Y.Y.; supervision, K.W.; project administration, K.W.; and funding acquisition, K.Z. All authors have read and agreed to the published version of the manuscript.
Funding
This work was supported by the Scientific Research Startup Fund for Shenzhen High-Caliber Personnel of SZPT, No. 6022310051K, and the Industry-University-Research Innovation Fund for Chinese Universities (No. 2023IT068).
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Data is contained within the article.
Conflicts of Interest
The authors declare no conflicts of interest.
Appendix A. Baseline Inclusion Criteria for Comparative Evaluation
To avoid unfair comparisons across fundamentally different security objectives and system assumptions, a protocol is included as a baseline in Table 5, Table 7 and Table 8 only if it satisfies all of the following criteria:
- It is explicitly formulated as an AKA protocol with a defined session key establishment objective for subsequent secure communications.
- It adopts a three-factor authentication setting (password, biometric and smart card), or an explicitly equivalent three-factor model.
- It is designed for the User–Gateway–Sensor architecture (or an explicitly comparable three-party WSN setting), where the gateway assists resource-constrained sensor nodes.
- It considers practical usability mechanisms relevant to long-lived deployments, such as secure credential update or recovery.
These criteria are introduced to ensure that the comparative evaluation focuses on protocols that share comparable goals and assumptions with our three-factor AKA design.
Appendix B. Protocol Notations
Table A1.
Notations used in the proposed protocol.
Table A1.
Notations used in the proposed protocol.
| Symbol | Description | Symbol | Description |
|---|---|---|---|
| User i | Sensor node j | ||
| Gateway node | Identity of user | ||
| Identity of sensor node | Pseudo-identity of user | ||
| Password of user | Biometric information of user | ||
| Biometric key derived from the fuzzy extractor | Public helper data for the fuzzy extractor | ||
| Long-term secret key of user | Long-term secret key of sensor node | ||
| Nonce counter associated with user | Session random numbers generated by and | ||
| Session key shared between and | Challenge input to the PUF | ||
| Response generated by the PUF | Cryptographic hash functions | ||
| GEN/REP | Fuzzy extractor generation and reproduction functions | N | Number of security questions for password recovery |
References
- Stangaciu, V.; Stangaciu, C.; Gusita, B.; Curiac, D.I. Integrating Real-Time Wireless Sensor Networks into IoT Using MQTT-SN. J. Netw. Syst. Manag. 2025, 33, 37. [Google Scholar] [CrossRef]
- Kong, L.; Tan, J.; Huang, J.; Chen, G.; Wang, S.; Jin, X.; Zeng, P.; Khan, M.; Das, S.K. Edge-computing-driven internet of things: A survey. ACM Comput. Surv. 2022, 55, 174. [Google Scholar] [CrossRef]
- Deb, P.K.; Mukherjee, A.; Singh, D.; Misra, S. Loop-the-loops: Fragmented learning over networks for constrained IoT devices. IEEE Trans. Parallel Distrib. Syst. 2022, 34, 316–327. [Google Scholar] [CrossRef]
- Alsheavi, A.N.; Hawbani, A.; Othman, W.; Wang, X.; Qaid, G.; Zhao, L.; Al-Dubai, A.; Zhi, L.; Ismail, A.; Jhaveri, R.; et al. Iot authentication protocols: Challenges, and comparative analysis. ACM Comput. Surv. 2025, 57, 116. [Google Scholar] [CrossRef]
- Yu, S.; Lee, J.; Lee, K.; Park, K.; Park, Y. Secure authentication protocol for wireless sensor networks in vehicular communications. Sensors 2018, 18, 3191. [Google Scholar] [CrossRef]
- Sahoo, S.S.; Mohanty, S.; Sahoo, K.S.; Daneshmand, M.; Gandomi, A.H. A Three-Factor-Based Authentication Scheme of 5G Wireless Sensor Networks for IoT System. IEEE Internet Things J. 2023, 10, 15087–15099. [Google Scholar] [CrossRef]
- Huang, W. ECC-based three-factor authentication and key agreement scheme for wireless sensor networks. Sci. Rep. 2024, 14, 1787. [Google Scholar] [CrossRef] [PubMed]
- Vinoth, R.; Deborah, L.J.; Vijayakumar, P.; Kumar, N. Secure multifactor authenticated key agreement scheme for industrial IoT. IEEE Internet Things J. 2020, 8, 3801–3811. [Google Scholar] [CrossRef]
- Blanchet, B. Modeling and verifying security protocols with the applied pi calculus and ProVerif. In Foundations and Trends® in Privacy and Security; Now Publishers Inc.: Hanover, MA, USA, 2016; Volume 1, pp. 1–135. [Google Scholar]
- Sun, D.Z. Security and privacy analysis of Vinoth et al.’s authenticated key agreement scheme for industrial IoT. Symmetry 2021, 13, 1952. [Google Scholar] [CrossRef]
- Guo, H.; Gao, Y.; Xu, T.; Zhang, X.; Ye, J. A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks. Ad Hoc Netw. 2019, 95, 101965. [Google Scholar] [CrossRef]
- Mo, J.; Hu, Z.; Shen, W. A provably secure three-factor authentication protocol based on chebyshev chaotic mapping for wireless sensor network. IEEE Access 2022, 10, 12137–12152. [Google Scholar] [CrossRef]
- Wu, T.Y.; Wu, H.; Kumari, S.; Chen, C.M. An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT. Peer-to-Peer Netw. Appl. 2025, 18, 83. [Google Scholar] [CrossRef]
- Herder, C.; Yu, M.D.; Koushanfar, F.; Devadas, S. Physical unclonable functions and applications: A tutorial. Proc. IEEE 2014, 102, 1126–1141. [Google Scholar] [CrossRef]
- Wang, W.; Chen, Q.; Yin, Z.; Srivastava, G.; Gadekallu, T.R.; Alsolami, F.; Su, C. Blockchain and PUF-based lightweight authentication protocol for wireless medical sensor networks. IEEE Internet Things J. 2021, 9, 8883–8891. [Google Scholar] [CrossRef]
- Mahmood, K.; Saleem, M.A.; Ghaffar, Z.; Shamshad, S.; Das, A.K.; Alenazi, M.J. Robust and efficient three-factor authentication solution for WSN-based industrial IoT deployment. Internet Things 2024, 28, 101372. [Google Scholar] [CrossRef]
- Kumar, D. Cryptanalysis and improvement of an authentication protocol for wireless sensor networks. Trans. Emerg. Telecommun. Technol. 2023, 34, e4747. [Google Scholar] [CrossRef]
- Canetti, R.; Krawczyk, H. Analysis of key-exchange protocols and their use for building secure channels. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 2001; pp. 453–474. [Google Scholar]
- Alghamdi, A.M. Design and analysis of lightweight and robust authentication protocol for securing the resource constrained IIoT environment. PLoS ONE 2025, 20, e0318064. [Google Scholar] [CrossRef]
- Emati, J.H.M.; Tchendji, V.K.; Djam-Doudou, M. Enhancing trust in machines integration with Dirichlet distribution and self-sovereign identity. Array 2025, 28, 100579. [Google Scholar] [CrossRef]
- Dolev, D.; Yao, A. On the security of public key protocols. IEEE Trans. Inf. Theory 2003, 29, 198–208. [Google Scholar] [CrossRef]
- Veyrat-Charvillon, N.; Standaert, F.X. Generic side-channel distinguishers: Improvements and limitations. In Proceedings of the Annual Cryptology Conference; Springer: Berlin/Heidelberg, Germany, 2011; pp. 354–372. [Google Scholar]
- Burrows, M.; Abadi, M.; Needham, R. A logic of authentication. ACM Trans. Comput. Syst. (TOCS) 1990, 8, 18–36. [Google Scholar] [CrossRef]
- He, D.; Kumar, N.; Lee, J.H.; Sherratt, R.S. Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Trans. Consum. Electron. 2014, 60, 30–37. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.



