Abstract
IoT-based applications require effective anonymous authentication and key agreement (AKA) protocols to secure data and protect user privacy due to open communication channels and sensitive data. While AKA protocols for these applications have been extensively studied, achieving anonymity remains a challenge. AKA schemes using one-time pseudonyms face resynchronization issues after desynchronization attacks, and the high computational overhead of bilinear pairing and public key encryption limits its applicability. Existing schemes also lack essential security features, causing issues such as vulnerability to ephemeral secret leakage attacks and key compromise impersonation. To address these issues, we propose two novel AKA schemes, PUAKA and RCAKA, designed for different IoT traffic patterns. PUAKA improves end device anonymity in the periodic update pattern by updating one-time pseudonyms with authenticated session keys. RCAKA, for the remote control pattern, ensures anonymity while reducing communication and computation costs using shared signatures and temporary random numbers. A key contribution of RCAKA is its ability to resynchronize end devices with incomplete data in the periodic update pattern, supporting continued authentication. Both protocols’ security is proven under the Real-or-Random model. The performance comparison results show that the proposed protocols exceed existing solutions in security features and communication costs while reducing computational overhead by 32% to 50%.
1. Introduction
The Internet of Things (IoT) facilitates seamless interaction between smart sensors, actuators, and servers, enabling autonomous operation without human intervention and supporting a wide range of innovative applications []. Currently, IoT-based applications are being increasingly deployed in diverse sectors such as industry, agriculture, transportation, environmental protection, healthcare, and security. In these applications, systems typically involve lightweight sensors, actuators, and more powerful servers. Sensor nodes are deployed in designated areas to periodically monitor and collect real-time data on specific events or changes in the environment and transmit them to the server for analysis and processing or to the actuator side for control. Actuators, in turn, receive data or commands that enable the operation of the instruments or devices in which they are embedded. The gateway connects various devices such as sensors and actuators through various wired or wireless means to achieve comprehensive data coverage and efficient transmission. The server is the core of the entire IoT architecture and contains functions such as device management, data visualization, and remote control to facilitate the management and monitoring of IoT devices. However, data exchanged between sensors and actuators in IoT systems typically transmit over potentially unsecured communication channels. The openness of these channels introduces significant security vulnerabilities [].
Authentication and key agreement (AKA) protocols are essential for secure IoT communications. They enable end devices to authenticate with each other, securely exchange keys, and verify the integrity of messages. These protocols also create shared session keys between end devices and servers to maintain subsequent communications []. The increasing adoption of IoT-based applications has raised significant concerns about privacy and security. Effective AKA proposals must be resistant to various attacks, including key compromise impersonation (KCI), replay, impersonation, and ephemeral secret leakage (ESL) attacks []. Furthermore, privacy issues have intensified the demand for anonymity in AKA protocols. Anonymity protects the sender’s identity, while untraceability ensures that different communications cannot be linked to the same entity. Both are essential for safeguarding user privacy in IoT environments. Elliptic Curve Cryptography (ECC) has gained popularity in IoT security because of its efficiency. With smaller key sizes, ECC provides robust security while minimizing computational overhead, storage needs, and bandwidth usage—key advantages for resource-constrained IoT devices. Therefore, designing efficient and secure ECC-based anonymous AKA protocols is essential to improve the security and robustness of IoT-based systems.
Recent efforts have aimed to address security concerns in the ECC-based anonymous AKA protocol for IoT-based applications. In 2016, Tsai et al. [] presented an anonymous AKA scheme with ECC bilinear pairing for smart grids. However, the protocol has high computational overhead for bilinear pairing and lacks message integrity. He et al. [] subsequently improved the Tsai et al. protocol to reduce computational and communication costs, but it lacks anonymity and remains vulnerable to ESL attacks. In 2018, Odelu et al. [] demonstrated that the scheme [] cannot withstand ESL attacks and proposed an alternative based on bilinear pairing. However, the alternative cannot cope with ESL attacks and does not provide message integrity or anonymity. Saeed et al. [] introduced an AKA scheme for secure IoT communication between end devices and cloud servers, which offers verification of data integrity, but it is still subject to ESL attacks and does not provide anonymity. In 2020, Garg et al. [] presented an AKA solution for smart grids that uses fully halved Menezes–Qu–Vanstone for participant authentication. However, Chaudhry et al. [] later noted that this scheme is susceptible to KCI attacks and does not support anonymity or perfect forward secrecy (PFS). Chaudhry et al. [] then introduced a new protocol that uses ECC and symmetric encryption for smart grids but remains vulnerable to key escrow problems and Man-in-the-Middle attacks. In 2020, Chaudhry et al. [] introduced the use of one-time pseudonyms to ensure anonymity for smart grids, but this creates challenges in synchronization. If a pseudonym is blocked or lost, the sensor cannot re-authenticate without re-registration. Similar resynchronization issues are present in the schemes of Park et al. [] and Zhang et al. []. In 2023, Hu et al. [] highlighted vulnerabilities in the scheme [], such as the non-resistance of ESL attacks and the absence of anonymity. They then presented an AKA protocol for smart meters and virtual server nodes. However, Wu et al. [] identified that the protocol [] suffers from KCI attacks and lacks untraceability. Wu et al. [] then presented an improved scheme, but it suffers from high computational overhead and susceptibility to Denial of Service (DoS) attacks. The anonymity methods used by both Hu et al. [] and Wu et al. [] lead to poor usability due to the server’s need to enumerate stored identities for verification. In 2024, Hu et al. [] introduced an anonymous AKA protocol for the IoT-based system, using temporary public key encryption to improve anonymity. Although this approach strengthens security, it significantly increases computational overhead, which poses challenges for resource-constrained IoT environments. In general, despite extensive research, achieving effective anonymity in IoT systems remains a significant challenge. Protocols using one-time pseudonyms face serious resynchronization issues after desynchronization attacks, while public key encryption and bilinear pairing introduce high computational costs. Many existing protocols also remain vulnerable to ESL and other security threats.
In contrast to traditional human-type communication applications, IoT-based systems exhibit unique traffic patterns []. Specifically, IoT communication often follows periodic update patterns and remote control patterns, where sensors send regular status updates or receive commands from the server for remote control. These patterns differ significantly from conventional human-driven communication behaviors, which are typically more dynamic and less predictable. This distinction is critical when designing AKA protocols for IoT-based applications, as traditional approaches are often designed with human communication patterns in mind, leading to inefficiencies when applied to IoT-based systems.
To address these challenges, we propose a pair of secure anonymous AKA protocols, PUAKA and RCAKA, designed specifically for different IoT traffic patterns. PUAKA is optimized for the periodic update pattern, where sensors periodically send data to the server. It uses authenticated session key parameters to update one-time pseudonymous identities, ensuring sensor anonymity with minimal communication overhead. RCAKA, on the other hand, is suited for the remote control pattern, where the server issues commands to control sensors. RCAKA uses shared signatures and temporary random numbers to maintain anonymity while minimizing computational costs. RCAKA can also resynchronize unfinished sensors in the periodic update pattern and perform authentication and session key negotiation.
The contributions of this paper are as follows:
- (1)
- We review existing ECC-based anonymous AKA schemes for IoT-based systems and identify key limitations, such as lack of resynchronization mechanisms and high computational overhead.
- (2)
- We introduce two novel AKA protocols, PUAKA and RCAKA, tailored to traffic patterns. PUAKA ensures efficient anonymous authentication in the periodic update pattern, while RCAKA supports both anonymous authentication and resynchronization in the remote control pattern.
- (3)
- We provide a formal security analysis of our proposals, demonstrating mutual authentication, anonymity, PFS, and resilience against ESL, KCI, and impersonation attacks.
- (4)
- Our protocols significantly reduce computational and communication overhead while offering more robust security features compared to existing schemes.
The paper is structured as follows: In Section 2, we describe the network model, the complexity assumptions, and the traffic patterns. The proposed schemes are introduced in Section 3. Section 4, Section 5 and Section 6 offer detailed security analysis and performance comparisons. Finally, Section 7 concludes the paper.
2. Preliminaries
2.1. Network Model
As shown in Figure 1, IoT-based application systems consist of components such as end devices, gateways, and servers []. End devices typically include sensors and actuators. Sensors are deployed in designated areas to monitor and collect real-time data on environmental changes or events at intervals set by the server. Then, these data are transmitted to servers for analysis or control of actuators. Actuators, in turn, receive data or commands to operate embedded instruments or devices. The gateway connects various devices, such as sensors and actuators, through wired or wireless methods to ensure extensive data coverage and efficient transmission. The server acts as the central hub of the IoT architecture, providing device management, data visualization, and remote control to monitor and manage IoT devices. An IoT-based application system may include multiple servers, and trust authorities (TA) act as dedicated servers for key generation, dissemination, and management. The proposed protocols involve , , and , where and , with l, m, and n representing the number of end devices, servers, and TAs, respectively.

Figure 1.
Network model.
2.2. Complexity Assumptions
Given a large prime p, an elliptical curve is chosen. The points in E, along with the identity point O, form an additive group G of order q, with P as a generator of G.
Definition 1.
Elliptic Curve Discrete Logarithm Problem (ECDLP): Given two points A and P in , the ECDLP is to find the positive integer x such that . The probability that an algorithm can solve the ECDLP within time t is negligible for a sufficiently small ϵ, and is given by
Definition 2.
Elliptic Curve Computational Diffie–Hellman Problem (ECDHP): Given three points, , and in , computing is considered computationally infeasible. The probability that an algorithm can solve this problem within time t is negligible for a sufficiently small ϵ, and is given by
2.3. IoT Traffic Pattern
Nikaein et al. [] analyzed the functions of most applications and identified the traffic patterns listed below.
- (1)
- Periodic update: sensors and actuators send updated status reports, such as smart meter readings (e.g., gas, electricity, water), to the server periodically at intervals configured by the server.
- (2)
- Remote control: The server sends commands to the sensors and actuators to control them remotely, such as remotely starting or stopping smart home devices.
- (3)
- Event driven: The sensor sends real-time emergency messages to the server when a parameter exceeds a threshold and a given phenomenon occurs, such as a fire or tsunami.
- In the event-driven pattern, participants must share symmetric keys in advance to ensure timely data transmission as soon as an event occurs. In this paper, we focus on periodic update and remote control patterns.
3. Proposed Scheme
This section provides an overview of the proposed schemes, covering initialization, registration, authentication, and key agreement. The processes of PUAKA and RCAKA are described in the authentication phase. By default, RCAKA runs in remote control mode, by setting . If RCAKA runs in periodic update mode for resynchronization, is set. Table 1 shows some symbols of the proposed schemes.

Table 1.
Notations.
3.1. Initialization
The TA follows these processes to initialize the system:
- T1:
- The TA chooses a curve with a base point P, and the additive group G of order q.
- T2:
- The TA chooses two one-way hash functions:
- -
- , which is used to generate the hash values and the verifier.
- -
- , which is used to generate the one-time pseudonym identity.
- T3:
- Finally, the TA loads the parameters , along with their own identifier, onto each server and end device.
3.2. Registration
The end device and the server register with the TA as follows:
- R1:
- selects a random , computes , and transmits the registration request to the TA through a secure channel. Likewise, selects , computes , and sends to the TA.
- R2:
- The TA chooses a random for with a valid identifier and calculates the public key and the one-time pseudonym identity for the S. Similarly, the TA selects for and computes .
- R3:
- The TA stores and . Then, the TA transmits to and to securely.
- R4:
- Once the response is received, computes as its private key and checks if . If true, the S computes the signature shared with the SP and stores .
- Similarly, the SP computes , , and . Then, the SP initializes the pattern of RCAKA, . Finally, the SP stores . When a blocked or new end device, , registers, the TA delivers to through secure channels.
Remark 1.
Signatures and are equal, where .
3.3. Authentication and Key Agreement
The PUAKA and RCAKA authentication and key agreement processes between and are described in this subsection.
3.3.1. PUAKA
PUAKA is designed for the periodic update pattern, as illustrated in Figure 2, using authenticated session key parameters to update one-time pseudonym identities.

Figure 2.
Processes of PUAKA.
- PA1:
- First, selects a random nonce , computes , and generates its verifier . Finally, sends the authentication request to .
- PA2:
- In response, first checks the received to identify the sender. If is not recognized, the session is terminated. Next, verifies the completeness of and the effectiveness of by confirming that is valid. If this verification fails, aborts.
- PA3:
- Then, selects a random nonce , computes , and derives the session key . The session key is then computed as . updates the pseudonym identity of S as and calculates its verifier . Finally, sends the reply message to .
- PA4:
- Upon receiving the response, computes the session key and updates the pseudonym identity as . then verifies the equivalence . If the check is satisfied, derives the session key , updates with , and completes the authentication and session key agreement.
3.3.2. RCAKA
RCAKA is designed for the remote control pattern, as depicted in Figure 3. During the execution of PUAKA, if the one-time pseudo-identity synchronization fails or messages are blocked during authentication, scheduled data updates may not be completed within the configured intervals. In such cases, the server can resynchronize the end devices using RCAKA to finalize the authentication and the session key agreement.

Figure 3.
Processes of RCAKA.
- RA1:
- First, generates a random nonce and a timestamp . Next, computes .If the type is , selects another random and constructs a new pseudonym identity for the client S as . Subsequently, masks by computing , where is a shared secret between and . Furthermore, computes the verifier . Finally, sends the resynchronization and authentication request message to .If the type is not , calculates a verifier and sends the authentication request message to .
- RA2:
- When receiving , first verifies the freshness of . Next, if , de-masks , then checks . If the condition is satisfied, updates with . Otherwise, verifies if . If it is not satisfied, will terminate.
- RA3:
- begins by selecting a random nonce and generating a timestamp . Secondly, calculates and derives the session key . The session key is used to compute . Next, masks its identity using . Afterward, computes its verifier as . Finally, sends the reply message to .
- RA4:
- Upon receiving , first confirms the freshness of . Then, calculates the session key and recovers by de-masking using . Next, computes the session key . Finally, verifies the equivalence of the verifier: . If the condition does not hold, the session is terminated.
4. Formal Security Proof
Taking PUAKA as an example, this section discusses its security using the ROR model [].
4.1. Participant
In the PUAKA protocol, there are two main participants: an end device S and a server . Each participant might involve a number of oracles involved in individual parallel implementations of PUAKA. Each oracle is represented as for the end device and for the server, where . A general oracle is denoted as . The messages exchanged by oracle I define its session identifier, denoted as .
An oracle can be in one of three potential states:
- Accept: An oracle I reaches state when it receives the latest expected protocol message.
- Reject: If the oracle accepts an incorrect message, it enters the reject state.
- ⊥: If I does not receive any response, then it switches to the state ⊥.
4.2. Adversary Model
Under the eCK adversary model [], controls the public channels. In addition, can learn the secrets of and . interacts with the oracles through the following queries []:
- (1)
- : can obtain the messages from and from .
- (2)
- : transmits a message to I and receives a response according to the PUAKA protocol.
- (3)
- : has the ability to compromise I and retrieve its long-term secrets.
- (4)
- : The session key owned by I can be obtained by .
- (5)
- : The ephemeral secrets of I can be acquired by .
- (6)
- : The output of a randomized hash for a given message m can be obtained for .
- (7)
- : This query is designed to define the semantic security of the session key. If no session key of I is defined, the query returns ⊥. Otherwise, a private coin d is flipped. If , the actual session key is returned to ; otherwise, a random value of the same size is returned. The objective of the adversary is to distinguish between the real session key and a random one.
- (8)
- : The session key held by I will be deleted by this query.
: A session is considered fresh if neither the session itself nor its associated partner session has been revealed. If the adversary issues any of the following queries before invoking , the session is considered exposed, even if it has not yet been fully established: , , or . Once a session is exposed, it is regarded as locally exposed.
Partner: and will be considered partners if they meet the following conditions: both must reach the accept state, both oracles must be fresh, and they must share the same session identifier and mutually authenticate and agree on the session key.
Definition 3.
Under the adversarial model of eCK, an AKA scheme is considered semantically secure if for a sufficiently small ϵ.
4.3. Formal Security Analysis
Theorem 1.
Assuming that the semantic security of PUAKA is to be broken, can execute a maximum of queries, queries, and queries in time t. In light of a hash length of l, has the advantage that
Proof.
For the proof below, a set of six games is defined. When successfully predicts the bit d returned by the query, event appears in each corresponding game.
: The ROR model simulates an actual attack in this game. Therefore, the advantage is given by
: can retrieve all messages via the query, including and . Afterward, is able to validate the validity of the computed session keys and with the and queries. and do not allow inferring with the session key. Therefore, it is infeasible to distinguish between the actual attack and the game . Thus,
Additionally, three lists are used to track the relevant outcomes:
: This list contains the tuples of <input, output> for all queries.
: This list stores the responses to queries issued by the adversary .
: This list records the tuples of <input, output> for all Execute queries.
: This game models the scenario where is capable of forging messages that could be accepted via Send and queries. The semantic security of PUAKA is only threatened when has detected collisions and successfully sends a valid message. According to the birthday paradox, the collision probability in the output is bounded by . The collision probability of random numbers is bounded by . Consequently, unless such collisions occur, it is impossible to distinguish between and . Therefore,
: This game simulates the scenario where manages to deduce certain parameters and forge messages and without using random oracles. Additional operations are introduced in the queries for . If there is a validation failure, the queries will terminate.
- (1)
- For , if , the probability is at most .
- (2)
- For , if , the probability is at most .
If these checks are considered, and are indistinguishable. Thus,
: This game simulates the corruption capacity of . cannot determine or unless it captures or . There are four possible cases where can use execute and queries to compute the session keys:
- (1)
- obtains both long-term private keys, and , by issuing and queries. Then, attempts to obtain information about and via queries. The attack probability is at most .
- (2)
- issues and , then obtains and . Afterward, attempts to retrieve information about and via queries. The attack probability is at most .
- (3)
- issues and , then obtains and . It then attempts to retrieve information about and via queries. The attack probability is at most .
- (4)
- issues and , then obtains and . then attempts to retrieve information about and via queries. The attack probability is at most .
In all cases, cannot compute or except if it resolves the ECDL or ECD problems in time t. Thus,
: The simulation of is identical to that of , with the exception that the query halts if makes an query. The maximum probability that successfully obtains is bounded by . Therefore,
Unless provides the correct input for the query, it will not be able to distinguish between the actual session key and the randomized session key. Hence, the probability is
Considering all probabilities together, we can conclude that Theorem 1 holds. □
5. Descriptive Security Analysis
5.1. Anonymity
In the PUAKA protocol, the one-time pseudo-identity is updated using the temporary public key . This guarantees the anonymity and untraceability of the end device. Similarly, in the RCAKA protocol, the identity is masked with the authenticated session key , ensuring the same level of anonymity and untraceability.
5.2. Perfect Forward Secrecy
A protocol prevents an adversary from accessing the keys of the previous session, thus ensuring perfect forward secrecy, even if long-term secrets are later compromised. The session key , where is derived from the long-term secret values and ephemeral parameters. Even if an adversary gains access to the long-term secrets , and , it cannot compute the session key . This is because does not have access to the ephemeral values and required for the derivation of the session key.
5.3. Ephemeral Secret Leakage Attack Resistance
As shown in the above subsection, , where . If gains access to ephemeral secrets and , it cannot yet determine because it lacks long-term keys and .
5.4. No Key Escrow Problem
After registration, the end device S receives its long-term private key . Only the TA generates the partial key , ensuring that there is no key escrow problem. The process for the SP is analogous.
5.5. IoT Node Capture Attack Resistance
In the event of a capture of an IoT node, can extract long-term credentials such as . However, since each device has unique credentials, the session key between the compromised device and the associated server is the only part at risk. The security of other session keys remains intact between uncompromised devices and servers.
5.6. Key Compromise Impersonation Attack Resistance
Although has acquired long-term secrets for the end device, it is not possible for it to impersonate the server to perform authentication with the end device. The reason for this is that the shared secret for S is calculated as , where and . The values and are random values generated for the session and are critical for calculating the session key. Even with the credentials of S, cannot reconstruct these random values. Without them, cannot compute the correct session key , and therefore cannot complete the authentication process with S or impersonate .
5.7. Impersonation Attack Resistance
In the case of S-impersonation attacks, the adversary lacks long-term secrets, including , and . As a result, it cannot generate the authentication request message , which contains . Without this information, the adversary cannot impersonate S. Similarly, the adversary is also unable to impersonate due to the unavailability of the required secrets.
5.8. Man-in-the-Middle Attack Resistance
During authentication, the SP authenticates the S by checking whether , and the S authenticates the SP by checking the equivalence of , where are the shared signatures between the S and SP, which are only known to the SP and S. In other words, the scheme is resistant to Man-in-the-Middle attacks.
6. Performance Comparison
This section provides a comparison of the computational and communication costs, as well as the security and functional attributes, of the proposed protocols with those of other existing schemes, including [,,,].
6.1. Computation Cost
We assume that , , and denote the runtime of hash computation, point addition, and point multiplication, respectively. The tests were carried out on a server equipped with an Intel Core i5 2.0 GHz processor and 16 GB of RAM running macOS 13.4.1. When using the Curve25519 elliptic curve with a point length of 384 bits and a prime modulus , the average runtime for each operation was as follows: 0.005 ms for hashing, 0.006 ms for point addition, and 1.258 ms for point multiplication. The end device nodes used a Raspberry Pi 3 Model B+ board with an ARM Cortex-A53 1.4 GHz processor and 1 GB of RAM. Under the same test conditions, the measured average runtime was 0.019 ms for hashing, 0.025 ms for point addition, and 2.225 ms for point multiplication.
As illustrated in Table 2, the PUAKA protocol demonstrates the lowest computational overhead for both authentication and key agreement operations. Compared with existing related works, the proposed schemes achieve a significant reduction in computational overhead, with reductions ranging from to . This considerable improvement in efficiency underscores the effectiveness of the proposed approach in optimizing performance, especially in resource-constrained environments where minimizing computational costs is essential to ensure scalability and responsiveness in IoT systems.

Table 2.
Computation cost.
6.2. Communication Cost
Let G, H, , R, and denote the lengths of the ECC point, hash output, identity, random number, and timestamp, respectively. Based on the length of communication overheads in studies [,,], these lengths are 384 bits, 128 bits, 64 bits, 128 bits, and 32 bits, respectively. According to Table 3, the proposed solutions significantly reduce communication costs by optimizing message exchange patterns and minimizing the volume of transmitted data. As a result, the proposed schemes achieve the lowest communication overhead when compared to related studies, further improving their suitability for deployment in resource-constrained IoT environments, where reducing communication burden is crucial to improve overall system performance and ensuring faster authentication.

Table 3.
Communication cost.
6.3. Performance Comparison
As demonstrated in Table 4, the proposed protocol stands out as more prominent compared to the related protocols [,,,]. The proposed schemes not only offer superior security features, but also provide a range of additional functional attributes that make them more adaptable and efficient in real-world IoT applications.

Table 4.
Performance comparison.
7. Conclusions
We reviewed related ECC-based anonymous AKA schemes for IoT and identified several key limitations. First, anonymous authentication using one-time pseudo-identities suffers from desynchronization attacks because of the absence of resynchronization mechanisms. Second, schemes based on public key cryptography, while offering anonymity, often result in increased computational overhead. In addition, existing solutions fail to address critical security issues, such as vulnerability to ESL and KCI attacks. To address these issues, we propose two secure ECC-based anonymous AKA protocols tailored to IoT traffic patterns: PUAKA and RCAKA. PUAKA operates using a periodic update pattern and leverages one-time anonymous identities to maintain end device anonymity. These identities are refreshed with authenticated session key parameters, reducing communication overhead compared to existing schemes. In contrast, RCAKA follows a remote control pattern, employing shared signatures and temporary random numbers to ensure anonymity while minimizing both communication and computational costs. RCAKA also includes a resynchronization mechanism to update sensors that have not yet completed their data updates, allowing secure authentication and key agreement during the session. Both protocols have been formally analyzed to ensure anonymity and PFS and are secure against attacks such as impersonation, KCI, and ESL. Performance comparison results indicate that the proposed schemes excel in security features and communication costs, reducing computational overhead by 32% to 50% compared to existing schemes.
ECC-based authentication schemes have been regarded as classical security protocols, with increasing concerns about their efficiency, particularly in light of emerging side-channel and quantum-based attacks. Although ECC continues to be widely used in IoT infrastructures, it faces vulnerabilities to these advanced attacks, such as those demonstrated by the Downfall and Inception side-channel attacks, as well as potential risks from quantum computing. Given these concerns, the adoption of recent quantum resistant cryptographic protocols, such as CRYSTALS-Kyber for general encryption and CRYSTALS-Dilithium, FALCON, and SPHINCS+ for digital signatures, represents an important direction for the future of secure authentication schemes. Although our study focuses primarily on ECC-based solutions due to their current efficiency in resource-constrained IoT environments, we recognize the need to incorporate quantum-resistant protocols as part of ongoing and future research efforts to address emerging security threats.
Author Contributions
Conceptualization, S.H.; methodology, S.H.; software, S.H.; validation, S.H.; formal analysis, S.H.; investigation, S.H. and L.C.; resources, S.H.; data curation, S.H.; writing—original draft preparation, S.H.; writing—review and editing, S.H., Y.Z., Y.G., Y.C. and L.C.; visualization, S.H.; supervision, S.H. and L.C.; project administration, S.H., Y.C. and L.C.; funding acquisition, S.H. and L.C. All authors have read and agreed to the published version of the manuscript.
Funding
This work was supported in part by National Natural Science Foundation of China (grant 62302324); in part by the Sichuan Province Science and Technology Support Program (grants 2024NSFSC0500 and 2024YFHZ0023); in part by the Fundamental Research Funds for the Central Universities (grant YJ202420).
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
The raw data supporting the conclusions of this article will be made available by the authors on request.
Conflicts of Interest
The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.
Abbreviations
The following abbreviations are used in this manuscript:
IoT | Internet of Things |
AKA | Authentication and key agreement |
TA | Trusted authority |
DoS | Denial of Service |
ECC | Elliptic Curve Cryptography |
WBAN | Wireless body area networks |
WSN | Wireless sensor networks |
SG | Smart grid |
PFS | Perfect forward security |
KCI | Key compromise impersonation |
ESL | Ephemeral secret leakage |
References
- Al-Fuqaha, A.I.; Guizani, M.H.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
- Vangala, A.; Das, A.K.; Mitra, A.; Das, S.K.; Park, Y. Blockchain-Enabled Authenticated Key Agreement Scheme for Mobile Vehicles-Assisted Precision Agricultural IoT Networks. IEEE Trans. Inf. Forensics Secur. 2023, 18, 904–919. [Google Scholar] [CrossRef]
- Zhang, Q.; Wu, J.; Zhong, H.; He, D.; Cui, J. Efficient Anonymous Authentication Based on Physically Unclonable Function in Industrial Internet of Things. IEEE Trans. Inf. Forensics Secur. 2023, 18, 233–247. [Google Scholar] [CrossRef]
- Wang, D.; Wang, P. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound. IEEE Trans. Dependable Secur. Comput. 2018, 15, 708–722. [Google Scholar] [CrossRef]
- Tsai, J.L.; Lo, N.W. Secure Anonymous Key Distribution Scheme for Smart Grid. IEEE Trans. Smart Grid 2016, 7, 906–914. [Google Scholar] [CrossRef]
- He, D.; Zeadally, S.; Kumar, N.; Lee, J.H. Anonymous Authentication for Wireless Body Area Networks with Provable Security. IEEE Syst. J. 2017, 11, 2590–2601. [Google Scholar] [CrossRef]
- Odelu, V.; Das, A.K.; Wazid, M.; Conti, M. Provably Secure Authenticated Key Agreement Scheme for Smart Grid. IEEE Trans. Smart Grid 2018, 9, 1900–1910. [Google Scholar] [CrossRef]
- Saeed, M.; Liu, Q.Y.; Tian, G.Y.; Gao, B.; Li, F. AKAIoTs: Authenticated key agreement for Internet of Things. Wirel. Netw. 2019, 25, 3081–3101. [Google Scholar] [CrossRef]
- Garg, S.; Kaur, K.; Kaddoum, G.; Rodrigues, J.J.P.C.; Guizani, M. Secure and Lightweight Authentication Scheme for Smart Metering Infrastructure in Smart Grid. IEEE Trans. Ind. Inform. 2020, 16, 3548–3557. [Google Scholar] [CrossRef]
- Chaudhry, S.A.; Nebhan, J.; Yahya, K.; Al-Turjman, F. A Privacy Enhanced Authentication Scheme for Securing Smart Grid Infrastructure. IEEE Trans. Ind. Inform. 2022, 18, 5000–5006. [Google Scholar] [CrossRef]
- Chaudhry, S.A.; Yahya, K.; Garg, S.; Kaddoum, G.; Hassan, M.M.; Zikria, Y.B. LAS-SG: An Elliptic Curve-Based Lightweight Authentication Scheme for Smart Grid Environments. IEEE Trans. Ind. Inform. 2023, 19, 1504–1511. [Google Scholar] [CrossRef]
- Park, K.; Lee, J.; Das, A.K.; Park, Y. BPPS: Blockchain-Enabled Privacy-Preserving Scheme for Demand-Response Management in Smart Grid Environments. IEEE Trans. Dependable Secur. Comput. 2023, 20, 1719–1729. [Google Scholar] [CrossRef]
- Zhang, Y.; Chen, J.; Huang, B.; Peng, C. An Efficient Password Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography. Inf. Technol. Control 2014, 43, 390–401. [Google Scholar] [CrossRef][Green Version]
- Hu, S.; Chen, Y.; Zheng, Y.; Xing, B.; Li, Y.; Zhang, L.; Chen, L. Provably Secure ECC-Based Authentication and Key Agreement Scheme for Advanced Metering Infrastructure in the Smart Grid. IEEE Trans. Ind. Inform. 2023, 19, 5985–5994. [Google Scholar] [CrossRef]
- Wu, Y.; Guo, H.; Han, Y.; Li, S.; Liu, J. A Security-Enhanced Authentication and Key Agreement Protocol in Smart Grid. IEEE Trans. Ind. Inform. 2024, 20, 11449–11457. [Google Scholar] [CrossRef]
- Hu, S.; Jiang, S.; Miao, Q.; Yang, F.; Zhou, W.; Duan, P. Provably secure ECC-based anonymous authentication and key Agreement for IoT. Appl. Sci. 2024, 14, 3187. [Google Scholar] [CrossRef]
- Nikaein, N.; Laner, M.; Zhou, K.; Svoboda, P.; Drajic, D.; Popovic, M.; Krco, S. Simple Traffic Modeling Framework for Machine Type Communication. In Proceedings of the ISWCS 2013—The Tenth International Symposium on Wireless Communication Systems, Ilmenau, Germany, 27–30 August 2013; VDE: Offenbach, Germany, 2013. [Google Scholar]
- Wang, C.; Wang, D.; Duan, Y.; Tao, X. Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things. IEEE Trans. Inf. Forensics Secur. 2023, 18, 2961–2976. [Google Scholar] [CrossRef]
- Wu, F.; Xu, L.; Li, X.; Kumari, S.; Karuppiah, M.; Obaidat, M.S. A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography. IEEE Syst. J. 2019, 13, 2830–2838. [Google Scholar] [CrossRef]
- LaMacchia, B.; Lauter, K.; Mityagin, A. Stronger Security of Authenticated Key Exchange. In International Conference on Provable Security; Susilo, W., Liu, J.K., Mu, Y., Eds.; Springer: Berlin/Heidelberg, Germany, 2007; pp. 1–16. [Google Scholar]
- Yang, Z.; He, J.; Tian, Y.; Zhou, J. Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things. IEEE Trans. Ind. Inform. 2020, 16, 6584–6596. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).