Next Article in Journal
An Adaptive Signal Denoising Method Based on Reweighted SVD for the Fault Diagnosis of Rolling Bearings
Previous Article in Journal
Using Optical Coherence Tomography in Plant Biology Research: Review and Prospects
Previous Article in Special Issue
A Review of the Authentication Techniques for Internet of Things Devices in Smart Cities: Opportunities, Challenges, and Future Directions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Integration of OWL Password-Authenticated Key Exchange Protocol to Enhance IoT Application Protocols

by
Yair Rivera Julio
1,*,
Angel Pinto Mangones
2,*,
Juan Torres Tovio
2,
María Clara Gómez-Álvarez
3 and
Dixon Salcedo
4
1
Department of Computer Science, Coporación Universitaria Americana, Barranquilla 08001, Colombia
2
Department of Computer Science, Universidad del Sinú, Montería 230001, Colombia
3
Departamento de Ciencias de la Computación y la Decisión, Facultad de Minas, Universidad Nacional Sede Medellín, Medellín P.O. Box 3840, Colombia
4
Computer Science and Electronic Department, Universidad de la Costa CUC, Barranquilla 080002, Colombia
*
Authors to whom correspondence should be addressed.
Sensors 2025, 25(8), 2468; https://doi.org/10.3390/s25082468
Submission received: 18 February 2025 / Revised: 2 April 2025 / Accepted: 10 April 2025 / Published: 14 April 2025
(This article belongs to the Special Issue Advanced IoT Systems in Smart Cities: 2nd Edition)

Abstract

:
The rapid expansion of the IoT has led to increasing concerns about security, particularly in the early stages of communication where many IoT application-layer protocols, such as CoAP and MQTT, lack native support for secure key exchange. This absence exposes IoT systems to critical vulnerabilities, including dictionary attacks, session hijacking, and MitM threats, especially in resource-constrained environments. To address this challenge, this paper proposes the integration of OWL, a password-authenticated key exchange (PAKE) protocol, into existing IoT communication frameworks. OWL introduces a lightweight and secure mechanism for establishing high-entropy session keys from low-entropy credentials, without reliance on complex certificate infrastructures. Its one-round exchange model and resistance to both passive and active attacks make it particularly well-suited for constrained devices and dynamic network topologies. The originality of the proposal lies in embedding OWL directly into protocols like CoAP, enabling secure session establishment as a native feature rather than as an auxiliary security layer. Experimental results and formal analysis indicate that OWL achieves reduced authentication latency and lower computational overhead, while enhancing scalability, resilience, and protocol performance. The proposed solution provides an innovative, practical, and efficient framework for securing IoT communications from the foundational protocol level.

1. Introduction

The rapid proliferation of IoT technologies is transforming modern infrastructures across multiple domains, including smart homes, healthcare, industrial automation, and smart cities. This accelerated growth in connectivity fosters continuous data exchange between heterogeneous devices, enabling advanced automation, monitoring, and control capabilities. However, this dynamic and distributed ecosystem introduces complex challenges related to cybersecurity, privacy, and the integrity of communications, particularly due to the inherent resource constraints of IoT devices, which often operate with limited processing power, memory, and energy [1,2].
Although traditional security protocols remain robust in conventional computing environments, they frequently prove inadequate within IoT contexts. Their computational complexity, reliance on centralized certificate infrastructures, and configuration overhead hinder applicability in networks composed of low-power devices. Furthermore, the diversity of hardware and software platforms in IoT ecosystems complicates the deployment of uniform security solutions, thereby necessitating flexible, lightweight, and scalable approaches capable of adapting to varying operational requirements while maintaining strong guarantees of confidentiality, integrity, and authentication.
A particularly critical security gap is evident during the initial stages of communication, where key exchange and session establishment take place. Widely adopted IoT application-layer protocols, such as the Constrained Application Protocol (CoAP) and Message Queuing Telemetry Transport (MQTT), do not natively include secure key exchange mechanisms. Instead, these protocols rely on transport-layer solutions like Datagram Transport Layer Security (DTLS) or Transport Layer Security (TLS) to provide protection. Although effective in traditional networks, such frameworks often impose excessive computational load, increase handshake latency, and complicate certificate management in IoT deployments, ultimately degrading performance and exposing systems to threats such as dictionary attacks, replay attacks, and MitM intrusions, particularly in dynamic or intermittently connected environments.
To address key exchange limitations in constrained IoT environments, this work integrates OWL, a one-round Password-Authenticated Key Exchange (PAKE) protocol, into the application communication stack. The protocol enables high-entropy session key generation based on low-entropy credentials through lightweight cryptographic operations and zero-knowledge proofs (ZKPs). Its architecture eliminates reliance on certificate-based infrastructures, thereby reducing complexity and computational load. The one-message exchange structure minimizes handshake overhead and latency, making the protocol particularly well-suited for resource-constrained and intermittently connected IoT scenarios [3].
This work presents the integration of the OWL protocol within the CoAP stack to enable native support for secure key exchange in constrained environments while maintaining compatibility with existing IoT standards.This solution enhances security at the application layer, simplifies provisioning and session management, and reduces the attack surface during authentication phases. Furthermore, the proposed integration ensures forward secrecy and resilience against common attack vectors without incurring the computational burden typically associated with traditional methods.
This approach aims to establish a lightweight, scalable, and secure foundation for IoT communications. By embedding strong authentication and key exchange mechanisms directly within the application protocol, the OWL-CoAP integration transitions security from an auxiliary component to a core design principle, addressing a critical requirement in modern IoT architecture. Accordingly, the structure of this article is organized as follows: Section 2 provides a comprehensive review of existing IoT security protocols, highlighting their limitations and the evolution of cryptographic approaches such as PAKE schemes. Section 3 outlines the criteria for selecting suitable IoT protocols for OWL integration, analyzing trade-offs related to efficiency, scalability, and security. Section 4 details the architecture of the OWL-CoAP integration, describing its components, communication flow, and provisioning strategies. Section 5 explores how OWL enhances entropy generation and session key establishment within CoAP, supported by formal mathematical formulations and cryptographic techniques. Section 6 presents the experimental design, performance metrics, and comparative evaluation of OWL-CoAP against DTLS-X.509 and CoAP-PSK implementations. Section 7 discusses the implications of the results, deployment considerations, and outstanding challenges. Finally, Section 8 concludes the article by summarizing the main contributions and identifying potential future research directions to strengthen secure communication in IoT environments.

2. State of the Art

Security within the IoT ecosystem is undergoing a paradigm shift, driven by the incorporation of advanced cryptographic mechanisms that address emerging threats in critical domains such as remote healthcare and autonomous urban infrastructures. The continuous evolution and refinement of foundational protocols—namely, MQTT and CoAP—have been instrumental in this transformation, facilitating the integration of security as a core architectural element rather than as a subsequent enhancement. Notably, MQTT has demonstrated considerable progress by incorporating authentication and encryption enhancements essential in contexts where operational efficiency and robust security must coexist seamlessly. These security improvements not only fortify systems against unauthorized access and cyber threats but also foster greater confidence in the deployment of IoT technologies in applications critical to societal welfare [4].
MQTT’s advancements in IoT security epitomize the ongoing evolution of cryptographic practices tailored to increasingly complex and heterogeneous networks. Confronted with the challenge of securing vast and dispersed infrastructures, MQTT has adopted sophisticated cryptographic frameworks capable of accommodating the demands of modern IoT deployments. Furthermore, innovations in session management and token- or certificate-based authentication mechanisms have elevated the security posture of IoT applications. Collectively, these developments position MQTT not only as an efficient communication protocol but also as a secure conduit for transmitting sensitive data within mission-critical contexts [5].
In parallel, CoAP has emerged as a key player in securing large-scale IoT deployments through its integration with DTLS. A defining feature of these protocols is their adaptability, enabling deployment across diverse scenarios ranging from residential networks to complex industrial systems. Security strategies employed by protocols such as Zigbee (utilizing AES encryption and shared keys), LoRaWAN, and Sigfox (tailored for low-bandwidth environments) illustrate how application-specific constraints influence protocol design. These protocols reinforce not only data confidentiality but also the association and access control phases, thereby improving resistance to unauthorized network access [6].
Within the framework of Industry 4.0, the incorporation of built-in security mechanisms into long-range industrial sensor network protocols is particularly critical. Zigbee has augmented its architecture with dynamic key renewal capabilities, offering resilience against prolonged attacks while remaining adaptive to evolving threat landscapes. Conversely, LoRaWAN employs unique per-device application keys, facilitating personalized encryption schemes that enhance node-level security. These initiatives reflect a dual strategy—reactive and proactive—intended to maintain network robustness while ensuring long-term scalability and adaptability. Integrating these cryptographic features into the core protocol design highlights the necessity of a resilient and flexible security foundation essential for sustaining industrial IoT operations [7].
The convergence of communication technologies such as NB-IoT, CAT-LTE, and LTE-M marks a significant advancement in IoT security, especially in scenarios requiring expansive coverage and reliable connectivity. NB-IoT stands out as a solution optimized for wide-area, low-bandwidth applications, relying on 3GPP-standard encryption to maintain secure communications in cellular networks. This makes it particularly effective for deployments in public infrastructure monitoring and precision agriculture [8].
In contrast, CAT-LTE addresses the need for high data throughput while maintaining energy efficiency, meeting the security requirements of high-stakes applications such as automotive systems and telemedicine. LTE-M further extends the capabilities of cellular IoT by supporting mobility and voice services, making it suitable for applications like vehicular tracking and real-time logistics. Its design prioritizes low latency and uninterrupted communication, supported by native cryptographic standards that uphold the integrity of transmitted data [9].
Across these diverse protocol landscapes, security is consistently embedded as a foundational element rather than a retrofitted feature. The deployment of modern encryption algorithms and dynamic key management protocols serves as a bulwark against contemporary threats while promoting the scalability of IoT infrastructures. These protocol-level security enhancements demonstrate a strategic, forward-looking approach that ensures not only immediate protection but also adaptability to future vulnerabilities in an increasingly interconnected digital ecosystem [10,11].
At the forefront of secure IoT communication, innovative cryptographic constructs such as J-PAKE, OPAQUE, and OWL represent significant progress in the development of secure, efficient authentication mechanisms tailored to constrained environments. Designed to satisfy current requirements and remain adaptable to future demands, these protocols mark a paradigm shift in the design of lightweight yet secure key exchange frameworks [12].
J-PAKE and OPAQUE offer robust privacy-preserving authentication techniques. J-PAKE, leveraging ZKPs, eliminates the need for transmitting sensitive secret keys, thereby preserving confidentiality even in untrusted channels. OPAQUE reinforces credential protection during the authentication process, ensuring that sensitive information remains secure even under adversarial conditions [13].
Among these, OWL emerges as a highly promising protocol in the PAKE domain, offering mutual authentication based on low-entropy passwords, a critical requirement in low-resource devices. OWL distinguishes itself through its capacity to derive high-entropy keys from minimal password input, achieving secure authentication without incurring the high computational cost characteristic of asymmetric schemes such as RSA. This efficiency renders OWL particularly attractive for resource-limited IoT environments.
Building on these attributes, the subsequent comparative table presents a structured evaluation of principal PAKE protocols, outlining their technical strengths, limitations, and key features. Special emphasis is placed on metrics such as efficiency, scalability, and compatibility with elliptic curve cryptography (ECC), factors of heightened importance in resource-constrained IoT scenarios. This comprehensive overview is intended to serve as a strategic reference for selecting the most appropriate PAKE protocol in accordance with specific application requirements and security objectives. Refer to Table 1.
OWL provides an efficient alternative in critical scenarios by using a simpler, less demanding symmetric encryption protocol like PAKE, enhancing IoT protocol robustness, and leading new standards. Its implementation improves proactive defenses and adapts to new vulnerabilities, making these protocols central to the next generation of IoT systems, securing diverse environments, from smart cities to industrial setups. As shown in Table 2, OWL’s approach to key exchange stands out compared to other IoT security protocols, particularly those that lack native mechanisms for establishing secure sessions. By addressing these gaps, OWL enhances authentication, scalability, and overall resilience in constrained environments, providing a lightweight but robust security solution for modern IoT deployments.

3. Integration Criteria for IoT Protocols in the OWL Protocol

The selection of a suitable protocol for integration with OWL is guided by the evaluation of the following essential criteria:
  • Operational Efficiency and Resource Requirements: Prefer a protocol that requires low computational complexity and is efficient in resource management, especially in IoT environments with devices with limited capabilities.
  • Security and Encryption Handling: The protocol’s ability to integrate robust security measures without complex reconfigurations, using mechanisms such as TLS or DTLS to ensure the protection of transmitted data.
  • Adaptability and Scalability: The protocol’s ability to handle a large number of devices and adapt to the expansion and dynamic needs of physical medium access and the IoT environment.
Now, the careful selection of protocols such as MQTT, CoAP, Zigbee, LoRa, BLE, Z-Wave, NB-IoT, LTE-M, and Sigfox for integration with advanced systems like OWL is extensively justified by their strategic adaptation to the specific demands of the IoT industry. These protocols not only stand out for their unique capabilities, but are also aligned with emerging trends and critical requirements for robustness, efficiency, and security in various industrial sectors. This alignment ensures that integration with systems like OWL is not only technically and functionally sound but also strategically advantageous, maximizing the return on investment and ensuring scalability and security in complex and evolving IoT environments.

3.1. MQTT

Inefficiencies in Integration: Although MQTT effectively manages real-time communications, its dependence on TCP/IP and the need to handle security in multiple layers through TLS may complicate its integration with systems like OWL that require flexibility in intermittent or dynamic networks. Furthermore, the centralized broker architecture can be a bottleneck and a single point of failure, which is not ideal in critical applications requiring high availability and distributed security [38].

3.2. CoAP

Challenges for Integration: CoAP does not natively define specific methods for session key exchange. Instead, CoAP can be configured to use transport-level security via DTLS or apply additional security layers such as digital certificates or preshared keys. DTLS supports various key exchange mechanisms, including RSA, ECC (Elliptic Curve Cryptography), and PSK (Pre-Shared Keys) [39].

3.3. Zigbee and LoRa

Redundancy and Complexity: The robust security implementation in Zigbee and LoRa, especially AES encryption and network management specific to mesh and LPWAN, may not require the advanced authentication features offered by OWL, leading to redundancy that could unnecessarily complicate the existing link-layer infrastructure without providing proportional benefits. This could result in additional complexity and resource overhead without clear benefits [40,41].

3.4. BLE and Z-Wave

Limited Security Enhancement: Since BLE and Z-Wave already have effective security mechanisms for their short-range applications and personal devices, integration with OWL may not provide significant improvements. BLE employs a pairing process that includes key exchange to establish an encrypted connection. This is performed through various pairing methods such as Just Works, Passkey Entry, and Out-of-Band (OOB). Regarding Z-Wave, in its Z-Wave S2 version, it includes measures to ensure that only verified and authenticated devices can join the network, using a process called DSK (Device Specific Key) to confirm the identity of the devices during inclusion [42,43].

3.5. NB-IoT and LTE-M

Redundancy in Security Layers: These protocols use robust security layers provided by cellular network operators, including the use of a SIM card for authentication, specifically designed to meet telecommunications standards. The integration of OWL could duplicate these security layers, adding complexity without a proportional increase in protection or functionality, which is inefficient, especially in terms of energy consumption and network management [44].

3.6. Sigfox

Communication Limitations: Sigfox’s architecture, oriented towards unidirectional or limited bidirectional transmission of small amounts of data, makes integration with OWL practically unfeasible. OWL, designed for secure and dynamic authentications, would require a richer bidirectional interaction that Sigfox simply cannot efficiently support [45].
The diversity in the design of IoT protocols reflects the specificity of each for certain operational environments, from energy efficiency to geographical extension. Ideally, OWL integration should enrich existing capabilities without overburdening systems with superfluous technical complexities. This evaluation indicates that, while several protocols could benefit from integration with OWL in theory, CoAP stands out as the most optimal candidate. CoAP not only has an architecture that effectively supports OWL’s signaling but also facilitates registration and efficient management of nodes through its middleware. This protocol, characterized by its lightweight and efficient nature, and its advanced security implementation through DTLS, positions it as an ideal complement to OWL, especially in IoT applications requiring agile and robust security management [45].

3.7. Complementarity of OWL and CoAP

Orientation towards IoT: Both OWL and CoAP are designed for IoT environments. OWL provides a secure authentication and key-establishing mechanism, while CoAP offers a lightweight application layer protocol for communication between IoT devices with limited resources. Enhanced security: Integrating OWL with CoAP could significantly enhance security in communication between IoT devices. OWL can securely handle key exchange and authentication, while CoAP, especially when combined with DTLS or OSCORE, ensures that data in transit is secured at the application or transport layer. Interoperability: Using OWL for authentication and key exchange and CoAP for regular communication between devices, the strengths of both protocols can be leveraged, thus maximizing interoperability within a diverse IoT environment.

3.8. Integration Considerations

Security Implementation: It is crucial to correctly implement security mechanisms in both protocols. For example, ensuring that the key exchange performed by OWL and data communication through CoAP are protected against external attacks. Resource Management: Although both protocols are designed to be efficient in resource usage, integration must carefully manage system resource consumption to avoid overloading IoT devices with limited capabilities. Configuration and Management: The configuration of the integration between OWL and CoAP should be managed in a way that simplifies both initial implementation and long-term management, including the update and renewal of the key and security certificate. Rigorous Testing: It is essential to conduct thorough testing to ensure that integration is not only secure but also stable and capable of handling anticipated use scenarios without failures.

4. Integration of the OWL Protocol with CoAP: Architecture, Criteria, and Secure Provisioning

The exponential growth of the IoT has led to significant challenges in designing security mechanisms that balance robust protection with the limited resources of constrained devices. OWL, a password-authenticated key-exchange (PAKE) protocol, addresses these challenges by establishing high-entropy session keys from low-entropy credentials. This section unifies two core aspects of OWL’s adoption in IoT contexts: the criteria for selecting and integrating IoT protocols with OWL, and the corresponding architecture for OWL-CoAP implementation with secure provisioning.
Integration Criteria and Protocol Selection. The following criteria guide the integration of OWL into IoT protocols:
  • Operational Efficiency and Resource Requirements: Favor protocols that minimize computational overhead and are compatible with low-power or memory-constrained devices.
  • Security and Encryption Handling: Ensure robust security features without extensive reconfiguration or overly complex certificate management. Lightweight solutions such as DTLS with pre-shared keys or raw public keys typically align with these demands.
  • Adaptability and Scalability: Select protocols capable of handling large numbers of endpoints and capable of scaling in dynamic IoT environments.
Among the surveyed options (MQTT, Zigbee, LoRa, NB-IoT, and others), CoAP emerged as the most suitable for OWL integration. Its constrained but flexible nature, REST-oriented design, and compatibility with DTLS security align naturally with OWL’s lightweight authentication mechanism.
Overall Architecture. The OWL-CoAP integration employs an efficient key-exchange model within the CoAP ecosystem, reinforcing security without imposing excessive overhead. Table 3 summarizes the primary components in this architecture, highlighting their roles in provisioning, session management, protocol adaptation, and DTLS-based encryption.
Consolidated Communication Flow. Once OWL is integrated into a CoAP environment, four major stages define the secure communication workflow:
  • Initial Provisioning: Devices receive core cryptographic material, such as OWL-derived public keys and Access Control Lists. Identifiers are assigned to manage authentication and resource permissions effectively.
  • Session Initiation: A client starts a CoAP session by sending its identity and relevant parameters. OWL validates the client, deriving a fresh, high-entropy session key.
  • Secure Message Transmission: All subsequent CoAP messages, encapsulating requests and responses, are protected using the newly established session key. The DTLS layer ensures confidentiality and integrity, while the OWL-based session keys mitigate identity spoofing.
  • Ongoing Session Management: The session remains active as devices periodically renew keys or ACL entries. This continuous maintenance includes updating DTLS session states and OWL parameters when new devices join or existing devices leave.
By incorporating OWL into CoAP, IoT ecosystems can leverage a lightweight yet robust security model. OWL improves session authentication and key establishment without burdening constrained endpoints, while CoAP’s RESTful design and DTLS-based encryption safeguard data in transit. The synergy between these protocols simplifies rollouts across diverse IoT deployments where efficiency, scalability, and strong cryptographic guarantees are paramount.

5. Entropy Augmentation in CoAP: Enhancing Security Through Optimized Computational Efficiency

The OWL protocol introduces advanced mechanisms to enhance entropy within the CoAP ecosystem, optimizing the balance between robust security and computational efficiency. This integration is particularly crucial in IoT and resource-constrained environments, where devices operate with limited processing capabilities, but demand strong cryptographic protections to prevent unauthorized access and data breaches. In alignment with the lightweight nature of CoAP, OWL enhances its authentication and session initiation processes while minimizing computational overhead.
During the registration phase, OWL securely interacts with CoAP to establish initial trust. The user computes and transmits the derived values based on their credentials, while the server challenges the user with a zero-knowledge proof mechanism to confirm possession of the secret information without exposing it. This ensures that sensitive data remain confidential, even in constrained network conditions typical of CoAP-based deployments. In the log-in phase, the protocol verifies that the generated session key corresponds to the one derived during registration, allowing secure mutual authentication within the restricted CoAP message structure.
For password updates, the protocol incorporates enhanced security measures tailored to the lightweight requirements of CoAP. The process begins with the user initiating a password change request authenticated through current credentials. The server issues a new ZKPs-based challenge, ensuring that the user still possesses the original secret without transmitting it over the network. The user computes a new password-derived value locally, using the existing salt and cryptographic hash functions, and securely transmits it to the server. The server validates the new credentials against the existing parameters and, upon successful verification, updates its stored values while securely invalidating the old ones. This process ensures that password updates are resistant to interception, replay attacks, and computational inefficiencies [46,47].
Each of these phases, registration, login, and password updates, will be further detailed, with a focus on their interaction with CoAP and their reliance on cryptographic techniques such as hashing and ZKPs. The seamless integration of the OWL protocol with CoAP ensures a secure, efficient, and lightweight solution for authentication in constrained environments, reinforcing the integrity and confidentiality of user credentials.

5.1. OWL Registration Process with DTLS in CoAP

The OWL protocol, when integrated with DTLS, provides a robust framework for secure authentication in CoAP-based systems, particularly in IoT environments with constrained devices. During the registration process, OWL leverages cryptographic hash functions to derive intermediate values from weak passwords provided by users. The process begins by computing:
t = H ( U w ) mod q
where H is a secure hash function, U is the user identifier, and w is the password. This is followed by the following computation:
π = H ( t ) mod q
enhancing resistance to dictionary attacks. Finally, the verifier is securely stored on the server as:
T = g t mod p
These steps effectively increase the entropy of authentication parameters while maintaining compatibility with constrained devices, a critical feature of CoAP.
The interaction between the client and the server during the registration and session establishment is further secured by DTLS, which provides encryption for transmitted data and protects against eavesdropping and tampering. For example, the server generates an ephemeral private key x 3 and computes its corresponding public key:
X 3 = g x 3 mod p
To authenticate the client without exposing sensitive data, the server issues a Zero-Knowledge Proof (ZKP) challenge c, calculated as:
c = H ( g , X 3 , U ) mod q
The client responds by calculating:
r = x 3 + c · t mod q ,
allowing both parties to verify the relationship:
g r X 3 · g ( c · t ) mod p
This process ensures mutual authentication while preserving the confidentiality of private keys. See Figure 1.
In addition, OWL employs ephemeral private keys ( x 1 , x 2 , x 3 , x 4 ) and their corresponding public keys ( X 1 , X 2 , X 3 , X 4 ) to establish secure session keys. ZKPs ( π 1 , π 2 , π 3 , π 4 ) are used to verify the ownership of these keys without revealing their values. During the session key agreement phase, the value β is calculated using contributions from both the user and server keys:
β = f ( x 1 , x 2 , X 3 , X 4 ) mod q
ensuring that the derived session key reflects the input of both parties. A ZKPs associated with β , denoted as
Π β = Z K P ( β )
validates its correctness without exposing private keys.
The integration of OWL with DTLS enhances CoAP by providing secure, high-entropy session keys derived from passwords and preconfigured materials. DTLS ensures the confidentiality and integrity of transmitted data, complementing OWL’s ability to prevent identity spoofing attacks. Moreover, the lightweight operations of OWL, optimized for multiplicative groups and elliptic curves, make it particularly suitable for real-time applications in the IoT.
The transcript of all messages exchanged during a session, secured by DTLS, guarantees consistency between the client and the server, reducing the risk of communication discrepancies. This log includes key parameters such as public keys, challenges, responses, and session details, providing a comprehensive record to verify session integrity.

5.2. OWL Login Process with DTLS in CoAP

The OWL protocol, combined with DTLS, ensures robust mutual authentication and secure session establishment within CoAP-based systems. This integration is particularly advantageous in IoT environments where constrained devices require efficient yet secure communication protocols. The following outlines the main steps of the log-in process.

5.2.1. User Initialization

The user computes the following values:
t = H ( U w ) mod q
where U is the username, and w is the password.
π = H ( t ) mod q
enhances resistance to dictionary attacks.
Public keys are computed as:
X 1 = g x 1 mod p , X 2 = g x 2 mod p
based on ephemeral private keys x 1 and x 2 .
The user generates ZKPs Π 1 and Π 2 to prove ownership of x 1 and x 2 without revealing them. The user sends U , X 1 , X 2 , Π 1 , Π 2 to the server, encrypted and secured using DTLS.

5.2.2. Server Validation

The server decrypts the data using DTLS and verifies the received ZKPs Π 1 and Π 2 , ensuring X 2 1 . The server generates its own ephemeral public keys:
X 3 = g x 3 mod p , X 4 = g x 4 mod p
based on its private keys x 3 and x 4 . The server produces ZKPs Π 3 and Π 4 to prove ownership of x 3 and x 4 .
The server calculates a shared value for session key establishment:
β = ( X 1 · X 2 · X 3 ) x 4 · π mod q
and generates Π β , a ZKPs to validate β .

5.2.3. Server Sends Validation Data

The server sends S , X 3 , X 4 , Π 3 , Π 4 , Π β , β to the user over a secure DTLS channel.

5.2.4. User Validation and Key Computation

The user verifies Π 3 and Π 4 , ensuring X 4 1 . The user computes
α = ( X 1 · X 3 · X 4 ) x 2 · π mod q
K = ( β / X 2 x 2 · π ) x 2 mod q
as the session key.
h = H ( K Transcript )
where the transcript includes all messages exchanged.
r = x 1 t · h mod q
a response value based on the session hash.
The user generates Π α , a ZKPs to prove the correctness of α , and sends α , Π α , r to the server through DTLS.

5.2.5. Server Key Validation and Session Establishment

The server verifies Π α and computes
K = ( β / X 4 x 4 · π ) x 4 mod q
as the session key.
h = H ( K Transcript )
The server verifies
g r · T h X 1 ,
confirming the user response.
Both the user and the server compute
k = H ( K ) ,
the final shared session key.
The integration of DTLS into the OWL login process ensures encrypted message exchanges, further enhancing confidentiality and integrity. See Figure 2.

5.3. Password Update in the OWL Protocol with DTLS Integration

The OWL protocol provides a secure and efficient mechanism for updating user passwords while preserving the integrity of the authentication process. When integrated with DTLS in CoAP-based systems, the password update process ensures that sensitive information remains encrypted and protected throughout the update, adding an additional layer of security.

5.3.1. Password Update Process

User Operations:
The user selects a new password w . Using cryptographic hash functions, the user computes
t = H ( U w ) mod q
where H is a secure hash function and U is the user’s identifier.
π = H ( t ) mod q
enhances protection against dictionary attacks.
The user computes the verification value
T = g t mod p ,
which will be used for future authentication attempts.
The user securely transmits π and T to the server over a DTLS-encrypted channel.
Server Preparation: The server decrypts and verifies the received π and T using DTLS to ensure integrity and authenticity. The server then replaces the existing values π and T with π and T , securely storing the updated credentials for future authentication (see Figure 3).

5.3.2. Security Implications

The password update process, reinforced with DTLS, ensures that:
  • Sensitive information, such as the new password w , is never transmitted or stored in plaintext.
  • All computations are performed using cryptographic hash functions, enhancing resistance to attacks such as eavesdropping or replay attacks.
  • The updated values π and T are seamlessly integrated into the existing authentication framework, maintaining compatibility with the security guarantees of the protocol.
  • DTLS encrypts the communication channel, ensuring confidentiality and integrity during the password update process.
This mechanism highlights the flexibility and robustness of the OWL protocol in adapting to dynamic credential updates, making it a secure solution for resource-constrained IoT devices in CoAP-based environments.

6. Formal Security Analysis of the OWL–CoAP–DTLS Protocol

In this section, a game-based security proof is presented for the proposed OWL–CoAP–DTLS protocol. The aim is to demonstrate that, under standard cryptographic assumptions (e.g., hardness of discrete logarithm, CDH / DDH, random oracle models for hash functions, and the soundness of ZKPs), an adversary’s advantage in breaking session key confidentiality or impersonating a legitimate party is negligible.

6.1. Security Model and Definitions

  • Participants. Two honest parties are considered, a client C and a server S, communicating over an insecure channel. They aim to run the OWL-CoAP-DTLS protocol to authenticate each other and derive a shared session key k.
  • Adversary A . The adversary can intercept, modify, and forward messages freely (Dolev–Yao model). It may attempt to corrupt the credentials of one endpoint. The primary goals of A are:
    • Key indistinguishability: Break the confidentiality of the session key k or distinguish ciphertexts from random strings.
    • Impersonation: Convince one party to accept a session key without the genuine participation of the other party, or impersonate one participant without possessing the correct password/credentials.
  • Security Game. In accordance with the structure of bit-guessing or IND-security games, an experiment is defined between a Challenger and an adversary A . The Challenger emulates an honest execution of the protocol for both client and server roles, while A is allowed to interact with the system, intercept communications, and issue queries to various oracles. At the conclusion of the experiment, A outputs a guess b ^ { 0 , 1 } , indicating whether the challenge ciphertext or key token corresponds to a real instance ( b = 1 ) or to a randomly generated value ( b = 0 ). The advantage of A is quantified as
    Adv ( A ) = Pr [ b ^ = b ] 1 2 .
  • Desired Result. The objective is to demonstrate that for any polynomial-time adversary A , the advantage Adv ( A ) remains negligible under standard cryptographic assumptions.

6.2. Overview of the Game-Based Proof

The argument is developed through a sequence of games, beginning with the Real Execution Game (Game 0) and incrementally transformed into a final game in which the adversary’s success probability is either negligible or trivial. Each transition relies either on a well-known cryptographic assumption (e.g., CDH/DDH) or on the random oracle property of hash functions and ZKPs.

6.2.1. Game 0: Real Protocol Execution

Game 0 is the actual execution of the OWL-CoAP-DTLS protocol:
  • The challenger runs OWL for the client and the server, generates ephemeral keys x 1 , x 2 , x 3 , x 4 , computes public values X 1 = g x 1 mod p , etc., and performs the required ZKPs steps.
  • A shared session key k = H ( K ) is established once zero-knowledge authentication and password-derived elements have been verified.
  • The adversary A can observe, modify, or inject messages at will and ends by guessing the bit b in a challenge or attempting to impersonate a party.
Denote Adv ( 0 ) ( A ) = Pr [ b ^ = b ] 1 2 as the adversary’s advantage in Game 0.

6.2.2. Game 1: Randomization of Ephemeral Elements

In Game 1, the generation of ephemeral keys and responses in the zero-knowledge proofs (ZKPs) is modified in a manner that remains computationally indistinguishable to the adversary A , under the Computational Diffie–Hellman (CDH) or Decisional Diffie–Hellman (DDH) assumptions. Specifically:
  • Rather than computing X 1 = g x 1 , the value X 1 is replaced with a uniformly random element X ˜ 1 G in cases where such substitution is indistinguishable under the DDH assumption.
  • Commitments and responses in ZKPs are simulated using random values that are consistent with the expected protocol transcript, assuming the presence of random oracles for hash-based commitments.
Standard reductions show that Adv ( 1 ) ( A ) Adv ( 0 ) ( A ) ε 1 , where ε 1 is negligible.

6.2.3. Game 2: Replacement of the Session Key with a Random Value

Game 2 is the key step:
  • Instead of deriving k = H f ( x 1 , x 2 , X 3 , X 4 ) from real group operations, the challenger picks k uniformly at random from the key space.
  • If the adversary could distinguish real key messages from random, it would imply the ability to solve the underlying hard problem (CDH, discrete log, or break the random oracle).
It follows that Adv ( 2 ) ( A ) Adv ( 1 ) ( A ) ε 2 , where ε 2 is negligible under the assumed hardness of the underlying computational problem.

6.2.4. Game 3: Trivial Response

Finally, in Game 3, the session key k is treated as an independent random value, and all the outputs of the protocol (e.g., DTLS records or final acceptance messages) are consistently simulated with a random key. At this point, the adversary has no better strategy than random guessing:
Adv ( 3 ) ( A ) = 0 ( or statistically small ) .
By chaining these inequalities, it follows that
Adv ( 0 ) ( A ) Adv ( 1 ) ( A ) + ε 1 Adv ( 2 ) ( A ) + ε 1 + ε 2 Adv ( 3 ) ( A ) + ε 1 + ε 2 + ε 3 ,
where ε 1 , ε 2 , ε 3 are all negligible. Consequently, the advantage of any adversary A is also negligible, thereby establishing security.

6.3. Discussion and Practical Considerations

  • Resistance to Dictionary Attacks. The protocol never exposes the low-entropy password directly. Instead, it uses a salted hash t = H ( U w ) and a verifier T = g t mod p . The ZKPs ensure an adversary cannot passively or actively guess the password without being detected.
  • Zero-Knowledge Commitments. The underlying ZKPs steps rely on cryptographic hashing assumed as a random oracle, preventing an adversary from fabricating valid proofs without the genuine private exponent(s).
  • DTLS Layer. Even if an attacker injects packets, the final key k remains indistinguishable from a random string. DTLS complements the PAKE layer by protecting subsequent messages once the handshake concludes.
  • Implementation Caveats. This game-based proof assumes an idealized setting. Real-world deployments must address side-channel attacks (timing, power consumption), secure credential storage, reliable firmware updates, and robust random-number generation to preserve theoretical security guarantees.
Under standard cryptographic assumptions, the bit-guessing advantage of any adversary attempting to compromise the OWL-CoAP-DTLS protocol remains comparable to random guessing (i.e., 1 / 2 ). Consequently, the proposed method achieves both robust PAKE security and efficient session establishment for resource-constrained IoT environments while adhering to modern cryptographic practices.

7. Experimental Design

To rigorously evaluate the performance of the **OWL–CoAP integration** proposed within IoT environments, a **comprehensive experimental design** was developed to compare it with **traditional security approaches**. The evaluation focused on four key performance metrics: **computational efficiency, communication overhead, authentication latency, and security robustness**. These metrics were analyzed at multiple levels to account for varying operational conditions and device capabilities.
To ensure the **validity and reliability** of the results, several critical statistical considerations were incorporated into the experimental design, including **normality, randomization, and homoscedasticity** (homogeneity of variances). The assumption of normality was verified to confirm that the collected data followed a **Gaussian distribution**, ensuring the appropriateness of parametric statistical tests. Randomization was applied throughout the experiment to minimize bias and external influences, ensuring a fair comparison between **OWL–CoAP and conventional protocols**. Furthermore, homoscedasticity was assessed to confirm that variance levels remained consistent between different experimental groups, enhancing the **statistical significance** of the observed differences.
These methodological safeguards were implemented to provide a **robust assessment** of the performance differences between the evaluated protocols. **As detailed in Table 4, the study examines the impact of key factors such as key size, encryption methods, protocol types, and attack resilience on the selected performance metrics. This structured approach enables a comprehensive comparison of OWL–CoAP with alternative security mechanisms, offering valuable insights into its effectiveness and adaptability for various IoT deployment scenarios**.

7.1. Experimental Setup

The experimental environment consists of the following elements:
  • Software Environment: The simulation is implemented in Python using the aiocoap library for CoAP communication.
  • Security Configuration: The server operates over **DTLS on port 5684**, supporting both **unidirectional and bidirectional DTLS authentication**.
  • Network Simulation: Network conditions, including **latency, bandwidth, and packet loss**, are emulated using Mininet and Linux Traffic Control (tc).
  • Evaluation Tools: Data collection and monitoring are performed using **Wireshark**, custom Python scripts, and statistical analysis in **Matplotlib and Pandas**.
  • ThingsBoard Integration: The simulated IoT devices securely communicate with a ThingsBoard server running a **CoAP DTLS endpoint**.

7.1.1. Additional Simulation Environment Details

To enhance clarity and support reproducibility, the experiments were conducted under a controlled network topology configured via Mininet, emulating a **peer-to-peer (P2P) architecture** with **DTLS**-based communication channels to assess direct device-to-device interactions. This setup mirrors realistic IoT deployments where secure data exchange between nodes is crucial.
The network conditions were carefully modeled to reflect both ideal and constrained environments. Latency values ranged from 10 m s to 100 m s , while packet loss rates varied between 0.5% and 5%, managed through Linux Traffic Control (tc). These ranges were selected to represent conditions typical of smart building deployments, industrial IoT applications, and constrained wireless sensor networks (WSNs).
The DTLS configuration was adapted to simulate varying encryption complexities. Key sizes were tested from 1 bit up to 500 bits (at increments of 1 bit), aligning with typical ECC and password-derived key lengths explored in research on resource-constrained environments. The selected encryption methods included **DTLS-PSK**, **DTLS-X.509**, and **DTLS-OWL**, ensuring a comprehensive evaluation of lightweight, certificate-based, and optimized key exchange protocols.
Hash functions such as **SHA-256** were employed for message integrity, while encryption relied on **AES-GCM** with a 128-bit key for secure data transmission. This configuration follows best practices for IoT security frameworks and ensures alignment with real-world deployment standards.
This methodological rigor in selecting network parameters, cryptographic primitives, and secure P2P architecture strengthens both the internal validity of the experimental outcomes and their broader applicability to real-world IoT deployments. The incorporation of DTLS protocols further ensures that the presented results accurately reflect the latency, overhead, and security performance expected in secure IoT ecosystems.

7.1.2. Security Configuration and Certificate Management

To enable secure CoAP communication with **DTLS**, the ThingsBoard instance is configured with **valid ECDSA certificates** stored in PEM format. The following configurations were applied:
  • export COAP_DTLS_ENABLED=true
  • export COAP_DTLS_CREDENTIALS_TYPE=PEM
  • export COAP_DTLS_PEM_CERT=server.pem
  • export COAP_DTLS_PEM_KEY=server_key.pem
  • export COAP_DTLS_PEM_KEY_PASSWORD=secret
  • export COAP_DTLS_BIND_PORT=5684
For testing purposes, self-signed ECDSA certificates were generated using the following commands:
  • openssl ecparam -out server_key.pem -name secp256r1 -genkey
  • openssl req -new -key server_key.pem -x509 -nodes -days 365 -out server.pem -subj "/CN=localhost"
  • Note: While self-signed certificates are useful for testing, it is recommended to use a **certificate from a trusted Certificate Authority (CA) for production deployments**.

7.2. Authentication Latency

Authentication latency is a critical factor in IoT security. In this study, a comparative analysis was performed on the authentication latency of the **CoAP-PSK, CoAP-X.509, and CoAP-OWL** protocols. The latency data were generated through simulations using a **normal distribution** with predefined mean and standard deviation values for each protocol.
Figure 4 presents the histogram of authentication latency, highlighting significant differences in performance between the evaluated protocols. **CoAP–OWL demonstrates the lowest average latency**, making it the most efficient solution for **IoT environments that require rapid authentication**. In contrast, **CoAP–X.509 exhibits the highest latency**, reflecting the additional processing time associated with **certificate-based authentication**. **CoAP–PSK falls between the two**, offering a **moderate trade-off between speed and security**.
Figure 5 provides a box plot visualization of latency dispersion between protocols. CoAP–OWL shows minimal variation, indicating consistent authentication times, while CoAP–X.509 reveals significant variability, attributed to complex cryptographic operations. CoAP–PSK exhibits moderate dispersion, suggesting stable but slightly variable authentication times compared to CoAP–OWL.
Table 5 summarizes the statistical results, including the mean latency and standard deviation for each protocol. CoAP–OWL achieves the best performance, with an average latency of 78.06 ms and the lowest standard deviation, reinforcing its suitability for time-sensitive IoT applications. CoAP–PSK, with a mean latency of 120.29 ms, provides a reasonable balance, whereas CoAP–X.509 incurs a significant overhead with an average latency of 181.77 ms.
The results show that CoAP–OWL not only offers lower latency but also provides more predictable and reliable authentication. Its lightweight design and efficient cryptographic approach make it an optimal choice for IoT deployments where responsiveness and resource efficiency are paramount. The CoAP–PSK protocol presents a viable alternative for scenarios where moderate security and authentication speed are required. In contrast, CoAP–X.509, while offering robust security, may not be suitable for applications with stringent latency requirements due to its computational complexity.
These findings underscore the importance of selecting an appropriate authentication mechanism based on the specific needs of the IoT application. The CoAP–OWL protocol stands out as the most effective solution to achieve secure and efficient communication in constrained environments, contributing to the overall resilience and performance of IoT ecosystems.

8. Computational Overhead

To evaluate the computational overhead of the OWL-DTLS and DTLS-X.509 protocols, a simulation was performed that focused on three critical metrics: computational complexity, energy consumption, and network overhead. The results provide insights into the suitability of these protocols for resource-constrained IoT environments by analyzing their performance across different key sizes, ranging from 1 to 500 bits, with 1000 iterations per key size to ensure statistical significance. The complexity models were derived considering key factors such as computational efficiency, security mechanisms, and protocol design.
The following is a comparison of the computational complexity between the DTLS–X.509 and OWL–DTLS protocols, highlighting the advantages that OWL–DTLS offers in terms of performance and security. Although DTLS–X.509 relies on asymmetric cryptography with high computational cost, OWL–DTLS adopts more efficient techniques, such as PAKE, which optimizes authentication and session establishment.
Table 6 presents a detailed comparison of both protocols, illustrating key differences in terms of key generation, verification, handshake complexity, encryption overhead, and attack resilience.
In general, OWL–DTLS offers a significant reduction in computational complexity, resulting in lower resource consumption and shorter processing times. Optimization of verification and handshake operations contributes to faster and more efficient authentication, while its design, based on robust passwords, provides better resilience against attacks, overcoming the limitations of DTLS–X.509 in environments with high security and efficiency requirements. The simulation results for computational cost, illustrated in Figure 6, demonstrate that OWL–DTLS consistently outperforms DTLS–X.509 by reducing complexity, making it more suitable for low-resource devices. As summarized in Table 6, OWL–DTLS achieves this efficiency by reducing the complexity of key generation, minimizing handshake overhead, and eliminating the need for certificate validation, making it a more practical solution for constrained IoT environments.
In terms of energy consumption, Figure 7 indicates that OWL–DTLS consumes around 20% less energy compared to DTLS–X.509 across all key sizes, mainly due to the simplified cryptographic operations and reduced handshake complexity. The base energy consumption for OWL–DTLS is calculated at 0.05 n Joules, whereas DTLS–X.509 incurs additional penalties due to the certificate verification process.
Regarding network overhead, the analysis presented in Figure 8 demonstrates that OWL–DTLS introduces significantly lower overhead, with an average reduction of 18% compared to DTLS–X.509. The improved efficiency of OWL–DTLS allows for reduced message sizes and fewer data exchanges, which is crucial in IoT scenarios where bandwidth is a limiting factor.
Table 7 summarizes a sample of the simulation results for both protocols:
The findings confirm that OWL–DTLS is a more efficient alternative for IoT applications due to its lower computational complexity, reduced energy consumption, and minimal network overhead. This makes OWL–DTLS an attractive solution for enhancing the security of constrained IoT environments while ensuring optimal performance.

9. Discussion

The experimental results provide a detailed perspective on the computational efficiency and communication performance of OWL–DTLS compared to DTLS–X.509. The data collected from the simulations demonstrate a clear reduction in computational overhead, energy consumption, and network resource usage, which are critical factors for IoT deployments in constrained environments.
The computational complexity analysis, shown in Figure 6, indicates that OWL–DTLS requires significantly fewer processing resources compared to DTLS–X.509. The simplified cryptographic operations and the use of PAKE-based authentication mechanisms contribute to reducing the overall processing burden. These reductions are particularly evident as key sizes increase, demonstrating the ability of OWL–DTLS to scale efficiently without introducing excessive computational demands.
Energy consumption is another critical aspect addressed in the experimental evaluation. As illustrated in Figure 7, OWL–DTLS consistently consumes less power compared to DTLS–X.509. This efficiency is attributed to the streamlined key exchange and authentication processes, which reduce the need for repetitive cryptographic operations. Lower energy requirements make OWL–DTLS a viable solution for battery-powered IoT devices operating in remote or resource-constrained environments.
The evaluation of network overhead, depicted in Figure 8, highlights the efficiency of OWL–DTLS in minimizing data transmission overhead. The results indicate an approximate 18% reduction in communication overhead compared to DTLS-X.509. This improvement stems from OWL–DTLS’s ability to optimize message exchanges and reduce redundant data transmissions, which is particularly beneficial in low-bandwidth IoT networks.
Despite these positive observations, several challenges persist. One of the primary concerns is the scalability of OWL–DTLS in large-scale IoT networks. As the number of connected devices increases, the management of authentication sessions and key distribution becomes increasingly complex. Efficient handling of these elements is crucial to maintaining performance and avoiding potential bottlenecks in high-density deployments.
Another area of interest is the adaptability of OWL–DTLS to different IoT communication protocols and network architectures. Given the diversity of IoT ecosystems, interoperability with existing protocols such as MQTT, CoAP, and LoRaWAN remains an ongoing area of exploration. Ensuring seamless integration without compromising security or performance is a key consideration for practical implementation.
Furthermore, while OWL–DTLS exhibits lower processing and energy costs, the trade-offs between security and performance need to be continuously assessed. Ensuring that reduced complexity does not compromise the robustness of the authentication process is essential to maintain the integrity of IoT communications, particularly in applications with stringent security requirements.
In general, the analysis of the experimental data underscores the potential advantages and areas for further optimization in the deployment of OWL–DTLS for IoT environments. Future evaluations should focus on dynamic testing scenarios, varying network loads, and real-world deployments to further validate the performance metrics observed in controlled simulations.

10. Conclusions

This work presents the integration of OWL into CoAP-based IoT systems secured with DTLS, offering a lightweight and robust solution for secure session establishment in resource-constrained environments. The OWL one-message key exchange, grounded in ZKPs and high-entropy session derivation, shows significant gains in computational efficiency, authentication latency, and network overhead compared to traditional certificate-based approaches such as DTLS–X.509.
Beyond performance, the proposed OWL–CoAP–DTLS architecture addresses critical security needs at the application layer, offering native support for secure authentication without reliance on complex certificate infrastructures. However, real-world deployment requires further considerations. Firmware update mechanisms must be secured to preserve the integrity of OWL credentials, and provisioning strategies must support dynamic key refresh without disrupting active sessions. Interoperability also remains a challenge: While OWL aligns naturally with CoAP, adapting its mechanisms to broker-based architectures like MQTT will require novel handshake coordination models that preserve lightweight design while ensuring mutual authentication.
In addition, deployment in heterogeneous environments must address device compatibility, protocol fragmentation, and session synchronization across dynamic topologies. Trade-offs may arise between strong security guarantees and real-time responsiveness, especially in mobile or lossy networks. Future work should explore hybrid deployment models, automated key management, and OWL integration into alternative IoT stacks to support broader adoption in industrial, healthcare, and smart city scenarios.
The proposed architecture not only enhances the confidentiality and integrity of IoT communications but also reduces the operational burden on constrained devices by minimizing handshake steps, simplifying key management, and avoiding certificate verification. This simplification enables scalable, energy-efficient, and low-latency secure communication, making OWL–CoAP–DTLS particularly suitable for dense IoT networks and environments with intermittent connectivity. By embedding security as a native component of the protocol stack, this approach redefines how trust is established in IoT ecosystems—shifting from heavyweight infrastructure-dependent models to lightweight, password-based cryptographic foundations that are easier to deploy, maintain, and scale.

Author Contributions

Conceptualization, M.C.G.-Á.; Methodology, Y.R.J. and J.T.T.; Software, Y.R.J. and D.S.; Validation, Y.R.J. and A.P.M.; Formal analysis, A.P.M.; Investigation, Y.R.J., M.C.G.-Á. and D.S.; Resources, A.P.M.; Writing—original draft, J.T.T., M.C.G.-Á. and D.S.; Visualization, Y.R.J.; Supervision, Y.R.J.; Project administration, Y.R.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Rivera-Julio, Y. Design of a telemedicine ubiquitous architecture based on the smart device mhealth Arduino 4G. In Proceedings of the Applied Computer Sciences in Engineering: Third Workshop on Engineering Applications, WEA 2016, Bogotá, Colombia, 21–23 September 2016; Volume 657. [Google Scholar] [CrossRef]
  2. Julio, Y.E.R. Design ubiquitous architecture for telemedicine based on mhealth Arduino 4G LTE. In Proceedings of the 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services, Munich, Germany, 14–16 September 2016. [Google Scholar] [CrossRef]
  3. Bourdrez, D.; Krawczyk, H.; Lewi, K.; Wood, C.A. The OPAQUE Asymmetric PAKE Protocol. In Proceedings of the IETF Cryptographic Forum (IETF-CFRG), Internet Engineering Task Force (IETF), Prague, Czech Republic, 4–10 November 2023; Online Publication. 2023; pp. 1–45. [Google Scholar]
  4. Laaroussi, Z.; Novo, O. A performance analysis of the security communication in CoAP and MQTT. In Proceedings of the 2021 IEEE 18th Annual Consumer Communications and Networking Conference, CCNC 2021, Las Vegas, NV, USA, 9–12 January 2021. [Google Scholar] [CrossRef]
  5. Bhawiyuga, A.; Wardhana, A.; Amron, K.; Kirana, A.P. Platform for integrating internet of things based smart healthcare system and blockchain network. In Proceedings of the 2019 6th NAFOSTED Conference on Information and Computer Science, NICS 2019, Hanoi, Vietnam, 12–13 December 2019; pp. 55–60. [Google Scholar] [CrossRef]
  6. Hayati, N.; Ramli, K.; Suryanegara, M.; Suryanto, Y. Potential Development of AES 128-bit Key Generation for LoRaWAN Security. In Proceedings of the 2019 2nd International Conference on Communication Engineering and Technology, ICCET 2019, Nagoya, Japan, 19–22 April 2019; pp. 57–61. [Google Scholar] [CrossRef]
  7. Ferreira, P.; Miranda, R.N.; Cruz, P.M.; Mendonca, H.S. Multi-Protocol LoRaWAN/Wi-Fi Sensor Node Performance Assessment for Industry 4.0 Energy Monitoring. In Proceedings of the 2019 9th IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications, APWC 2019, Granada, Spain, 9–13 September 2019; pp. 403–407. [Google Scholar] [CrossRef]
  8. Marković, I.R.; Vukobratović, D. Five Years of 3GPP NB-IoT Technology: What Are the Main Use Cases? In Proceedings of the 2024 23rd International Symposium INFOTEH-JAHORINA (INFOTEH), East Sarajevo, Bosnia and Herzegovina, 20–22 March 2024; pp. 1–5. [Google Scholar] [CrossRef]
  9. Gardašević, G.; Katzis, K.; Bajić, D.; Berbakov, L. Emerging Wireless Sensor Networks and Internet of Things Technologies—Foundations of Smart Healthcare. Sensors 2020, 20, 3619. [Google Scholar] [CrossRef] [PubMed]
  10. Julio, Y.R.; García, I.G.; Díaz, J.M. Fulcrum Rateless Multicast Distributed Coding Design. IEEE Access 2023, 11, 73839–73849. [Google Scholar] [CrossRef]
  11. Julio, Y.R.; García, I.G.; Díaz, J.M.; Agüero, R. Middleware for Distributed Fulcrum Coding on the Fly: Leveraging Efficient Communications for 5G-IoT Heterogeneous Mobile Devices. IEEE Access 2023, 11, 142538–142551. [Google Scholar] [CrossRef]
  12. Jiang, S.; Gong, G.; He, J.; Nguyen, K.; Wang, H. PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model. In IACR International Conference on Public-Key Cryptography; Springer International Publishing: Cham, Switzerland, 2020; Volume 12110 LNCS, pp. 396–427. [Google Scholar] [CrossRef]
  13. Qi, M.; Hu, W. Provably Secure Asymmetric PAKE Protocol for Protecting IoT Access. IEEE Internet Things J. 2024, 11, 7071–7078. [Google Scholar] [CrossRef]
  14. Sheffer, Y.; Zorn, G.; Tschofenig, H.; Fluhrer, S. An EAP Authentication Method Based on the Encrypted Key Exchange (EKE) Protocol; RFC 6124; Informational; IETF: Fremont, CA, USA, 2011. [Google Scholar] [CrossRef]
  15. Jablon, D.P. Strong Password-Only Authenticated Key Exchange. ACM Sigcomm Comput. Commun. Rev. 1996, 26, 5–26. [Google Scholar] [CrossRef]
  16. Wu, T. The SRP Authentication and Key Exchange System; RFC 2945; Informational; IETF: Fremont, CA, USA, 2000. [Google Scholar] [CrossRef]
  17. Shin, S.; Kobara, K. Efficient Augmented Password-Only Authentication and Key Exchange (AugPAKE); RFC 6628; Informational; IETF: Fremont, CA, USA, 2012. [Google Scholar] [CrossRef]
  18. Hao, F.; Ryan, P.Y.A. J-PAKE: Password-Authenticated Key Exchange by Juggling; RFC 8236; Standards Track; IETF: Fremont, CA, USA, 2017. [Google Scholar] [CrossRef]
  19. Clarke, D.; Hao, F. Cryptanalysis of the Dragonfly Key Exchange Protocol. IET Inf. Secur. 2014, 8, 283–289. [Google Scholar] [CrossRef]
  20. Shoup, V. Security Analysis of SPAKE2+. Cryptology ePrint Archive, Paper 2020/313. 2020. Available online: https://eprint.iacr.org/2020/313 (accessed on 17 February 2025).
  21. Hao, F.; Bag, S.; Chen, L.; van Oorschot, P.C. Owl: An Augmented Password-Authenticated Key Exchange Scheme. In International Conference on Financial Cryptography and Data Security; Springer Nature: Cham, Switzerland, 2020; pp. 227–244. [Google Scholar]
  22. Jarecki, S.; Krawczyk, H.; Xu, J. OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks. In Advances in Cryptology—EUROCRYPT 2018; Springer International Publishing: Cham, Switzerland, 2018; pp. 1545–1550. [Google Scholar]
  23. Kumar, A.; Sharma, P. MQTT based Secure Transport Layer Communication for Mutual Authentication in IoT Devices. Mater. Today Proc. 2022, 56, 3186–3190. [Google Scholar] [CrossRef]
  24. Wang, L.; Chen, Y. CoAP/DTLS Protocols in IoT Based on Blockchain Light Certificate. Cryptography 2022, 6, 4. [Google Scholar] [CrossRef]
  25. Kumar, R.; Singh, A. Enhancing Security in ZigBee Wireless Sensor Networks Using AES-128 Encryption. Sensors 2023, 23, 5703. [Google Scholar] [CrossRef]
  26. Johnson, E.; Davis, M. Evolution of Bluetooth Technology: BLE in the IoT Ecosystem. Sensors 2023, 25, 996. [Google Scholar] [CrossRef]
  27. Lee, H.; Kim, S. Data Interworking Model and Analysis for Harmonization of Smart Metering Systems. Sensors 2022, 23, 2903. [Google Scholar] [CrossRef]
  28. Martinez, C.; Gonzalez, A. Leveraging Larger AES Keys in LoRaWAN: A Practical Evaluation of Security vs. Performance. Sensors 2023, 23, 9172. [Google Scholar] [CrossRef]
  29. Smith, J.; Brown, A. On the Security of Thread Networks: AES Encryption and 6LoWPAN Integration. In Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, 23–25 May 2022; pp. 139–144. [Google Scholar] [CrossRef]
  30. Garcia, M.; Lee, T. A Comprehensive Survey on the Security of Low Power Wide Area Networks: Focus on Sigfox. Internet Things 2024, 19, 100598. [Google Scholar]
  31. Harris, K.; Clark, A. Design of an Area Efficient Crypto Processor for 3GPP-LTE NB-IoT Applications. Microprocess. Microsyst. 2023, 92, 104013. [Google Scholar]
  32. Tan, Z.; Ding, B.; Zhao, J.; Guo, Y.; Lu, S. Data-plane signaling in cellular IoT: Attacks and defense. In Proceedings of the 27th Annual International Conference on Mobile Computing and Networking, New Orleans, LA, USA, 25–29 October 2021; pp. 1–14. [Google Scholar] [CrossRef]
  33. Labs, S. Z-Wave Security 2 (S2): The Next Generation of Z-Wave Network Security. In Silicon Labs Whitepapers; Silicon Labs: Austin, TX, USA, 2022; pp. 1–12. [Google Scholar]
  34. Alliance, W.S. Wi-SUN Alliance Field Area Network (FAN) Security Overview. Wi-SUN Technical Documentation. 2022, pp. 1–18. Available online: https://datatracker.ietf.org/meeting/97/materials/slides-97-lpwan-35-wi-sun-presentation-00 (accessed on 17 February 2025).
  35. Chen, Y.; Wang, H. Formal Security Analysis of ISA100.11a Standard Protocol Based on Colored Petri Net Tool. Information 2023, 15, 118. [Google Scholar] [CrossRef]
  36. FieldComm Group. WirelessHART Security Overview and AES-128 Encryption Implementation; FieldComm Group Technical Paper; FieldComm Group: Austin, TX, USA, 2022; pp. 1–15. [Google Scholar]
  37. Stripe. NFC Security 101: A Guide for Businesses Using Standards-Based Encryption in Contactless Payments; Stripe Technical Guides; 2022; pp. 1–10. Available online: https://stripe.com/en-jp/resources/more/nfc-security-101-a-guide-for-businesses-using-contactless-payments (accessed on 17 February 2025).
  38. Su, W.T.; Chen, W.C.; Chen, C.C. An extensible and transparent thing-to-thing security enhancement for MQTT protocol in IoT environment. In Proceedings of the Global IoT Summit, GIoTS 2019, Aarhus, Denmark, 17–21 June 2019. [Google Scholar] [CrossRef]
  39. Suleymanov, E.; Kirdan, E.; Pahl, M.O. Securing CoAP with DTLS and OSCORE. In Proceedings of the 2022 6th Cyber Security in Networking Conference, CSNet 2022, Rio de Janeiro, Brazil, 10–12 October 2022. [Google Scholar] [CrossRef]
  40. Seller, O. LoRaWAN Security. J. ICT Stand. 2021, 9, 47–60. [Google Scholar] [CrossRef]
  41. Lee, K.; Lee, J.; Zhang, B.; Kim, J.; Shin, Y. An Enhanced Trust Center Based Authentication in ZigBee Networks. In Proceedings of the Third International Conference and Workshops, ISA 2009, Seoul, Republic of Korea, 25–27 August 2009; Volume 5576 LNCS, pp. 471–484. [Google Scholar] [CrossRef]
  42. Bhawiyuga, A.; Data, M.; Warda, A. Architectural design of token based authentication of MQTT protocol in constrained IoT device. In Proceeding of the 2017 11th International Conference on Telecommunication Systems Services and Applications, TSSA 2017, Bali, Indonesia, 11–13 October 2017; pp. 1–4. [Google Scholar] [CrossRef]
  43. Unwala, I.; Taqvi, Z.; Lu, J. IoT security: ZWave and thread. In Proceeding of the 2018 IEEE Green Technologies Conference (GreenTech), Austin, TX, USA, 4–6 April 2018; pp. 176–182. [Google Scholar] [CrossRef]
  44. Du, X.; Lai, M. Research on NB-IOT Device Access Security Solutions. In Proceeding of the 2023 3rd International Conference on Electronic Information Engineering and Computer, EIECT 2023, Shenzhen, China, 17–19 November 2023; pp. 419–424. [Google Scholar] [CrossRef]
  45. Grané, M.; Martínez, J.D.; Arnaud, A.; Puyol, R.; Miguez, M. A Sensor Network Using SigFox for Temperature and Humidity Monitoring in the Livestock Industry. In Proceedings of the 2024 IEEE 15th Latin America Symposium on Circuits and Systems (LASCAS), Punta del Este, Uruguay, 27 February–1 March 2024; pp. 1–5. [Google Scholar] [CrossRef]
  46. Aguilar, J.; Pinto, A.; Puerto, E.; Rivero, Y. Study of the Learning Algorithm for Multivariable Data Analysis in Machine Learning Tasks Under Missing Data. In Proceedings of the 2024 Latin American Computer Conference (CLEI), Buenos Aires, Argentina, 12–16 August 2024; pp. 1–9. [Google Scholar]
  47. Julio, Y.R.; Mangones, A.P.; Aguilar, J.; García, R.; Science Deps, J.; Hernández, F.I. Analysis and Association in Microbiota Network (SparCC, Ccrepe, MB y Glasso). In Proceedings of the International Conference on Management, Tourism and Technologies (ICMTT), Cusco, Peru, 8–10 May 2024; pp. 107–118. [Google Scholar]
Figure 1. Registration in the OWL protocol using ZKPs.
Figure 1. Registration in the OWL protocol using ZKPs.
Sensors 25 02468 g001
Figure 2. Secure login process in the OWL protocol using ZKPs.
Figure 2. Secure login process in the OWL protocol using ZKPs.
Sensors 25 02468 g002
Figure 3. Password update in the OWL protocol using ZKPs.
Figure 3. Password update in the OWL protocol using ZKPs.
Sensors 25 02468 g003
Figure 4. Comparison of authentication latency across protocols.
Figure 4. Comparison of authentication latency across protocols.
Sensors 25 02468 g004
Figure 5. Boxplot of authentication latency across protocols.
Figure 5. Boxplot of authentication latency across protocols.
Sensors 25 02468 g005
Figure 6. Comparison of computational complexity: DTLS–X.509 vs OWL–DTLS.
Figure 6. Comparison of computational complexity: DTLS–X.509 vs OWL–DTLS.
Sensors 25 02468 g006
Figure 7. Comparison of Energy Consumption: DTLS-X.509 vs. OWL-DTLS.
Figure 7. Comparison of Energy Consumption: DTLS-X.509 vs. OWL-DTLS.
Sensors 25 02468 g007
Figure 8. Comparison of Network Overhead: DTLS–X.509 vs. OWL–DTLS.
Figure 8. Comparison of Network Overhead: DTLS–X.509 vs. OWL–DTLS.
Sensors 25 02468 g008
Table 1. Comparison of lightweight PAKE protocols for resource-constrained devices.
Table 1. Comparison of lightweight PAKE protocols for resource-constrained devices.
ProtocolYearInnovationAdvantagesDisadvantagesECC CompatibilityScalabilityComputational Efficiency
EKE (Encrypted Key Exchange) [14]1992First formalized PAKE.Basis for other PAKE protocols. Resists passive dictionary attacks.Vulnerable to active dictionary attacks. Requires public encryption.NoLowLow
SPEKE (Simple PAKE) [15]1996Uses modular exponentiation with password hash.No pre-shared public keys required. Uses hash functions for security.Vulnerable if parameters are poorly chosen.NoMediumMedium
SRP (Secure Remote Password) [16]1998Introduces password verification without transmission.Protects against active and passive dictionary attacks. No plaintext password storage on the server.More complex to implement. May be less efficient on resource-limited devices.NoMediumLow
AugPAKE (Augmented PAKE) [17]2005Adds protection for user credentials.Server does not store plaintext passwords. Resists passive dictionary attacks.Higher computational overhead than SPEKE and SRP.NoMediumLow
J-PAKE (Joy PAKE) [18]2008Uses Diffie-Hellman with ZKPs.No key storage required on the server. Offers security against MitM attacks.Requires more computational steps than other PAKE protocols.YesHighMedium
Dragonfly [19]2008Designed for wireless networks and WPA3.High resistance to dictionary attacks. No need to store secrets on the server.May be less efficient on resource-limited devices.YesMediumMedium
SPAKE2 (Simplified PAKE 2) [20]2010Reduces the number of required exponentiations.More efficient than J-PAKE. Compatible with ECC.Requires secure parameter generation.YesHighHigh
OWL (One-Message Weak Leakage-Resilient PAKE) [21]2015One-round PAKE with leakage protection.Reduces latency with a single message. Resists dictionary and replay attacks. Supports implementations in various multiplicative groups and elliptic curves.Requires stronger security in parameter selection.YesHighHigh
OPAQUE (Asymmetric PAKE) [22]2018No password exposure at any stage.Supports secure storage using KDF. Provides strong authentication without revealing secrets.More computationally complex than other PAKEs. Requires encrypted credential storage.YesHighMedium
Table 2. Comparison of security protocols in IoT.
Table 2. Comparison of security protocols in IoT.
ProtocolSecurityEfficiencyCompatibilityCommunicationKey ExchangeScalabilityComplexityPerformance in Hostile Environments
MQTT [23]Basic Authentication, Optional TLSHigh with Low BandwidthWide on Devices and PlatformsMessage-OrientedNoHighLowModerate
CoAP [24]DTLS, Secure AuthenticationHigh in Low-Power NetworksSpecific for IoT DevicesMessage-Oriented and RESTfulYesMediumModerateHigh
Zigbee [25]AES-128 EncryptionModerate, Optimized for Sensor NetworksLow-Power DevicesMesh NetworkNoHighModerateHigh
BLE [26]AES Encryption, ECDH for PairingHigh in Personal DevicesCommon in Mobile and Health DevicesPoint-to-Point ConnectionYesLowModerateLow
LwM2M [27]DTLS, Secure AuthenticationDesigned to Manage IoT DevicesBased on CoAP, Good for IoT DevicesObject Model-OrientedYesHighModerateHigh
LoRa [28]AES EncryptionHigh in Long Distances and Low PowerUsed in Wide Area Networks (LPWAN)Mesh Network-OrientedNoVery HighLowHigh
Thread [29]AES Encryption, IP-Based Security (6LoWPAN)High in Low-Power NetworksWide in Smart Home ApplicationsMesh Network, IPv6-BasedYesHighModerateHigh
Sigfox [30]Proprietary EncryptionHigh for Small MessagesOptimized for Low-Power IoT DevicesUni-Directional or Limited Bi-Directional CommunicationNoVery HighLowHigh
NB-IoT [31]3GPP Standard EncryptionHigh for Small Data VolumesIntegration with Existing Cellular InfrastructureNarrow Band for IoTYesHighModerateModerate
LTE-M [32]3GPP Standard EncryptionHigh with Capacity for Larger Data VolumesCompatibility with Existing LTE NetworksSuitable for Mobile IoT ApplicationsYesHighModerateModerate
Z-Wave [33]AES-128 Encryption, ECDH for PairingModerate, Optimized for Smart Home NetworksPreferred in Home AutomationShort-Range Mesh CommunicationYesMediumModerateHigh
Wi-SUN [34]AES-128 EncryptionHigh in Large-Scale Mesh NetworksSuitable for Public Service ApplicationsMesh-Oriented with IPv6NoHighModerateHigh
ISA100.11a [35]AES-128 EncryptionHigh in Industrial EnvironmentsSpecific for Industrial ApplicationsIndustrial Wireless CommunicationYesMediumModerateHigh
WirelessHART [36]AES-128 EncryptionModerate, Specific for InstrumentationUsage in Process Control EnvironmentsRobust Communication for Process ControlYesMediumModerateHigh
NFC [37]Standards-based EncryptionHigh for Short-Range TransmissionCommon in Mobile Devices and PaymentsNear-Field CommunicationYesLowLowModerate
Table 3. Main components of the OWL–CoAP integration.
Table 3. Main components of the OWL–CoAP integration.
ComponentDescription
Key Provisioning Module
  • Generates and distributes identifiers (e.g., RFC6920-based) for device authentication.
  • Manages secure Access Control Lists (ACLs) with fine-grained permissions.
  • Ensures flexible formats (binary, URI, human-readable) for identifier representation.
OWL–CoAP Session Manager
  • Implements OWL for robust key exchange and mutual authentication.
  • Uses ZKPs to avoid exposing secret credentials.
  • Facilitates session key derivation from password-based inputs.
CoAP Protocol Adapter
  • Translates OWL messages into CoAP-compatible formats (URIs, tokens).
  • Simplifies integration with existing IoT deployments via modular design.
DTLS Security Layer
  • Enables lightweight encryption (PSK) or more advanced RawPublicKey/X.509 setups.
  • Protects data integrity and confidentiality over UDP-based CoAP messages.
Table 4. Experimental metrics, factors, and levels.
Table 4. Experimental metrics, factors, and levels.
MetricFactorsLevels
Computational EfficiencyKey Size, Encryption Method1–500 bits, OWL-DTLS, DTLS-X.509
Communication OverheadProtocol Type, Message SizeCoAP-OWL, CoAP-PSK, CoAP-X.509; Small, Medium, Large
Authentication LatencyAuthentication Mechanism, Network ConditionsPSK, X.509, OWL; Low, Medium, High Latency
Security RobustnessAttack Type, Encryption StrengthReplay, MITM, Brute Force; Low, Medium, High
Table 5. Authentication latency statistics.
Table 5. Authentication latency statistics.
ProtocolMean Latency (ms)Standard Deviation (ms)
CoAP-PSK120.2914.68
CoAP-X.509181.7724.92
CoAP-OWL78.069.83
Table 6. Detailed complexity comparison between DTLS–X.509 and OWL–DTLS.
Table 6. Detailed complexity comparison between DTLS–X.509 and OWL–DTLS.
FactorDTLS-X.509OWL-DTLSAdvantage of OWL
Key Generation O ( n 3 ) O ( n log n ) OWL reduces the computational cost by using password-derived keys instead of complex asymmetric cryptographic operations.
Key Verification O ( n log n ) O ( n ) OWL enables faster key validation without the need for certificate verification.
Handshake Complexity O ( 2 ( n / 50 ) ) O ( n ) OWL simplifies session establishment by reducing handshake steps.
Encryption Overhead O ( n log n ) O ( n log n ) Similar efficiency, but OWL avoids certificate-related overhead.
Attack ResilienceVulnerable to impersonation attacks.Resistant via ZKPs.OWL enhances authentication security and prevents identity theft.
Computational EfficiencyHigh CPU/memory usage due to RSA/ECC.Lightweight cryptographic operations.OWL is optimized for constrained IoT devices.
Energy ConsumptionHigh due to certificate validation.Low due to minimal computations.OWL extends battery life in IoT devices.
Network OverheadLarge certificate exchanges.Compact authentication messages.OWL reduces bandwidth usage, ideal for IoT.
Table 7. Sample results for DTLS–X.509 and OWL–DTLS.
Table 7. Sample results for DTLS–X.509 and OWL–DTLS.
Key Size (Bits)Computational CostEnergy (J)Overhead (Bytes)
DTLS-X.509
12.000.075122.4
111384.750.825146.4
219389.871.575170.4
OWL-DTLS
12.000.050102
1174.750.550122
21169.861.050142
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Julio, Y.R.; Pinto Mangones, A.; Torres Tovio, J.; Gómez-Álvarez, M.C.; Salcedo, D. Integration of OWL Password-Authenticated Key Exchange Protocol to Enhance IoT Application Protocols. Sensors 2025, 25, 2468. https://doi.org/10.3390/s25082468

AMA Style

Julio YR, Pinto Mangones A, Torres Tovio J, Gómez-Álvarez MC, Salcedo D. Integration of OWL Password-Authenticated Key Exchange Protocol to Enhance IoT Application Protocols. Sensors. 2025; 25(8):2468. https://doi.org/10.3390/s25082468

Chicago/Turabian Style

Julio, Yair Rivera, Angel Pinto Mangones, Juan Torres Tovio, María Clara Gómez-Álvarez, and Dixon Salcedo. 2025. "Integration of OWL Password-Authenticated Key Exchange Protocol to Enhance IoT Application Protocols" Sensors 25, no. 8: 2468. https://doi.org/10.3390/s25082468

APA Style

Julio, Y. R., Pinto Mangones, A., Torres Tovio, J., Gómez-Álvarez, M. C., & Salcedo, D. (2025). Integration of OWL Password-Authenticated Key Exchange Protocol to Enhance IoT Application Protocols. Sensors, 25(8), 2468. https://doi.org/10.3390/s25082468

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop