A Lightweight Hybrid Authentication and Key Agreement Protocol for Decentralized Device-to-Device Communication with Post-Quantum Confidentiality
Abstract
1. Introduction
- We propose a decentralized D2D authentication and key agreement protocol without reliance on an online trusted third party.
- We introduce a hybrid cryptographic design combining post-quantum KEMs for confidentiality and ECC-based authentication for efficiency.
- We provide a formal security analysis in the ROR model and an informal analysis covering standard attack vectors.
- We evaluate the performance of the protocol and compare it with recent IoT and D2D authentication schemes.
2. Related Work
2.1. Related Work on D2D Without DLT
2.2. Related Work on D2D with DLT
2.3. Research Gap and Motivation
3. Preliminaries
3.1. System and Network Model
3.2. Cryptographic Primitives
3.3. Protocol Participants and Sessions
- The identity of the peer device;
- The exchanged protocol messages;
- Locally generated randomness;
- Intermediate cryptographic values;
- The resulting session key (if successfully established).
3.4. Adversary Model (Informal)
3.5. Security Goals
- Mutual authentication: Both participating devices are assured of each other’s identity.
- Session key confidentiality: The established session key remains indistinguishable from random to any adversary.
- Integrity and replay protection: Protocol messages cannot be modified or reused without detection.
- Conditional perfect forward secrecy: Compromise of long-term keys does not reveal past session keys, under the assumed threat model.
- PQ confidentiality: Session key secrecy remains secure against future quantum adversaries due to the use of PQ key encapsulation.
4. Proposed Protocol
4.1. Onboarding Phase
- Its identity ;
- Its ECC public key ;
- Its PQ public key ;
- Optional metadata (e.g., capabilities, manufacturer information).
4.2. AKA Phase
- Initialization.
- Step 1 (from to ).
- Step 2 (processing at ).
- Step 3 (processing at ).
- Correctness.
5. Security Analysis
5.1. Informal Security Analysis
5.1.1. Mutual Authentication
5.1.2. Session Key Confidentiality
5.1.3. Integrity and Replay Protection
5.1.4. Resistance to Impersonation and Man-in-the-Middle Attacks
5.1.5. Availability and Denial-of-Service Considerations
5.1.6. Conditional Perfect Forward Secrecy
5.1.7. PQ Confidentiality
5.2. Formal Security Model
- Execute: This query models passive attacks. The oracle returns the transcript of an honest execution between two partner sessions and .
- Send: This query models active attacks. The adversary sends a message m to session and receives the protocol response generated according to the protocol specification.
- Reveal: If session has accepted, this query returns the session key held by .
- CorruptECC: returns the ECC authentication secret , while CorruptPQ() returns the PQ KEM secret key . This distinction allows separate modeling of authentication compromise and PQ confidentiality compromise.
- Test: This query can be asked once to a fresh session . The oracle flips a random bit . If , it returns the real session key held by ; otherwise, it returns a random string of the same length. At the end of the experiment, the adversary outputs a guess .
- Freshness
- has accepted;
- Neither nor its partner session has been queried via reveal;
- The long-term secrets of both parties were not corrupted before the session completed;
- The session under test is not trivially exposed through another partnered instance.
- ROR Advantage
6. Prototype Validation and Performance Analysis
6.1. Implementation Setup
6.2. Computational Cost
6.3. Communication Overhead
6.4. Discussion
7. Conclusions and Future Work
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Yang, H.; Li, Z.; Luo, C.; Wei, B.; Xu, W. InaudibleKey2. 0: Deep Learning-Empowered Mobile Device Pairing Protocol Based on Inaudible Acoustic Signals. IEEE/ACM Trans. Netw. 2024, 32, 4160–4174. [Google Scholar] [CrossRef]
- Khalfaoui, S.; Leneutre, J.; Villard, A.; Ma, J.; Urien, P. Security Analysis of Out-of-Band Device Pairing Protocols: A Survey. Wirel. Commun. Mob. Comput. 2021, 2021, 8887472. [Google Scholar] [CrossRef]
- Bernstein, D.J.; Lange, T. Post-quantum cryptography. Nature 2017, 549, 188–194. [Google Scholar] [CrossRef]
- Baek, J.; Newmarch, J.; Safavi-Naini, R.; Susilo, W. A survey of identity-based cryptography. In Proceedings of the Australian Unix Users Group Annual Conference, Melbourne, Australia, 1–3 September 2004; pp. 95–102. [Google Scholar]
- Ali, M.S.; Dolui, K.; Antonelli, F. IoT data privacy via blockchains and IPFS. In Proceedings of the Seventh International Conference on the Internet of Things, Linz, Austria, 22–25 October 2017; pp. 1–7. [Google Scholar]
- Conti, M.; Kumar, G.; Nerurkar, P.; Saha, R.; Vigneri, L. A survey on security challenges and solutions in the IOTA. J. Netw. Comput. Appl. 2022, 203, 103383. [Google Scholar] [CrossRef]
- Braeken, A.; Liyanage, M.; Jurcut, A.D. Anonymous lightweight proxy based key agreement for IoT (ALPKA). Wirel. Pers. Commun. 2019, 106, 345–364. [Google Scholar] [CrossRef]
- Braeken, A. PUF based authentication protocol for IoT. Symmetry 2018, 10, 352. [Google Scholar] [CrossRef]
- Chatterjee, U.; Chakraborty, R.S.; Mukhopadhyay, D. A PUF-based secure communication protocol for IoT. ACM Trans. Embed. Comput. Syst. (TECS) 2017, 16, 67. [Google Scholar] [CrossRef]
- TS 33.501; Security Architecture and Procedures fo 5G System (Release 16). 3rd Generation Partnership Project (3GPP): Sophia Antipolis, France, 2020.
- Braeken, A.; Liyanage, M.; Kumar, P.; Murphy, J. Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks. IEEE Access 2019, 7, 64040–64052. [Google Scholar] [CrossRef]
- Braeken, A. Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability. Comput. Netw. 2020, 181, 107424. [Google Scholar] [CrossRef]
- Munilla, J.; Burmester, M.; Barco, R. An enhanced symmetric-key based 5G-AKA protocol. Comput. Netw. 2021, 198, 108373. [Google Scholar] [CrossRef]
- Damir, M.T.; Meskanen, T.; Ramezanian, S.; Niemi, V. A beyond-5G authentication and key agreement protocol. In Proceedings of the International Conference on Network and System Security; Springer: Berlin/Heidelberg, Germany, 2022; pp. 249–264. [Google Scholar]
- Rossi Figlarz, G.; Passuelo Hessel, F. Enhancing the 5G-AKA Protocol with Post-quantum Digital Signature Method. In Proceedings of the International Conference on Advanced Information Networking and Applications; Springer: Berlin/Heidelberg, Germany, 2024; pp. 99–110. [Google Scholar]
- Joudah, R.H.; Manaa, M.E. A New Approach to Improving the Security of the 5G-AKA Using Crystals-Kyber Post-Quantum Technologies and ASCON Algorithm. Int. Inf. Eng. Technol. Assoc. 2024, 14, 1729–1742. [Google Scholar] [CrossRef]
- Selvakumar, S.; Ahilan, A.; Ben Sujitha, B.; Muthukumaran, N. Crystals kyber cryptographic algorithm for efficient IoT D2d communication. Wirel. Netw. 2024, 31, 1053–1070. [Google Scholar] [CrossRef]
- Babu, P.R.; Kumar, S.A.; Reddy, A.G.; Das, A.K. Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges. Comput. Sci. Rev. 2024, 54, 100676. [Google Scholar] [CrossRef]
- Chikouche, N.; Cayrel, P.L.; Mboup, E.H.M.; Boidje, B.O. A privacy-preserving code-based authentication protocol for Internet of Things. J. Supercomput. 2019, 75, 8231–8261. [Google Scholar] [CrossRef]
- Zhang, S.; Du, X.; Liu, X. A novel and quantum-resistant handover authentication protocol in IoT environment. Wirel. Netw. 2023, 29, 2873–2890. [Google Scholar] [CrossRef]
- Rana, S.; Mishra, D. Lattice-based key agreement protocol under ring-LWE problem for IoT-enabled smart devices. Sādhanā 2021, 46, 84. [Google Scholar] [CrossRef]
- Li, Z.; Wang, D. Achieving one-round password-based authenticated key exchange over lattices. IEEE Trans. Serv. Comput. 2019, 15, 308–321. [Google Scholar] [CrossRef]
- Al-Saggaf, A.A.; Sheltami, T.; Alkhzaimi, H.; Ahmed, G. Lightweight two-factor-based user authentication protocol for iot-enabled healthcare ecosystem in quantum computing. Arab. J. Sci. Eng. 2023, 48, 2347–2357. [Google Scholar] [CrossRef]
- Wei, G.; Fan, K.; Zhang, K.; Wang, H.; Li, H.; Yang, Y. Quantum-Safe Lattice-Based Certificateless Anonymous Authenticated Key Agreement for Internet of Things. IEEE Internet Things J. 2023, 11, 9213–9225. [Google Scholar] [CrossRef]
- Basu, S.; Seyhan, K.; Islam, S.H.; Akleylek, S. MLWR-2PAKA: A hybrid module learning with rounding-based authenticated key agreement protocol for two-party communication. IEEE Syst. J. 2023, 17, 6093–6103. [Google Scholar] [CrossRef]
- Braeken, A.; Yadav, A.K. Cryptanalysis of Post-Quantum Security Schemes based on the Hardness of the Inhomogeneous Small Integer Solution (ISIS) problem. IEEE Trans. Consum. Electron. 2025. [Google Scholar] [CrossRef]
- Islam, S.H. Provably secure two-party authenticated key agreement protocol for post-quantum environments. J. Inf. Secur. Appl. 2020, 52, 102468. [Google Scholar] [CrossRef]
- Aujla, G.S.; Chaudhary, R.; Kaur, K.; Garg, S.; Kumar, N.; Ranjan, R. SAFE: SDN-assisted framework for edge–cloud interplay in secure healthcare ecosystem. IEEE Trans. Ind. Inform. 2018, 15, 469–480. [Google Scholar] [CrossRef]
- Abood, E.W.; Yassin, A.A.; Abduljabbar, Z.A.; Nyangaresi, V.O.; Ali, A.H. Provably lightweight and secure IoHT scheme with post-quantum cryptography and fog computing: A comprehensive scheme for healthcare system. MethodsX 2025, 15, 103631. [Google Scholar] [CrossRef]
- Braeken, A. Flexible hybrid post-quantum bidirectional multi-factor authentication and key agreement framework using ECC and KEM. Future Gener. Comput. Syst. 2025, 166, 107634. [Google Scholar] [CrossRef]
- Agyekum, K.O.B.O.; Xia, Q.; Sifah, E.B.; Cobblah, C.N.A.; Xia, H.; Gao, J. A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain. IEEE Syst. J. 2021, 16, 1685–1696. [Google Scholar] [CrossRef]
- Mishra, R.A.; Kalla, A.; Braeken, A.; Liyanage, M. Blockchain regulated verifiable and automatic key refreshment mechanism for IoT. IEEE Access 2023, 11, 21758–21770. [Google Scholar] [CrossRef]
- Hewa, T.; Bracken, A.; Ylianttila, M.; Liyanage, M. Blockchain-based automated certificate revocation for 5G IoT. In Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC); IEEE: New York, NY, USA, 2020; pp. 1–7. [Google Scholar]
- Garba, A.; Khoury, D.; Balian, P.; Haddad, S.; Sayah, J.; Chen, Z.; Guan, Z.; Hamdan, H.; Charafeddine, J.; Al-Mutib, K. LightCERT4IoTs: Blockchain-based lightweight certificates authentication for IoT applications. IEEE Access 2023, 11, 28370–28383. [Google Scholar] [CrossRef]
- Yang, D.; Yoo, S.; Doh, I.; Chae, K. Selective blockchain system for secure and efficient D2D communication. J. Netw. Comput. Appl. 2021, 173, 102817. [Google Scholar] [CrossRef]
- Liu, S.; Chen, L.; Yu, H.; Gao, S.; Fang, H. BP-AKAA: Blockchain-enforced Privacy-preserving Authentication and Key Agreement and Access Control for IIoT. J. Inf. Secur. Appl. 2023, 73, 103443. [Google Scholar]
- Yao, W.; Gorlewski, N.; Deek, F.P.; Wang, G. Considerations for Decision Makers and Developers Toward the Adoption of Decentralized Key Management Systems Technology in Emerging Applications. Computer 2024, 57, 27–38. [Google Scholar] [CrossRef]
- Benrebbouh, C.; Mansouri, H.; Cherbal, S.; Messai, M.L.; Pathan, A.S.K. A survey of quantum and blockchain security solutions for IoT-based Energy Internet. Comput. Electr. Eng. 2026, 134, 111096. [Google Scholar] [CrossRef]
- Chen, H.; Wang, W.; Duan, Y. A dual blockchain-based privacy-preserving authentication scheme for Vehicular Ad Hoc Networks. Comput. Netw. 2025, 271, 111578. [Google Scholar] [CrossRef]
- Tan, H.; Wang, M.; Shen, J.; Vijayakumar, P.; Moh, S.; Wu, Q.J. Blockchain-assisted conditional anonymous authentication and adaptive tree-based group key agreement for VANETs. IEEE Trans. Dependable Secur. Comput. 2025, 23, 2664–2679. [Google Scholar] [CrossRef]
- Ren, Y.; Li, X.; Sun, S.F.; Yuan, X.; Zhang, X. Privacy-preserving batch verification signature scheme based on blockchain for vehicular ad-hoc networks. J. Inf. Secur. Appl. 2021, 58, 102698. [Google Scholar] [CrossRef]

| Scheme | D2D | No Online TTP | No Pre-Shared Context | PQ-Secure | PFS | Decentralized Key Mgmt |
|---|---|---|---|---|---|---|
| [7]-2nd | ✓ | × | ✓ | × | × | × |
| [8] | ✓ | × | × | × | × | × |
| [14,15,16] | × | × | × | ✓ | × | × |
| [17] | ✓ | × | × | ✓ | × | × |
| [29] | × | × | × | ✓ | × | ✓ |
| [30] | × | ✓ | × | ✓ | ✓ | × |
| [36] | × | × | × | × | × | ✓ |
| This work | ✓ | ✓ | ✓ | ✓ * | ✓ | ✓ |
| Operation | Time (ms) |
|---|---|
| ECC point multiplication (M) | 0.23 |
| Kyber key generation (G) | 0.08 |
| Kyber encapsulation (E) | 0.12 |
| Kyber decapsulation (D) | 0.14 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Savón-Berenguer, A.; Moraru, S.-A.; García-Naranjo, J.C.; Braeken, A. A Lightweight Hybrid Authentication and Key Agreement Protocol for Decentralized Device-to-Device Communication with Post-Quantum Confidentiality. Sensors 2026, 26, 3040. https://doi.org/10.3390/s26103040
Savón-Berenguer A, Moraru S-A, García-Naranjo JC, Braeken A. A Lightweight Hybrid Authentication and Key Agreement Protocol for Decentralized Device-to-Device Communication with Post-Quantum Confidentiality. Sensors. 2026; 26(10):3040. https://doi.org/10.3390/s26103040
Chicago/Turabian StyleSavón-Berenguer, Asday, Sorin-Aurel Moraru, Juan Carlos García-Naranjo, and An Braeken. 2026. "A Lightweight Hybrid Authentication and Key Agreement Protocol for Decentralized Device-to-Device Communication with Post-Quantum Confidentiality" Sensors 26, no. 10: 3040. https://doi.org/10.3390/s26103040
APA StyleSavón-Berenguer, A., Moraru, S.-A., García-Naranjo, J. C., & Braeken, A. (2026). A Lightweight Hybrid Authentication and Key Agreement Protocol for Decentralized Device-to-Device Communication with Post-Quantum Confidentiality. Sensors, 26(10), 3040. https://doi.org/10.3390/s26103040

