Next Article in Journal
A Systematic Review of Ontology–AI Integration for Construction Image Recognition
Previous Article in Journal
Service Mode Switching for Autonomous Robots and Small Intelligent Vehicles Using Pedestrian Personality Categorization and Flow Series Fluctuation
Previous Article in Special Issue
Global Navigation Satellite System Spoofing Attack Detection Using Receiver Independent Exchange Format Data and Long Short-Term Memory Algorithm
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Lightweight One-to-Many User-to-Sensors Authentication and Key Agreement

1
ARCAS Research Center, Computer Science Department, Modern University for Business and Science, Beirut P.O. Box 113-7501, Lebanon
2
Faculty of Technology, Lebanese University, Saida P.O. Box 6573/14, Lebanon
3
Lab-STICC, UMR 6285—CNRS, ENSTA, Institut Polytechnique de Paris, 29200 Brest, France
4
Faculty of Arts & Sciences, Holy Spirit University of Kaslik, Jounieh P.O. Box 446, Lebanon
5
CIRAME Research Center, Business School, Holy Spirit University of Kaslik, Jounieh P.O. Box 446, Lebanon
*
Author to whom correspondence should be addressed.
Information 2026, 17(1), 47; https://doi.org/10.3390/info17010047
Submission received: 29 November 2025 / Revised: 16 December 2025 / Accepted: 23 December 2025 / Published: 4 January 2026
(This article belongs to the Special Issue Extended Reality and Cybersecurity)

Abstract

The proliferation of Internet of Things (IoT) deployments demands Authentication and Key Agreement (AKA) protocols that scale from one initiator to many devices while preserving strong security guarantees on constrained hardware. Prior lightweight one-to-many designs often rely on a network-wide secret, reuse a single group session key across devices, or omit Perfect Forward Secrecy (PFS), leaving systems vulnerable to compromise and traffic exposure. To this end, we present in this paper a lightweight protocol, named Lightweight One-To-many User-to-Sensors Authentication and Key Agreement (LOTUS-AKA), that achieves mutual authentication, PFS, and per-sensor key isolation while keeping devices free of public-key costs. The user and gateway perform an ephemeral elliptic-curve Diffie–Hellman exchange to derive a short-lived group key, from which independent per-sensor session keys are expanded via Hashed Message Authentication Code HMAC-based Key Derivation Function (HKDF). Each sensor receives its key through a compact Authenticated Encryption with associated data (AEAD) wrap under its long-term secret; sensors perform only hashing and AEAD, with no elliptic-curve operations. The login path uses an augmented Password-Authenticated Key Exchange (PAKE) to eliminate offline password guessing in the smart-card theft setting, and a stateless cookie gates expensive work to mitigate denial-of-service. We provide a game-based security argument and a symbolic verification model, and we report microbenchmarks on Cortex-M–class platforms showing reduced device computation and linear low-constant communication overhead with the number of sensors. The design offers a practical path to secure, scalable multi-sensor sessions in resource-constrained IoT.

1. Introduction

The development of Internet of Things (IoT) technology has greatly simplified people’s lives, allowing them to access real-time data from sensors thousands of miles away without leaving their homes [1]. However, due to the inherent nature of data transmission over public channels, incidents of information interception and tampering are a common occurrence [2].
Large-scale implementations of IoT regularly require an initiator (a user or a gateway) to establish protected channels with multiple sensors [3]. Repeating a one-to-one Authentication and Key Agreement (AKA) handshake n times wastes spectrum and energy, inflates latency, and magnifies the exposed attack surface at constrained devices [4]. The reason is two-fold: (i) each node must expose and parse additional handshake/certificate code paths that empirical studies show, which are prone to state-machine and parsing flaws exploitable for DoS or logic errors [5,6,7], and (ii) deployments of handshake-gating mechanisms (e.g., address-validation/anti-amplification) can still be bypassed or abused, leaving residual flooding vectors [8,9,10].
These pressures motivate one-to-many AKA: a single protocol run that yields fresh keys with a set of sensors while keeping device-side costs low. Prior “lightweight” approaches push public-key work to a more capable party and leave hashing or simple symmetric operations at sensors, achieving practical performance in IoT and Industrial IoT settings [11,12,13,14,15]. However, many such designs remain either (i) heavy on devices under realistic batching and revocation demands, or (ii) miss core guarantees such as Perfect Forward Secrecy (PFS), per-sensor key isolation, and a concrete rekey path, which are essential in adversarial, high-churn deployments [16].

1.1. Limitations of Prior Scheme(s)

Lack of true PFS: Several one-to-many schemes derive final session material primarily from long-term server, device secrets or static group values, so post-compromise disclosure of these values can retrospectively expose past traffic. In particular, designs that omit an ephemeral Diffie–Hellman (DH) contribution in the key schedule cannot claim PFS.
To overcome this limitation, we confine a fresh ephemeral Elliptic Curve Diffie–Hellman (ECDH) to the user–gateway path and base the entire session on that secret.
Single network-wide secret: Some constructions rely on a gateway-chosen value shared across all sensors (e.g., to mask identities or authenticate broadcasts). Compromising any one node then deanonymizes or weakens the entire fleet.
In this paper, we eliminate network-wide secrets; all derivations and authenticity checks are conducted under per-sensor long-term keys managed at the gateway registry.
Group key shared by all sensors: To save messages, a single group session key is often delivered to every sensor in the batch. This couples confidentiality across devices: the weakest sensor compromises the rest.
To fix this weakness, we adopt a two-tier schedule—derive a short-lived group key, then expand per-sensor keys—to deliver each securely via a compact Authenticated Encryption with associated data (AEAD) wrap under that sensor’s long-term secret.
Offline guessing under smart-card theft: Login paths that store verifier material on the card (or server) without augmentation enable offline dictionary attacks if the card or database is copied.
To mitigate this attack, we integrate an augmented Password-Authenticated Key Exchange (PAKE) so the server-side secret is required to validate guesses, hence, closing the stolen-card gap.
Timestamp-only DoS control: Many “lightweight” designs accept messages if a timestamp falls within a window, which is cheap for attackers to satisfy and does not gate expensive operations.
This limitation is fixed using a stateless cookie/Message Authentication Code (MAC) before-work gate at the gateway with minimal checks at sensors so unauthenticated requests cannot trigger heavyweight processing.

1.2. Our Contributions

In this paper, we present a Lightweight One-To-many User-to-Sensors Authentication and Key Agreement (LOTUS-AKA) protocol that preserves device frugality while restoring missing guarantees.
  • One-to-many with PFS, no Elliptic-Curve Cryptography (ECC) on sensors: a single ephemeral ECDH between user and gateway yields a secret session; sensors perform only hashing and AEAD, without any elliptic-curve operations.
  • Per-sensor keys without network-wide secrets: we derive a short-lived group key GK , expand per-sensor, and deliver them via AEAD wraps under each sensor’s long-term key, thus removing any shared masking value.
  • Augmented-PAKE login: the user login is hardened with an augmented PAKE, eliminating offline password guessing even if a smart card or server database is copied.
  • Stateless DoS cookie: a MACed cookie authenticates the initiator before any heavyweight work at the gateway; sensors verify a cheap tag before state allocation.
  • Revocation and rekey: we provide a Logical Key Hierarchy (LKH)-style mechanism with subset wrapping to revoke sensors and rotate long-term keys with bounded broadcast cost.
  • Security analysis: we provide an Extended Canetti–Krawczyk eCK/ CK + -style proof for AKE security and privacy (anonymity/unlinkability) [17] and validate the design with a ProVerif/Tamarin model [18].
  • Performance: measurements on Cortex-M–class Microcontroller Units (MCUs) show lower device computation and linear, low-constant communication/energy versus repeated one-to-one handshakes and recent one-to-many baselines.
The rest of the paper is organized as follows: Previous works is presented and discussed in Section 2. Section 3 introduces the background and the used preliminaries. The LOTUS-AKA Protocol is proposed in Section 4. In Section 5, we present the complete security analysis for the LOTUS-AKA Protocol. The evaluation of the proposed protocol is performed in Section 6. Section 7 presents the conclusion with future works.

2. Related Work

This section reviews prior work most relevant to lightweight, one-to-many AKA for IoT and WSN deployments. We group the literature into (i) standard one-to-one AKEs for constrained devices; (ii) broadcast and group-oriented authentication; (iii) group key management and subset rekeying; (iv) smart-card and multi-server schemes adapted to IoT; (v) DoS and availability defenses in handshakes; and (vi) symmetric-crypto choices and KDFs on MCUs.

2.1. One-to-One AKE for Constrained Devices

Transport-layer designs such as Datagram Transport Layer Security (DTLS) deliver mutual authentication and channel security over datagrams; DTLS 1.2 introduced a stateless cookie to reduce amplification, while DTLS 1.3 streamlined the handshake along TLS 1.3 lines [19,20]. Application-layer protection via OSCORE moves security to the Constrained Application Protocol (CoAP) message layer and composes cleanly with constrained transports [21]. Ephemeral Diffie–Hellman Over COSE (EDHOC), standardized by the Lightweight Authenticated Key Exchange Working Group (IETF LAKE WG), offers a compact AKE that pairs naturally with OSCORE [22,23,24]. These protocols are mature and well analyzed, but they are fundamentally one-to-one: a controller addressing n sensors typically repeats the handshake n times (1 → 1 repeated), amplifying ECDH/PAKE cost and airtime. Moreover, if sensors participate in ECC, the device code, energy, and timing budget grow accordingly.

2.2. Broadcast and Group-Oriented Authentication

Early WSN systems pushed cost to the sender and the network using symmetric pre-distribution and delayed-disclosure broadcast authentication (TESLA and variants) to avoid per-packet public-key work [25]. Later controller-to-many proposals derive a group key once and distribute per-node material. However, many “lightweight” designs optimize device code by (i) assuming a network-wide secret shared across verifiers, (ii) masking a batch group key with hashes or XOR without binding to a full transcript, and (iii) relying on timestamps for freshness. As a result, compromise of a single node or the controller’s long-term secret can retroactively expose past sessions, and simple cut-and-paste across runs may succeed when identities and context are not authenticated in associated data. In contrast, our design keeps the sender convenience (one broadcast plus n short ACKs) but eliminates network-wide secrets, derives a Group Key GK from an ephemeral ECDH visible only to users and gateways, and AEAD-wraps per-sensor shares under sensor keys with transcript-bound associated data (AD), achieving per-sensor isolation and modern freshness.

2.3. Group Key Management and Subset Rekeying

Logical Key Hierarchy (LKH) and related key-graph methods achieve scalable rekeying for a number of group members n (users/devices) in the secure group: joins and leaves cost O ( log n ) messages instead of O ( n ) by organizing members in a tree [26,27].
Subset-cover broadcast encryption (e.g., the subset-difference construction) provides alternative trade-offs among cover size, state, and revocation latency [28]. These tools power secure multicast, pay-TV, and IoT fleet management. Our protocol composes naturally with either approach: the gateway can wrap GK to the addressed subset using per-sensor AEADs (our default) or compact subset covers without changing device code. Optional key evolution on devices further limits damage from late device compromise when secure erasure is feasible.

2.4. Smart-Card and Multi-Server Authentication in IoT

A large thread of the IoT literature adapted multi-server, smart-card-based logins to gateways and sensors. Despite being labeled “lightweight,” many such designs avoid public-key cryptography on devices using system-wide symmetric verifiers and timestamp-only replay control, or by masking batch keys with unbound hashes. Analyses repeatedly identified absence of true PFS (no ephemeral DH); offline dictionary attacks once a card is copied; cross-device compromise due to network-wide secrets; and transcript splicing because identities and freshness are not authenticated in an AEAD AD. Our approach addresses the exact issues enumerated in Section 1.1: the only public-key work is an ephemeral ECDH between U and G; sensors do symmetric crypto only; user login is via augmented PAKE (OPAQUE-style), which eliminates offline guessing under card theft; and all ciphertexts are bound to identities and transcript via AEAD AD.

2.5. DoS and Availability in Handshakes

Stateless cookies gate expensive processing by requiring an initiator to echo a MACed token before the responder allocates state or runs heavy cryptography. This pattern appears in DTLS (1.2 HelloVerify, 1.3 cookie-based retry), Internet Key Exchange Protocol Version 2 (IKEv2) cookies, and Quick UDP Internet Connections (QUIC) retry with anti-amplification [19,20,29,30]. On constrained gateways and sensors, MAC-before-work, constant-time parsing, and bounded replay windows (timestamps plus counters) are critical to maintain availability under floods. Our cookie and pseudonym checks enforce these gates before any AEAD open or HKDF work.

2.6. Primitives on MCUs: AEAD and KDF

AEAD protects confidentiality and integrity while binding additional headers. AES-GCM is widely hardware-accelerated (ChaCha20–Poly1305 performs well in software on MCUs without AES engines [31,32]). For key derivation, KDF’s extract-then-expand design is simple and robust, with strong PRF-based proofs and broad deployment [33]. For ECDH between U and G, X25519 provides compact, constant-time scalar multiplication with ubiquitous library support [34]. Our evaluation echoes prior observations: on Cortex-M0, ChaCha20–Poly1305 minimizes per-sensor latency; on Cortex-M4/M7 with AES, AES-GCM is preferable.

2.7. Positioning

Table 1 presents a comparison among the existing protocols/families and our proposed LOTUS-AKA protocol with respect to several criteria. Standard 1 → 1 AKEs (DTLS, EDHOC+OSCORE) are excellent for pairwise channels but scale poorly when a user must reach many sensors at once. WSN-era broadcast techniques amortize sender cost but typically lack modern guarantees such as per-sensor isolation and PFS under device compromise. Smart-card multi-server proposals often fall to the Section 1.1 issues: network-wide keys, no ephemeral DH, timestamp-only replay control, and offline dictionary under card theft. LOTUS-AKA occupies the intersection: one ECDH per run (off-device), per-sensor AEAD wraps with transcript-bound AD, augmented PAKE login, stateless DoS cookie gates, and straightforward composition with LKH or subset covers.

3. Background and Preliminaries

3.1. Notation and Cryptographic Primitives

We use standard elliptic-curve groups over either NIST P–256 or X25519 for ephemeral Diffie–Hellman. Let G denote the base point, and let x Z q be a uniformly random scalar with public point X = x G . Key derivation employs HKDF with H = SHA256; message authentication uses HMAC over H . Authenticated Encryption uses an AEAD scheme (either AES–GCM or ChaCha20–Poly1305) with associated data (AD) binding identities, counters, timestamps, and transcript hashes. The password login is instantiated with an augmented PAKE with OPAQUE-style, so the server stores a hardened record while the client holds only an opaque envelope (for complete Notation summary, see Table 2).

Security Assumptions and Proof Oracles

Our game-based analysis relies on hardness of CDH/X25519, PRF/RO behavior of H and HKDF , and IND–CCA security of the AEAD. We use standard AKE oracles: Send (activate a protocol step), Reveal (expose a completed session key), EphemeralReveal (expose fresh DH scalars in eCK/ CK + ), StateReveal (long-term state), Corrupt (compromise of users/sensors), and  Test (real-or-random key indistinguishability). Privacy is modeled via anonymity/unlinkability queries that challenge the adversary to distinguish identities or link sessions given full transcripts and allowable side information. Freshness excludes sessions where the attacker learns the joint DH secret or both parties’ long-term keys prior to Test .

3.2. System and Trust Model

Before we start with the system and trust model, it is necessary to define some conventions and notations:
All protocol values are byte strings. We write ‖ for bytewise concatenation. A deterministic, injective encoder enc ( · ) serializes structured values to bytes: enc ( SID j ) is the length-prefixed UTF-8 encoding of the sensor identifier; enc ( s ) is the fixed-length big-endian encoding of the κ -bit secret s.
  • λ : Output length of the hash (bits), e.g.,  λ = 256 .
  • H : { 0 , 1 } { 0 , 1 } λ : Cryptographic hash (e.g., SHA-256).
  • S I D j { 0 , 1 } : Public identifier of sensor S j .
  • s { 0 , 1 } κ : Gateway master secret.
  • ‖: Byte-string concatenation.
  • enc ( · ) : Deterministic, injective byte encoding.
Entities: A user U (operator/app), a gateway G (registry, policy, and broadcast engine), and a set of sensors { S j } (resource constrained, symmetric-only).
Keys: The gateway samples a master secret s Z q . For each sensor with identifier SID j , the long-term per-sensor secret is presented as follows:
s k j = H ( SID j   s ) .
s k j = H S I D j s = H enc ( S I D j ) enc ( s ) .
The gateway maintains a registry SID j , s k j . Users authenticate with G via an augmented PAKE credential; no plaintext password verifiers are stored at G, and user devices hold only an opaque PAKE envelope.
Adversary: We assume a Dolev–Yao network adversary with full control over delivery and ordering of messages (eavesdrop, inject, replay, and delay). The adversary may attempt device capture (including extraction of a smart card or a sensor), offline dictionary attacks, and partial compromise of server-side state. Clocks are loosely synchronized with a skew bound Δ ; protocols additionally bind nonces/counters to each session to prevent replays even under clock drift.
We model loose synchronization by a bound Δ such that i , j , t : | C i ( t ) C j ( t ) | Δ . In practice set Δ = 2 ρ max τ + ε sync from oscillator drift ρ max , resync interval τ , and residual offset ε sync , where:
  • C i ( t ) : Local clock reading of node i at physical time t (seconds), assumed monotone.
  • ρ max : Worst-case relative drift (frequency error) of clocks (e.g., in ppm).
  • τ : Upper bound on the interval between (re-)synchronization events.
  • ε sync : Residual clock offset immediately after a sync exchange (accounts for delay asymmetry).

3.3. Design Goals

Our protocol targets the following properties:
  • Mutual authentication  between U and each S j via G.
  • Perfect Forward Secrecy (PFS) from an ephemeral ECDH between U and G.
  • Key-compromise impersonation (KCI) resistance and key indistinguishability.
  • Privacy: user anonymity and sensor unlinkability from public transcripts.
  • Per-sensor confidentiality: even within one batch run, keys S K j are isolated across sensors.
  • Replay and DoS resistance: timestamps + nonces/counters, and a stateless MACed cookie that gates expensive work.
  • Efficiency and scalability: sensors perform only hash/HMAC/AEAD; communication scales linearly with the number of addressed sensors with small constants.
  • Revocation/rekey: operator can revoke sensors and rotate long-term material using a lightweight Logical Key Hierarchy (LKH) with subset wrapping.

4. Lightweight One-to-Many User-to-Sensors Authentication and Key Agreement (LOTUS-AKA) Protocol

4.1. Setup and Registration

Algorithm 1 outlines the setup and registration part. In details:
Gateway: The gateway G selects an elliptic-curve group (P–256 or X25519) with base point P, and samples a master secret s Z q .
Sensor registration: For each sensor with identifier SID j , G derives a long-term per-sensor secret
s k j = H ( SID j   s ) ,
and stores the registry entries SID j , s k j . No network-wide key is ever created or distributed. User registration/login: Users authenticate to G via an augmented PAKE with OPAQUE-style. The server stores a hardened PAKE record; the user device (or card) holds only an opaque envelope. Thus, neither side alone enables offline password guessing if compromised. In other words, we store a hardened PAKE record as a verifier, not the password. That means, instead of storing the password, the server stores a hardened verifier produced with a memory-hard password hashing function (Argon2id) using a per-user salt and tuned cost parameters, optionally protected with a server-side pepper/HSM [35,36]. With OPAQUE, the server keeps only an OPRF seed and an encrypted credential “envelope” created at registration; the server never learns the password and a leaked database does not enable offline guessing [37,38]
Algorithm 1: LOTUS-AKA Setup and Registration.
   State: Gateway registry R initially empty
1 Gateway G: choose curve (P-256 or X25519) with base point P; sample master secret
      s Z q  ;
2 Sensor registration (each   S j   with identifier SID j ):;
3     s k j H ( SID j   s ) ; store SID j , s k j in R (no network-wide key);
4 User registration/login (augmented PAKE, OPAQUE-style);
5    server stores a hardened PAKE record; user device/card stores an opaque envelope (no plaintext password);
   Sensors do not derive the current group key G K from their long-term secret. Instead, after the user–gateway run establishes a new G K , the gateway distributes G K to each addressed sensor S j by encapsulating it with Authenticated Encryption under the sensor’s secret key s k j . Concretely, the gateway includes in the broadcast a per-sensor identifier π j and an AEAD ciphertext Wrap j that encrypts G K with associated data binding (e.g., S I D j , timestamp/nonce, and epoch). Each sensor computes its own π j , locates the matching tuple in the broadcast, and performs AEAD _ Open s k j ( Wrap j ) to recover G K , from which it derives its per-sensor session key S K j using the specified key-derivation step.
By default, G K is refreshed on every one-to-many authentication session because it is derived from fresh user–gateway ephemeral material.

4.2. One-to-Many Authentication and Key Agreement

Let S = { j 1 , , j m } be the subset of addressed sensors in this run, b Z q the user’s fresh scalar with X = b P , and  y Z q the gateway’s fresh scalar with Y = y P . Let τ denote the running transcript hash bound into all KDFs/AEAD AD. Figure 1 illustrates a concrete example of subset-tag encoding and gateway-side expansion.
Algorithm 2 tracks the steps to apply the one-to-many authentication and key agreement.
(1)
User → Gateway
The user U sends a request containing (i) the PAKE finish tag, (ii) a response to a stateless DoS cookie issued earlier by G, (iii) the sensor subset descriptor for S (optionally anonymized as a policy tag), and (iv) the ephemeral X = b P . Sensor identifiers do need not to appear clearly when anonymity is required.
(2)
Gateway processing
Upon verifying the PAKE finish and cookie, G samples y, sets Y = y P , and computes the ECDH shared secret Z = KDF ( b Y ) = KDF ( y X ) . It derives a short-lived group key
GK = HKDF ( Z , info = τ ) ,
which never leaves U and G clearly.
τ is the HKDF info context string providing domain separation.
(3)
Per-sensor wrapping and broadcast
For each j S , G computes a per-run pseudonym and wrap:
π j =   HMAC s k j TS     ctr , Wrap j = AEAD s k j GK ; AD =   SID j     TS     τ .
G broadcasts a single message
{ Y , TS , ctr , { π j , Wrap j } j S } ,
optionally alongside a compact policy tag instead of explicit SID j values (for anonymity; sensors recover by trial on π j ). Information 17 00047 i001aInformation 17 00047 i001b
(4)
Sensor S j processing
Each sensor verifies the cheap cookie/tag and finds its entry by testing π j under s k j . It opens Wrap j using AEAD to obtain GK , and derives its independent session key
S K j = HKDF GK , info = SID j     UID     τ .
It returns an authenticated confirmation MAC j = HMAC S K j ( τ     role ) to G.
(5)
User key confirmation
The user recomputes Z = KDF ( y X ) and GK from X , Y , derives all { S K j } j S locally, and verifies the returned MAC j values (either relayed by G or observed directly). An optional final acknowledgment from U completes the run.

4.3. Rationale and Differences

Perfect Forward Secrecy (PFS): Only the U↔G path performs ephemeral ECDH; session material depends on Z and is therefore forward–secret even if s or any s k j are later compromised.
Per-sensor isolation: A two-tier schedule is used: a short-lived group key GK expands to independent S K j values via HKDF ; each S K j is delivered implicitly by opening Wrap j . Compromise of one sensor does not expose other sensors’ keys.
No XOR masking, no network-wide secret: The design removes any single value shared by all sensors. Identity protection and delivery authenticity are enforced via π j and AEAD under s k j .
Lightweight sensors: Sensors perform only hash/HMAC and AEAD (no elliptic-curve), fitting MCU-class devices.
Practical hardening: The augmented PAKE eliminates offline guessing under card theft; a stateless MACed cookie gates expensive work at G; timestamps and per-session counters prevent replays; revocation/rekey are handled separately via LKH with subset wrapping as detailed and presented in Algorithm 3. Information 17 00047 i002aInformation 17 00047 i002b
Figure 2 depicts the one-to-many AKA run between the user U, the gateway G, and the sensor set { S j } (Please refer to Table 3 for the definition of the variables used in the one-to-many AKA run). First, U sends a single request to G carrying the PAKE finish tag, the response to a stateless DoS cookie, an (optionally anonymizing) subset tag for the addressed sensors, and the user’s ephemeral X = b P . After validating the PAKE and cookie, G samples y, sets Y = y P , computes the ECDH secret Z = KDF ( y X ) , and derives a short-lived group key GK = HKDF ( Z , τ ) , where τ is the running transcript hash. For each target sensor S j , G then forms a pseudonym π j = HMAC s k j ( TS     ctr ) and a compact wrap Wrap j = AEAD s k j GK ; AD = SID j     TS     τ , and broadcasts a single message { Y , TS , ctr , ( π j , Wrap j ) j } to the whole set. Each S j identifies its entry via π j , opens Wrap j using its long-term key s k j to recover GK , derives an independent per-sensor key S K j = HKDF ( GK , SID j     UID     τ ) , and returns a short confirmation MAC j = HMAC S K j ( τ ) . The user (directly or via G) verifies these MAC j values after recomputing Z and GK from ( X , Y ) . Only U and G perform ephemeral ECDH (yielding PFS); sensors remain hash/AEAD-only. Because no network-wide secret is used and keys are derived per sensor, compromise of one device does not endanger others, and a single broadcast plus n short replies scales efficiently to large batches.

5. Security Analysis

This section sketches why LOTUS-AKA protocol meets its goals under standard assumptions. We use a game-based approach for AKE security and privacy, and complement it with symbolic verification.

5.1. Proof Roadmap (Game-Based)

We follow the standard computational model: a probabilistic polynomial-time (PPT) adversary is a (possibly non-uniform) randomized oracle machine  A that, with the input of the security parameter 1 λ , runs in time poly ( λ ) and interacts with the CK + /eCK experiment via the usual oracles ( Send , Reveal , EphemeralReveal , StateReveal , Corrupt , and Test ). All success probabilities/advantages are taken over the coins of the experiment and of  A ; security requires every PPT adversary’s advantage to be negligible in  λ .
Before stating the theorems, it is beneficial to describe some parameters:
  • B denotes a probabilistic polynomial-time oracle machine that runs the AKE adversary  A as a subroutine and leverages its view/queries to attack an underlying primitive. The quantity Adv B is B ’s success/advantage in the corresponding security game (standard in reduction-based proofs).
  • λ : Security parameter; all algorithms are PPT in 1 λ .
  • Adv A ake : Adversary A ’s AKE advantage in the CK + /eCK indistinguishability experiment (distinguishing a fresh session key from uniform under the standard oracle interface).
  • Adv B 1 pake : Advantage of some PPT reduction B 1 in breaking the underlying PAKE security experiment (following BPR-style PAKE definitions).
  • Adv B 2 prf ( HKDF ) : PRF advantage of B 2 against the HMAC-based HKDF-Expand function (modeled as a keyed PRF on its input). Formally, | Pr [ B 2 F = 1 ] Pr [ B 2 R = 1 ] | , where F is HKDF-Expand and R is a random function.
  • Adv B 3 aead : AEAD advantage of B 3 against the symmetric cipher (aggregate of privacy IND-CPA/nonce-respecting and integrity INT-CTXT advantages for associated data).
  • Adv B 4 cdh : Success probability of B 4 in solving the Computational Diffie–Hellman problem in the chosen group (given ( g , g a , g b ) , output g a b ).
  • negl ( λ ) : A negligible function in  λ .
Theorem 1
(AKE security under CK + /eCK). Let  A be a PPT adversary in the CK + /eCK setting with access to Send , Reveal , EphemeralReveal , StateReveal , Corrupt , and  Test oracles. Then, for any fresh session between U and S j ,
Adv A ake Adv B 1 pake + Adv B 2 prf ( HKDF ) + Adv B 3 aead + Adv B 4 cdh + negl ( λ ) .
Proof. 
(i) Replace the augmented-PAKE transcript with an ideal functionality; any distinguishing advantage reduces to the PAKE security of the underlying scheme. (ii) Replace AEAD by an ideal ( IND - CCA , INT - CTXT ) channel; any forgery or decryption advantage reduces to AEAD security. (iii) Replace Z = KDF ( y X ) by a uniform key using the CDH/X25519 hardness (via a standard DDH/CDH-style hybrid for ephemeral ECDH). (iv) Replace HKDF (extract&expand with SHA-256) by a PRF/RO; any bias in GK or S K j becomes a PRF distinguisher. After these hops, the Test oracle returns a key computationally indistinguishable from random, yielding the bound. Freshness follows CK + /eCK conventions: revealing long-term user or sensor keys (or one side’s ephemeral) without jointly exposing the session DH secret keeps the tested session fresh.
Let Hyb 0 be the real CK + /eCK AKE experiment and let Hyb 4 be the ideal one where the Test key is uniform. We transform Hyb 0 into Hyb 4 in four hops, each paid for by a standard advantage term; all oracles ( Send/Reveal/EphemeralReveal/StateReveal/Corrupt/Test ) and freshness are simulated exactly as in [39,40].
( Hyb 0 Hyb 1 PAKE idealization). Replace the real PAKE subroutine with its ideal experiment (BPR-style). A reduction B 1 uses any AKE distinguisher to win the PAKE game, so
Pr [ Hyb 0 1 ] Pr [ Hyb 1 1 ] Adv B 1 pake .
( Hyb 1 Hyb 2 HKDF as PRF). Replace each call to HKDF-Expand by an oracle that is either the real PRF or a random function. A reduction B 2 turns any change in A ’s success into a PRF win:
Pr [ Hyb 1 1 ] Pr [ Hyb 2 1 ] Adv B 2 prf ( HKDF ) .
( Hyb 2 Hyb 3 AEAD privacy and integrity). Answer all protocol encryptions/decryptions using the AEAD challenger; any successful privacy distinction or ciphertext forgery by A provides an AEAD win to B 3 :
Pr [ Hyb 2 1 ] Pr [ Hyb 3 1 ] Adv B 3 aead .
( Hyb 3 Hyb 4 Diffie–Hellman hardness). Embed a CDH instance into the ephemeral DH exchange (e.g., set one party’s ephemeral public key to a challenge point). If  A still distinguishes the Test key from random in a fresh session, B 4 extracts a b P , solving CDH:
Pr [ Hyb 3 1 ] Pr [ Hyb 4 1 ] Adv B 4 cdh .
Finally, by the triangle inequality and since in Hyb 4 the Test key is uniform,
Adv A ake = Pr [ Hyb 0 1 ] 1 2 i = 0 3 Pr [ Hyb i 1 ] Pr [ Hyb i + 1 1 ] + negl ( λ ) ,
which yields
Adv A ake Adv B 1 pake + Adv B 2 prf ( HKDF ) + Adv B 3 aead + Adv B 4 cdh + negl ( λ ) .
The negligible term covers standard bad events (e.g., collisions, and freshness failure) under our assumptions.    □
Theorem 2
(Post-compromise secrecy of Z, GK , and  S K j ). Let U and S j complete a fresh session producing the shared Diffie–Hellman value Z = x y P G and derive keys via GK HKDF ( Z ; info = τ ) and S K j HKDF ( GK ; info = sk     SID j     τ ) . If, after this completion, the gateway master secret s is revealed, then for any PPT adversary A in the CK + /eCK model, the AKE distinguishing advantage satisfies
Adv A ake Adv B 4 cdh + Adv B 2 prf ( HKDF ) + negl ( λ ) ,
hence, Z, GK , and all S K j from that session remain indistinguishable from random.
Proof. 
We use a standard sequence of games. Let λ be the security parameter, and let negl ( λ ) denote a negligible function.
Game G 0 (Real): This is the real CK + /eCK experiment for A with a fresh test session. Let Adv 0 = Pr [ b = 1 ] 1 2 be A ’s distinguishing advantage.
Game G 1 (Enforce freshness): Identical to G 0 , except the game aborts if A violates freshness (e.g., reveals the test session’s long-term or ephemeral secrets). Because the tested session is fresh by hypothesis, Pr [ G 0 G 1 ] = 0 and Adv 1 = Adv 0 .
Game G 2 (Hide Z by hardness of CDH): We change only how keys are conceptually computed as follows: keep the public transcript ( P , X = x P , Y = y P , τ , SID j ) exactly as in G 1 , but regard the seed fed to HKDF as unknown to A unless it can compute Z = x y P from ( P , X , Y ) . By the computational Diffie–Hellman assumption, any PPT algorithm that outputs Z from ( P , X , Y ) has advantage at most Adv B 4 cdh . Equivalently, conditioned on the transcript, Z is computationally unpredictable; thus, Z retains (computational) min-entropy κ = Θ ( λ ) . Therefore the transition G 1 G 2 changes A ’s view by at most Adv B 4 cdh :
Adv 1 Adv 2 Adv B 4 cdh .
Game G 3 (Replace HKDF outputs by random via PRF security): Since in G 2 the HKDF input has high (computational) entropy unknown to A , we use that HKDF (Extract-then-Expand with HMAC) is a pseudorandom function/extractor. Replace HKDF ( · ; info ) at all points (for GK and for each S K j ) by a truly random function with the same interface. By the PRF security of HKDF, this changes A ’s advantage by at most Adv B 2 prf ( HKDF ) ; any residual statistical slack from extraction (e.g., collision or leftover-hash-style terms) is absorbed in negl ( λ ) :
Adv 2 Adv 3 Adv B 2 prf ( HKDF ) + negl ( λ ) .
Concluding bound: In G 3 , the test key is independent of the transcript and uniformly random, so Adv 3 = 0 . By the triangle inequality over the hops G 0 G 1 G 2 G 3 ,
Adv A ake = Adv 0 Adv 0 Adv 1 = 0 + Adv 1 Adv 2 Adv B 4 cdh + Adv 2 Adv 3 Adv B 2 prf ( HKDF ) + negl ( λ ) Adv B 4 cdh + Adv B 2 prf ( HKDF ) + negl ( λ ) .
Finally, revealing the gateway master secret s after completion does not help compute Z (since x , y are erased), nor distinguish HKDF outputs in G 3 ; hence, Z, GK , and every S K j from that session remain indistinguishable from random.    □
Theorem 3
(Privacy). User anonymity and sensor unlinkability hold against a network adversary.
Proof. 
User identity is hidden by the augmented-PAKE (server-aided, no verifier for offline guessing). Sensors appear only via per-session pseudonyms π j = HMAC s k j ( TS     ctr ) ; without s k j , π j is a PRF output that changes with ( TS , ctr ) , preventing cross-run linkage. SID j is never sent in the clear text when the subset tag is anonymized; associated data (AD) binds identities to ciphertexts without revealing them.    □
Theorem 4
(Resilience). Against a Dolev–Yao network adversary with access to Send ,   Reveal ,   EphemeralReveal ,   StateReveal , and  Corrupt oracles ( CK + /eCK freshness), the protocol resists (i) key-compromise impersonation (KCI), (ii) replay, (iii) man-in-the-middle and transcript-splicing, (iv) party impersonation without credentials, and (v) offline dictionary attacks under smart-card theft. It also enforces ciphertext integrity for per-sensor wraps and confirmations.
Proof. 
We argue each property under the assumptions used in Theorem 1 (augmented-PAKE security, AEAD IND - CCA and INT - CTXT , CDH hardness for X25519/P-256, and HKDF as a PRF).
(i) KCI resistance. Suppose the adversary learns the long-term credential of U (or a sensor S j ) and attempts to impersonate an honest peer to that corrupted party. A successful attack would require producing a session key consistent with an accepting transcript without knowledge of the fresh ECDH secret Z = KDF ( y X ) . In CK + /eCK, a session is fresh if the adversary does not obtain both parties’ matching ephemeral secrets. Replacing Z by uniform (CDH hardness) and HKDF by a PRF (Theorem 1 hybrids) makes the test key indistinguishable from random unless the adversary breaks the augmented-PAKE finish to force acceptance on bogus ephemerals, which contradicts PAKE security. Thus, learning a party’s long-term key does not enable impersonation of another honest party to it.
(ii) Replay resistance. Each run binds a timestamp and counter ( TS , ctr ) into the transcript hash τ and into AEAD associated data. Replaying an old broadcast or an old confirmation MAC j would require either acceptance of a stale ( TS , ctr ) outside the window (rejected by the receiver) or the ability to alter ( TS , ctr , τ ) without detection, which would violate AEAD integrity or the PRF security of HMAC/HKDF.
(iii) Man-in-the-middle and transcript splicing. An active adversary cannot bias or splice the key schedule without detection: Z is derived from fresh ( b , y ) ; replacing X or Y to force a chosen Z reduces to solving CDH. Moreover, associated data authenticates SID j , ( TS , ctr ) , and  τ , binding identities and the full transcript to each ciphertext; any splice or mix-and-match breaks AEAD INT - CTXT .
(iv) Party impersonation. To impersonate the user to G, the adversary must complete the augmented-PAKE; by assumption, this is infeasible without the password (or an online attack that is rate-limited). To impersonate a sensor to U or G, the adversary must return a valid MAC j = HMAC S K j ( τ ) where S K j is derived from GK recovered by decrypting Wrap j . Forging such a confirmation without s k j or S K j violates AEAD IND - CCA (to learn GK ) or the PRF security of HKDF/HMAC (to compute S K j or the MAC).
(v) Smart-card theft and offline dictionary. The login uses an augmented PAKE (OPAQUE-style): the server stores a hardened record and the card stores only an opaque envelope. A copied card or server record alone yields no offline password oracle; any guessing requires online interaction and is detected/rate-limited, by the PAKE security definition.
Ciphertext integrity. Per-sensor wraps Wrap j and confirmations MAC j are protected, respectively, by AEAD INT - CTXT and by HMAC as a PRF; undetected modification or forgery would contradict these assumptions.    □

5.2. Symbolic Verification

We model the protocol in ProVerif (and Tamarin for sanity checks) with standard constructors for tuples, HMAC, HKDF, and AEAD (idealized as Authenticated Encryption with explicit AD). The model includes an active Dolev–Yao adversary, device-capture events, and cookie issuance/validation. We verify
  • Secrecy of S K j for honest U, G, and any S j not explicitly corrupted as follows: query attacker(SK_j) == false.
  • Authentication correspondence between U and each addressed S j : event end_U(j) implies event end_Sj(j) with matching transcript hash τ .
  • Unlinkability of sensor sessions: observational equivalence between two traces that swap the identities of two honest sensors while preserving the multiset of messages.
The models reflect the optional key-evolving variant for forward-secure wraps: s k j is advanced per epoch and previous values are erased, enabling queries about past sessions after a capture event at epoch e .

5.3. DoS and Availability

The gateway issues a stateless cookie (MAC over source IP/tuple, coarse timestamp, and a brief salt) that must be echoed by U before any AEAD processing or per-sensor work, implementing MAC-before-work. Parsing and MAC checks are constant-time with length and range validation to avoid parser bombs. Replays are bounded by a sliding window over ( TS , ctr ) , with transcript binding in AD blocking cut-and-paste across runs. On sensor nodes, a single cheap HMAC check over the cookie/pseudonym precedes state allocation, ensuring that unauthenticated traffic cannot force expensive operations or buffer exhaustion.
The base design attains PFS against server-side compromise and best-possible security for symmetric-only sensors; enabling the (one-line) key-evolving wrap hardens against post-compromise of sensors without adding public-key costs to devices. Overall, the bounds in Theorems 1–4 reduce attacks to well-studied assumptions (augmented-PAKE, AEAD, CDH/X25519, and HKDF-as-PRF) while keeping device computation strictly symmetric.

6. Performance Evaluation

We evaluate the protocol along operation counts (Table 4), bytes on the wire, and end-to-end latency/energy on MCU-class sensors and a commodity gateway. Our focus is the one-to-many setting where a user addresses n sensors in a single run.

6.1. Metrics and Setup

Metrics: We count (i) elliptic-curve scalar multiplications ( # ECC _ mult ) performed only by U and G; (ii) hashes/HMACs ( # HMAC/ # Hash ); (iii) authenticated encryptions/decryptions ( # AEAD ); and (iv) total bytes transmitted. For latency/energy, we report per-phase time (auth handshake, per-sensor wrap open) and the aggregate vs. n.
Platforms: Sensors are ARM Cortex-M0 and Cortex-M4 class MCUs (typical: 48–80 MHz, 16–256 KB RAM, 64–512 KB Flash) using constant-time HMAC-SHA256 and either AES-GCM or ChaCha20-Poly1305. The gateway is an x86_64 class CPU with hardware AES support. All code paths use fixed-length parsing and branch-free verification.

6.2. Microbenchmarks

We isolate (i) the U↔G ephemeral ECDH/OPAQUE finish (auth phase); (ii) per-sensor wrap open on S j (HMAC pseudonym test, AEAD open, HKDF-expand, and confirmation MAC). Let t AEAD open , t HMAC , and t HKDF denote per-operation times on the MCU; for a batch of n sensors, the sensor-side cost is
T sensor ( n ) t HMAC + t AEAD open + t HKDF + t HMAC ( per S j ) ,
while the user-side batch work after the ECDH is n · ( t HKDF + t HMAC ) to derive { S K j } and verify { MAC j } . Energy follows E = i I active · V · t i for each primitive i; we report both latency and energy as functions of n.

6.3. One-to-Many Baselines

In addition to the repeated one-to-one baseline (invoking a full 1 → 1 handshake n times), we compare LOTUS-AKA against representative lightweight one-to-many families that are commonly used as design patterns in IoT/WSN deployments. We instantiate these baselines using the same primitive choices and message-format conventions as our implementation (AEAD, HMAC/HKDF, and identical byte encodings), and we report the following metrics: sensor computation, gateway computation, bytes on air, and end-to-end latency (see Table 4).

6.3.1. B1: Shared Group-Key Broadcast (Single G K for All)

The gateway distributes one group session key G K that is shared by all receivers in the addressed set (or even all sensors), using a single AEAD-encrypted payload under a group credential. Sensors open the ciphertext to obtain G K and then (optionally) derive local traffic keys from G K (please see Table 5).

6.3.2. B2: LKH Subset Rekey (Distribute a Shared G K )

The gateway maintains a Logical Key Hierarchy (LKH) key tree and distributes a fresh shared G K to an addressed subset using an encrypted rekey messages. Each sensor stores O ( log N ) long-term node keys and opens at most one relevant rekey ciphertext to obtain G K .

6.3.3. B3: Broadcast Authentication Only (no AKA)

This family provides sender/broadcast authenticity with symmetric primitives and delayed disclosure or equivalent techniques, but does not establish per-sensor session keys via Key Agreement. We include it as an authenticity-only reference point for control-plane broadcasts (please see Table 6).
Let L hdr = L Y + L t s + L c t r and L tuple = L π + ( L G K + L t a g + L n o n c e ) .

6.4. Comparison with Baselines

Prior one-to-many schemes that derive a single group key and reuse it across sensors and a repeated one-to-one baseline that invokes a full handshake n times were studied. Our design keeps # ECC _ mult constant in n (only U and G do ECDH once) and shifts scaling to cheap symmetric operations. Communication is one broadcast of size O ( n + 1 ) and n short confirmations; the one-to-one baseline sends O ( n ) full handshakes. The results (Figure 3) show linear growth with a small slope for ours (dominated by one AEAD wrap per sensor), versus a much steeper slope when full ECDH+PAKE is repeated n times.

6.5. Variants and Sensitivity Analysis

We evaluate how specific design choices affect performance and robustness: (i) PAKE off (replaced with a pre-shared credential) to quantify login overhead; (ii) AEAD choice (AES-GCM vs. ChaCha20-Poly1305) to capture MCU/CPU asymmetries; (iii) Cookie off to measure gateway load and drop rate under adversarial floods. These what-if experiments isolate each component’s contribution to latency, energy, and availability.
Since sensors avoid ECC entirely, their per-sensor work is stable and predictable (one AEAD open, a few HMAC/HKDF evaluations). The gateway performs batched symmetric work with oneECDH per run. As n grows, communication dominates; our broadcast+ack pattern maintains low overhead per sensor and avoids n network handshakes. On Cortex-M0/M4, the slope of T sensor ( n ) is driven chiefly by AEAD _ open ; choosing ChaCha20-Poly1305 on M0 (no AES) and AES-GCM on M4/M7 (with hardware AES) yields the best latency/energy across the tested configurations.

6.6. Communication Cost vs. n (Figure 4)

Our curve grows linearly with a small slope because the broadcast has a small fixed header ( Y + TS + ctr ) and then adds one short tuple ( π j , Wrap j ) per sensor plus a 16 B confirmation. With the parameters used to generate the figure, this is roughly 44 + 92 n B. The 1 → 1 baseline must ship a full PAKE/ECDH transcript per sensor (modeled 600 B) plus a small confirmation, hence the much steeper slope. At n = 64 , the gap is ∼6 KB vs. ∼39 KB.
Figure 4. Payload bytes vs. number of sensors n: our one-to-many run (one broadcast + n short acks) vs. a repeated 1 → 1 baseline (full handshake n times).
Figure 4. Payload bytes vs. number of sensors n: our one-to-many run (one broadcast + n short acks) vs. a repeated 1 → 1 baseline (full handshake n times).
Information 17 00047 g004

6.7. AEAD Choice on MCUs (Figure 5)

On Cortex-M0 (no AES acceleration), ChaCha20-Poly1305 is faster (≈1.3 ms) than AES-GCM (≈2.8 ms). On Cortex-M4 with AES support, AES-GCM is best (≈0.62 ms) and ChaCha20-Poly1305 is slightly slower (≈1.12 ms). This supports a simple deployment rule: use ChaCha on M0-class boards; use AES-GCM on M4/M7 with hardware AES.
Figure 5. Per-sensor processing latency on Cortex-M0/M4 for AES-GCM and ChaCha20-Poly1305 (including HMAC pseudonym, AEAD open, HKDF-expand, and confirmation MAC).
Figure 5. Per-sensor processing latency on Cortex-M0/M4 for AES-GCM and ChaCha20-Poly1305 (including HMAC pseudonym, AEAD open, HKDF-expand, and confirmation MAC).
Information 17 00047 g005

6.8. DoS Resilience Under Adversarial Load (Figure 6)

The stateless cookie cheaply filters unauthenticated floods, so the gateway sustains close to its handshake cap even when attack traffic grows. Without the cookie, expensive parsing of junk requests starves the CPU and accepted sessions drop toward zero as the attack rate increases.
Figure 6. Accepted sessions per second vs. adversarial request rate. With a stateless cookie (MAC-before-work), throughput remains near the gateway’s capacity; disabling the cookie collapses throughput under flood.
Figure 6. Accepted sessions per second vs. adversarial request rate. With a stateless cookie (MAC-before-work), throughput remains near the gateway’s capacity; disabling the cookie collapses throughput under flood.
Information 17 00047 g006

6.9. Authentication Latency and Energy vs. n (Figure 3)

Because ECDH/PAKE is executed once per run (by U and G), our latency/energy increases gently with n, dominated by one AEAD open and a few hashes per sensor. The repeated 1 → 1 baseline redoes ECDH/PAKE for every sensor, so both latency and energy grow much faster with n.

7. Conclusions

This paper revisits the problem of authenticating a user to a set of constrained sensors and deriving fresh, confidential session keys in one shot. We identify concrete gaps in prior “lightweight” proposals—lack of true PFS, reliance on a network-wide secret, per-batch group keys that leak across sensors, offline guessing under smart-card theft, and weak DoS defenses—and address them with a design that keeps sensors strictly symmetric while moving ephemeral public-key work to the user and gateway.
The proposed LOTUS-AKA protocol performs a single ephemeral ECDH between U and G to derive Z and a transcript-bound group key GK via HKDF. The gateway then broadcasts one message that contains per-sensor, AEAD-wrapped material under long-term s k j , and short pseudonyms π j to let each sensor privately recognize itself. Each sensor opens exactly one AEAD, runs a few HMAC/HKDF calls, and returns a confirmation MAC; no ECC is required on devices. Login uses an augmented PAKE, eliminating offline dictionary attacks even if a card or server record is stolen. A stateless cookie enforces MAC-before-work at the gateway and sensors, mitigating floods without maintaining per-source state. Revocation and rekey are supported via subset wrapping (and optionally LKH), while an optional key-evolving variant for s k j strengthens post-compromise secrecy on devices that can securely erase.
We analyze security in the CK + /eCK style: AKE security reduces to the PAKE, AEAD, HKDF-as-PRF, and CDH/X25519 assumptions; PFS holds for server compromise and can be extended to sensor compromise with key evolution; privacy follows from PAKE-hidden user identifiers and per-session pseudonyms. A symbolic ProVerif/Tamarin model captures secrecy, correspondence, and unlinkability queries, including device capture and the cookie gate.
Our evaluation indicates that one ECDH per run plus n symmetric wraps yields latency and energy that grow gently with the number of sensors, while a repeated 1 → 1 baseline grows much faster. Communication similarly scales linearly with a small per-sensor increment. Microbenchmarks suggest choosing ChaCha20-Poly1305 on Cortex-M0 (no AES) and AES-GCM on Cortex-M4/M7 (with AES) for best per-sensor latency. Under adversarial load, the cookie preserves near-capacity throughput, whereas disabling it causes accepted sessions to collapse.
Overall, the design provides a practical, analyzable path to one-to-many AKA with strong security properties and deployable costs on Cortex-M-class devices.
Future work includes completing a full mechanized proof of the game-based reductions; integrating precise energy measurements from hardware boards; studying loss/retransmission on low-power links; tightening revocation at scale (e.g., LKH variants with constrained memory); and exploring post-quantum KEM drop-ins for the U G ephemeral while keeping sensors symmetric.

Author Contributions

Conceptualization, H.E.G. and A.A.-K.; Methodology, H.E.G., A.H.E.F., A.M. and A.N.; Software, H.E.G. and A.H.E.F.; Validation, H.E.G., A.M. and A.A.-K.; Formal analysis, A.H.E.F., A.A.-K. and A.N.; Investigation, H.E.G. and A.H.E.F.; Resources, A.H.E.F.; Data curation, A.A.-K.; Writing—original draft, H.E.G. and A.N.; Writing—review and editing, A.H.E.F., A.M., A.A.-K. and A.N.; Visualization, A.A.-K.; Supervision, A.M. and A.N.; Project administration, A.M.; Funding acquisition, A.M. and A.N. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors on request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Perwej, Y.; Haq, K.; Parwej, F.; Mumdouh, M.; Hassan, M. The internet of things (IoT) and its application domains. Int. J. Comput. Appl. 2019, 975, 182. [Google Scholar] [CrossRef]
  2. Makhdoom, I.; Abolhasan, M.; Lipman, J.; Liu, R.P.; Ni, W. Anatomy of threats to the internet of things. IEEE Commun. Surv. Tutor. 2018, 21, 1636–1675. [Google Scholar] [CrossRef]
  3. Kang, B.; Kim, D.; Choo, H. Internet of everything: A large-scale autonomic IoT gateway. IEEE Trans.-Multi-Scale Comput. Syst. 2017, 3, 206–214. [Google Scholar] [CrossRef]
  4. Hasan, M.K.; Weichen, Z.; Safie, N.; Ahmed, F.R.A.; Ghazal, T.M. A survey on key agreement and authentication protocol for internet of things application. IEEE Access 2024, 12, 61642–61666. [Google Scholar] [CrossRef]
  5. Fiterau-Brostean, P.; Jonsson, B.; Merget, R.; De Ruiter, J.; Sagonas, K.; Somorovsky, J. Analysis of DTLS implementations using protocol state fuzzing. In Proceedings of the SEC’20: 29th USENIX Conference on Security Symposium, Berkeley, CA, USA, 12–14 August 2020; pp. 2523–2540. [Google Scholar]
  6. Walz, A.; Sikora, A. Exploiting dissent: Towards fuzzing-based differential black-box testing of TLS implementations. IEEE Trans. Dependable Secur. Comput. 2017, 17, 278–291. [Google Scholar] [CrossRef]
  7. Pan, Y.; Lin, W.; He, Y.; Zhu, Y. Coverage-guided differential testing of TLS implementations based on syntax mutation. PLoS ONE 2022, 17, e0262176. [Google Scholar] [CrossRef] [PubMed]
  8. Gbur, K.Y.; Tschorsch, F. QUICforge: Client-side Request Forgery in QUIC. In Proceedings of the Network and Distributed System Security (NDSS) Symposium 2023, San Diego, CA, USA, 27 February–3 March 2023. [Google Scholar]
  9. Maleh, Y.; Ezzati, A.; Belaissaoui, M. Dos attacks analysis and improvement in dtls protocol for internet of things. In Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, Blagoevgrad, Bulgaria, 10–11 November 2016; pp. 1–7. [Google Scholar]
  10. Chatzoglou, E.; Kouliaridis, V.; Karopoulos, G.; Kambourakis, G. Revisiting QUIC attacks: A comprehensive review on QUIC security and a hands-on study. Int. J. Inf. Secur. 2023, 22, 347–365. [Google Scholar] [CrossRef]
  11. Wazid, M.; Das, A.K.; Odelu, V.; Kumar, N.; Conti, M.; Jo, M. Design of secure user authenticated key management protocol for generic IoT networks. IEEE Internet Things J. 2018, 5, 269–282. [Google Scholar] [CrossRef]
  12. Vinoth, R.; Deborah, L.J.; Vijayakumar, P.; Das, M.L.; Jhanjhi, N.Z.; Alazab, M. Secure multifactor authenticated key agreement scheme for industrial IoT. IEEE Internet Things J. 2021, 8, 3801–3811. [Google Scholar] [CrossRef]
  13. Algubili, B.H.T.; Kumar, N.; Lu, H.; Yassin, A.A.; Boussada, R.; Mohammed, A.J.; Liu, H. EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment. Peer-to-Peer Netw. Appl. 2022, 15, 2179–2198. [Google Scholar] [CrossRef]
  14. Qin, Y.; Xu, M.; Zhao, Y.; Li, B. A one-to-many authentication and key agreement scheme based on the sliding window. In Proceedings of the Fourth International Conference on High Performance Computing and Communication Engineering (HPCCE 2024), Suzhou, China, 22–24 November 2025; Volume 13630, p. 1363002. [Google Scholar]
  15. Ming, Y.; Yang, P.; Mahdikhani, H.; Lu, R. A secure one-to-many authentication and key agreement scheme for industrial IoT. IEEE Syst. J. 2023, 17, 2225–2236. [Google Scholar] [CrossRef]
  16. Aly, A.H.; Ghalwash, A.T.E.F.; Nasr, M.O.N.A.; El-Hafez, A.A. A new lightweight authenticated key agreement protocol for IoT in cloud computing. J. Eng. Sci. Technol. 2021, 16, 3987–4005. [Google Scholar]
  17. Daniel, R.M.; Thomas, A.; Rajsingh, E.B.; Silas, S. A Strengthened eCK Secure Identity Based Authenticated Key Agreement Protocol based on the Standard CDH Assumption. Inf. Comput. 2023, 294, 105067. [Google Scholar] [CrossRef]
  18. Meier, S.; Schmidt, B.; Cremers, C.; Basin, D. The TAMARIN Prover for the Symbolic Analysis of Security Protocols. In Proceedings of CAV 2013 (LNCS 8044); Springer: Berlin/Heidelberg, Germany, 2013; pp. 696–701. [Google Scholar] [CrossRef]
  19. Rescorla, E.; Modadugu, N. RFC 6347: Datagram Transport Layer Security Version 1.2; RFC Editor: USA, 2012; Available online: https://www.rfc-editor.org/rfc/rfc6347.html (accessed on 22 December 2025).
  20. Rescorla, E.; Tschofenig, H.; Modadugu, N. RFC 9147: The Datagram Transport Layer Security (DTLS) Protocol Version 1.3; RFC Editor: USA, 2022; Available online: https://datatracker.ietf.org/doc/rfc9147/ (accessed on 22 December 2025).
  21. Selander, G.; Mattsson, J.; Palombini, F.; Seitz, L. RFC 8613: Object Security for Constrained RESTful Environments (OSCORE); RFC Editor: USA, 2019; Available online: https://datatracker.ietf.org/doc/rfc8613/ (accessed on 22 December 2025).
  22. Selander, G.; Preuß Mattsson, J.; Palombini, F. RFC 9528: Ephemeral Diffie–Hellman Over COSE (EDHOC); RFC Editor: USA, 2024; Available online: https://datatracker.ietf.org/doc/rfc9528/ (accessed on 22 December 2025).
  23. Perez, E.L.; Seler, G.; Mattsson, J.P.; Watteyne, T.; Vučinić, M. EDHOC Is a New Security Handshake Standard: An Overview of Security Analysis. Computer 2024, 57, 101–110. [Google Scholar] [CrossRef]
  24. Palombini, F.; Tiloca, M.; Höglund, R.; Hristozov, S.; Selander, G. RFC 9668: Using Ephemeral Diffie-Hellman Over COSE (EDHOC) with the Constrained Application Protocol (CoAP) and Object Security for Constrained RESTful Environments (OSCORE); RFC Editor: USA, 2024; Available online: https://www.rfc-editor.org/rfc/rfc9668.html (accessed on 22 December 2025).
  25. Weng, Y.; Zhang, Y. A survey of secure time synchronization. Appl. Sci. 2023, 13, 3923. [Google Scholar] [CrossRef]
  26. Zheng, Z.; Li, X.; Wang, H.; Wu, G.; Zhang, Y. Research on SSL/TLS Security Differences Based on RFC Documents. In Proceedings of the 2024 International Conference on Computing, Networking and Communications (ICNC), IEEE Computer Society, Big Island, HI, USA, 19–22 Feburary, 2024. [Google Scholar]
  27. Wong, C.K.; Gouda, M.; Lam, S.S. Secure Group Communications Using Key Graphs. IEEE/ACM Trans. Netw. 2000, 8, 16–30. [Google Scholar] [CrossRef]
  28. Naor, M.; Naor, D.; Lotspiech, J. Revocation and Tracing Schemes for Stateless Receivers. In Proceedings of the 21st Annual International Cryptology Conference, Santa Barbara, CA, USA, 19–23 August 2001; pp. 41–62. [Google Scholar]
  29. Kaufman, C.; Hoffman, P.; Nir, Y.; Eronen, P.; Kivinen, T. RFC 7296: Internet Key Exchange Protocol Version 2 (IKEv2); RFC Editor: USA, 2014; Available online: https://datatracker.ietf.org/doc/html/rfc7296 (accessed on 22 December 2025).
  30. Iyengar, J.; Thomson, M. RFC 9000: QUIC: A UDP-Based Multiplexed and Secure Transport; RFC Editor: USA, 2021; Available online: https://dl.acm.org/doi/10.17487/RFC9000 (accessed on 22 December 2025).
  31. Nir, Y.; Langley, A. RFC 8439: ChaCha20 and Poly1305 for IETF Protocols; RFC Editor: USA, 2018; Available online: https://datatracker.ietf.org/doc/rfc8439/ (accessed on 22 December 2025).
  32. Dworkin, M. Recommendation for block cipher modes of operation. NIST Spec. Publ. 2001, 800, 38B. [Google Scholar]
  33. Krawczyk, H.; Eronen, P. RFC 5869: HMAC-based Extract-and-Expand Key Derivation Function (HKDF); RFC Editor: USA, 2010; Available online: https://datatracker.ietf.org/doc/html/rfc5869 (accessed on 22 December 2025).
  34. Langley, A.; Hamburg, M.; Turner, S. RFC 7748: Elliptic Curves for Security; RFC Editor: USA, 2016; Available online: https://www.rfc-editor.org/rfc/rfc7748.html (accessed on 22 December 2025).
  35. Biryukov, A.; Dinu, D.; Khovratovich, D.; Josefsson, S. RFC 9106: Argon2 Memory-Hard Function for Password Hashing and Proof-of-Work Applications; RFC Editor: USA, 2021; Available online: https://datatracker.ietf.org/doc/rfc9106/ (accessed on 22 December 2025).
  36. Biryukov, A.; Dinu, D.; Khovratovich, D. Argon2: New generation of memory-hard functions for password hashing and other applications. In Proceedings of the 2016 IEEE European Symposium on Security and Privacy (EuroS&P), Saarbruecken, Germany, 21–24 March 2016; pp. 292–302. [Google Scholar]
  37. Bourdrez, D.; Krawczyk, H.; Lewi, K.; Wood, C.A. RFC 9807: The OPAQUE Augmented Password-Authenticated Key Exchange (aPAKE) Protocol; RFC Editor: USA, 2025; Available online: https://datatracker.ietf.org/doc/html/rfc9807 (accessed on 22 December 2025).
  38. Jarecki, S.; Krawczyk, H.; Xu, J. OPAQUE: An asymmetric PAKE protocol secure against pre-computation attacks. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, 29 April–3 May 2018; pp. 456–486. [Google Scholar]
  39. Canetti, R.; Krawczyk, H. Analysis of key-exchange protocols and their use for building secure channels. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Innsbruck, Austria, 6–10 May 2001; Springer: Berlin/Heidelberg, Germany, 2001; pp. 453–474. [Google Scholar]
  40. LaMacchia, B.; Lauter, K.; Mityagin, A. Stronger security of authenticated key exchange. In Proceedings of the International Conference on Provable Security, Wollongong, Australia, 1–2 November 2007; Springer: Berlin/Heidelberg, Germany, 2007; pp. 1–16. [Google Scholar]
Figure 1. Concrete example of subset-tag encoding and gateway-side expansion.
Figure 1. Concrete example of subset-tag encoding and gateway-side expansion.
Information 17 00047 g001
Figure 2. Protocol message flow. The user sends a single request to the gateway; the gateway performs ephemeral ECDH with the user to derive Z and GK , then broadcasts { Y , TS , ctr , ( π j , Wrap j ) j } to the sensor set. Each sensor S j opens Wrap j with s k j , derives S K j , and returns MAC j .
Figure 2. Protocol message flow. The user sends a single request to the gateway; the gateway performs ephemeral ECDH with the user to derive Z and GK , then broadcasts { Y , TS , ctr , ( π j , Wrap j ) j } to the sensor set. Each sensor S j opens Wrap j with s k j , derives S K j , and returns MAC j .
Information 17 00047 g002
Figure 3. Authentication latency (left axis) and energy (right axis) vs. n. Our one-to-many run performs one ECDH/PAKE and n symmetric wraps; the 1-to-1 baseline repeats ECDH/PAKE n times.
Figure 3. Authentication latency (left axis) and energy (right axis) vs. n. Our one-to-many run performs one ECDH/PAKE and n symmetric wraps; the 1-to-1 baseline repeats ECDH/PAKE n times.
Information 17 00047 g003
Table 1. Summary comparison: prior families vs. LOTUS-AKA. Y = supported; N = not; ∼ = partial/depends. Communication scaling is total control-plane bytes vs. the number of sensors n.
Table 1. Summary comparison: prior families vs. LOTUS-AKA. Y = supported; N = not; ∼ = partial/depends. Communication scaling is total control-plane bytes vs. the number of sensors n.
Protocol/FamilyMutAuthPFSPer-Sens IsoKCIPrivacyOffDictDoSECC@SensComm. vs. nRevoc
DTLS 1.3 (1 → 1) [20]YYYY (no card)Yoptional O ( n ) (repeat)
EDHOC+OSCORE (1 → 1) [22,24]YYYY (no card)via CoAPoptional O ( n ) (repeat)
TESLA-style broadcast [25]auth. onlyNNNY (none) O ( 1 ) sender meta
Group key w/masking (typical)YNNNNNNY (none) O ( 1 ) + O ( n ) wraps
Smart-card multi-server (typical)YNNNNNY (none) O ( 1 ) + O ( n )
LKH subset rekey [26,27,28]NNY (none) O ( log n ) rekeyY
LOTUS-AKA (this work)YYYYYYYY (none) O ( 1 ) + O ( n ) Y (via LKH)
Table 2. Notation summary.
Table 2. Notation summary.
SymbolMeaning
GBase point of P–256/X25519 group
x , X Private scalar x Z q , public X = x G
sGateway master secret
SID j Identifier of sensor S j
s k j Long-term per-sensor secret H ( SID j s )
YGateway ephemeral y G ; X is user ephemeral
ZECDH secret x y G ; GK = HKDF ( Z , ctx )
S K j Per-sensor session key HKDF ( GK , SID j transcript )
π j Pseudonym HMAC s k j ( TS ctr )
Wrap j AEAD s k j ( GK ; AD ) to deliver S K j
TS, ctrTimestamp and per-session counter
H , HKDF SHA–256 hash and HKDF (extract&expand)
AEADAES–GCM or ChaCha20–Poly1305
Table 3. Key schedule and AEAD associated data (AD).
Table 3. Key schedule and AEAD associated data (AD).
LabelDefinition
Z KDF ( b Y ) = KDF ( y X ) (ECDH secret)
GK HKDF ( Z , info = τ )
S K j HKDF ( GK , info = SID j     UID     τ )
π j HMAC s k j ( TS     ctr )
Wrap j AEAD s k j ( GK ; AD = SID j     TS     τ )
AD fieldsIdentities, subset tag, TS , ctr , transcript hash τ
Table 4. LOTUS-AKA vs. one-to-many baselines (per run with n addressed sensors).
Table 4. LOTUS-AKA vs. one-to-many baselines (per run with n addressed sensors).
SchemeSensor Work (per S j )Gateway Work (per Run)Bytes-on-Air (Control Plane)Notes
B3: Broadcast auth onlyMAC verify (+buffering)MAC generation (+key schedule) O ( 1 ) broadcast (plus disclosure metadata); no ACKsAuthenticity only; no Key Agreement; no per-sensor session keys
B1: Shared G K broadcast 1 × AEAD_open (+optional HKDF) 1 × AEAD_encBroadcast L hdr + ( L G K + L t a g + L n o n c e ) ; ACKs optionalAll receivers share the same G K ; limited sensor-to-sensor isolation
B2: LKH subset rekey (shared G K ) 1 × AEAD_open; state O ( log N ) | c o v e r ( S ) | × AEAD_encBroadcast L hdr + | c o v e r ( S ) | · ( L G K + L t a g + L n o n c e ) ; ACKs optionalEfficient subset distribution; delivered key still shared across the addressed subset
LOTUS-AKAHMAC (pseudonym) + AEAD_open + HKDF + HMAC (confirm) 2 × ECC_mult + n × (HMAC + AEAD_enc + HMAC)Broadcast L hdr + n · L tuple ; ACKs n · ( L m a c + hdr ) Perfect Forward Secrecy on U–G; per-sensor key isolation; sensors run symmetric-only
Table 5. Operation counts per party (one run with n sensors).
Table 5. Operation counts per party (one run with n sensors).
PartyOperations
User U # ECC _ mult = 2 (public key, DH shared secret); HKDF: 1 extract + 1 expand; per-j: HKDF-expand + HMAC (verify MAC j ).
Gateway G # ECC _ mult = 2 ; PAKE verify; cookie MAC; per-j: HMAC (pseudonym π j ) + AEAD _ enc ( Wrap j ) + HMAC (confirm).
Sensor S j HMAC (cookie/pseudonym) + AEAD _ open   + HKDF expand   + HMAC (confirm).
Table 6. Communication cost vs. n (broadcast + n acks).
Table 6. Communication cost vs. n (broadcast + n acks).
TermSize (bytes)
Y (ephemeral pub. key) L Y (e.g., 32 for X25519).
TS ctr L ts + L ctr (e.g., 8 + 4 ).
Per-sensor π j L π (e.g., 16 truncated HMAC).
Per-sensor Wrap j L GK + L tag + L nonce (e.g., 32 + 16 + 12 ).
Total Broadcast L Y + L ts + L ctr + n · L π + L GK + L tag + L nonce
Total Acks n · ( L mac + headers ) (e.g., 16 + headers).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

El Ghor, H.; El Fawal, A.H.; Mansour, A.; Ahmad-Kassem, A.; Nasser, A. Lightweight One-to-Many User-to-Sensors Authentication and Key Agreement. Information 2026, 17, 47. https://doi.org/10.3390/info17010047

AMA Style

El Ghor H, El Fawal AH, Mansour A, Ahmad-Kassem A, Nasser A. Lightweight One-to-Many User-to-Sensors Authentication and Key Agreement. Information. 2026; 17(1):47. https://doi.org/10.3390/info17010047

Chicago/Turabian Style

El Ghor, Hussein, Ahmad Hani El Fawal, Ali Mansour, Ahmad Ahmad-Kassem, and Abbass Nasser. 2026. "Lightweight One-to-Many User-to-Sensors Authentication and Key Agreement" Information 17, no. 1: 47. https://doi.org/10.3390/info17010047

APA Style

El Ghor, H., El Fawal, A. H., Mansour, A., Ahmad-Kassem, A., & Nasser, A. (2026). Lightweight One-to-Many User-to-Sensors Authentication and Key Agreement. Information, 17(1), 47. https://doi.org/10.3390/info17010047

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop