Next Article in Journal
A Symbolic Approach to Discrete Structural Optimization Using Quantum Annealing
Previous Article in Journal
On the Relationship between the Fractal Dimension of Geomagnetic Variations at Altay and the Space Weather Characteristics
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

ESCI-AKA: Enabling Secure Communication in an IoT-Enabled Smart Home Environment Using Authenticated Key Agreement Framework

by
Hisham Alasmary
1,* and
Muhammad Tanveer
2
1
Department of Computer Science, College of Computer Science, King Khalid University, Abha 61421, Saudi Arabia
2
Department of Computer Science, University of Management and Technology, Lahore 54770, Pakistan
*
Author to whom correspondence should be addressed.
Mathematics 2023, 11(16), 3450; https://doi.org/10.3390/math11163450
Submission received: 20 July 2023 / Revised: 4 August 2023 / Accepted: 7 August 2023 / Published: 9 August 2023
(This article belongs to the Section Network Science)

Abstract

:
Smart home environments are a vital component of the larger ecosystem within smart cities, aiming to revolutionize residential living through the integration of Internet of Things (IoT) devices and advanced technologies. However, ensuring robust security and preserving privacy in these interconnected ecosystems present significant challenges. During the monitoring and controlling tasks in the smart home environment, diverse commands are exchanged between the IoT device and the user over the public Internet. The public Internet is open and vulnerable to various security attacks, which can corrode the monitoring and controlling operation of the smart home. In addition, conventional security algorithms are inappropriate for IoT devices deployed in the smart home. However, various pernicious security attacks are equally efficacious in the resource-limited smart home environment. Thus, various authenticated encryption schemes are proposed to enable security services in resource-constricted smart home environments. This paper presents a lightweight and efficient authentication framework for a smart home environment by leveraging the features of an authenticated encryption scheme and the hash function called “ESCI-AKA”. ESCI-AKA checks the authenticity of the user at the local device and exchanges three messages among the user, gateway, and smart embedded device for establishing a secure channel for indecipherable communication by setting a session key. In addition, we corroborate the security of the established session key through the random oracle model and informal security analysis. Moreover, the Scyther tool is employed for the security validation of ESCI-AKA. Finally, the performance comparison of ESCI-AKA and other eminent security frameworks explicates that ESCI-AKA requires low computational and communication costs while providing robust security features.

1. Introduction

The Internet of Things (IoT) has emerged as a crucial enabler in the advancement of smart cities. These cities strive to leverage technological innovations to improve urban living standards, promote sustainability, and enhance overall efficiency. IoT devices and sensors deployed throughout a city enable the collection, analysis, and utilization of vast amounts of data to improve various aspects of urban life [1,2]. In a smart home, IoT devices such as thermostats, lighting systems, security cameras, door locks, appliances, and entertainment systems are interconnected and can be controlled remotely through a central hub or a mobile application. These devices can communicate with each other, share data, and respond to user commands or environmental conditions, creating an interconnected and intelligent living environment [3].
The implementation of smart home technologies necessitates significant attention to security and privacy concerns, while smart homes endeavor to improve urban living through the employment of state-of-the-art technologies, they also introduce potential risks related to data security and privacy breaches [4]. Smart homes yield extensive amounts of data via sensors, cameras, and other connected IoT devices. To safeguard against unauthorized access, data breaches, and the misuse of sensitive information, it is essential to employ robust data security measures. This includes implementing strong encryption, authentication mechanisms, and access controls.
In Figure 1, we can observe a smart home setup, enabling remote communication between the user and resource-constrained IoT devices present within the premises. The user has the capability to send diverse command and control instructions to accomplish various tasks within the smart home environment. However, it is essential to address potential security risks. The command and control information transmitted through a public communication channel is exposed to potential security vulnerabilities. Consequently, it becomes crucial to implement authenticated key agreement (AKA) mechanisms to safeguard the confidentiality of information [5]. By employing such mechanisms, the communicated command and control information can be protected, ensuring that only authorized individuals or entities can access sensitive data.
Several AKA frameworks have been proposed to establish secure and encrypted communication within the smart home environment. Despite the presence of various existing AKA frameworks, several significant security concerns remain unresolved. These include the prevention of impersonation, mitigation of denial of service (DoS) attacks, protection against man-in-the-middle (MITM) attacks, and the need to ensure resource efficiency. Recently, various authenticated encryption (AE) schemes have been developed to enable security services in the resource-limited IIoT/IoT environment [6,7,8]. AEAD schemes are more lightweight regarding computational resources than symmetric and asymmetric encryption schemes [9]. Thus, a cost-effective AKA framework requiring low computational and communication delays can be realized using an AEAD encryption scheme. Therefore, this paper proposes tackling the aforementioned security challenges, and we have introduced a resource-efficient AKA framework for the smart home called “ESCI-AKA”.

1.1. Research Contribution

  • ESCI-AKA is designed with the integration of resource-efficient cryptographic primitives, such as the ASCON encryption scheme and a “hash function”. Its primary goal is to enable the establishment of a secure channel (session key) between users and devices within the smart home environment, utilizing the gateway node. By setting up this secure channel, ESCI-AKA allows users and devices to securely communicate sensitive information in an encrypted format, thereby ensuring protection against unauthorized access. Moreover, ESCI-AKA introduces an innovative mechanism for the login and password change processes, which rely on a single encryption operation. This simplifies the authentication procedures involved, streamlining the overall user experience and enhancing system efficiency.
  • The security of ESCI-AKA is validated using the widely recognized formal mechanism known as ROM. This ensures the credibility of the security claims associated with ESCI-AKA. In addition to its security features, ESCI-AKA prioritizes user anonymity, safeguarding the privacy of users within the smart home environment. To further ensure the security of ESCI-AKA, Scyther, a security verification tool, is employed. Scyther aids in validating and confirming that ESCI-AKA is indeed secure and meets the intended security objectives.
  • The efficiency of ESCI-AKA is evaluated based on its computational and communication costs. A comparison is made between ESCI-AKA and several relevant user authentication frameworks, including references [10,11,12,13,14,15,16]. ESCI-AKA demonstrates superior efficiency, achieving (65.71%, 66.18%, 84.87%, 66.18%, 79.65%, 61.01%, 86.27%) lower computational costs compared to references [10,11,12,13,14,15,16], respectively. Furthermore, ESCI-AKA outperforms these reference frameworks in terms of communication costs, achieving (44.71%, 57.66%, 40.51%, 57.66%, 54.29%, 47.78%, 65.94%) lower communication costs, respectively. In addition to its improved efficiency, ESCI-AKA also provides enhanced security features compared to the relevant security frameworks.

1.2. Paper Organization

The paper’s remaining structure is outlined as follows: In Section 2, we provide an overview of the related AKA frameworks. Section 3 offers a comprehensive explanation of the authentication and system models employed in the study. The design procedure of the proposed ESCI-AKA is presented in Section 4, emphasizing the key aspects of its development. Section 5 conducts both formal and informal analyses of ESCI-AKA to evaluate its security capabilities. The performance of ESCI-AKA is demonstrated in Section 6, showcasing its efficiency and effectiveness in real-world scenarios. Finally, in Section 7, the paper concludes with a summary and key findings.

2. Related Work

In the smart home environment, the devices deployed face resource limitations, including restricted computational power, communication capabilities, and storage capacity. Despite these constraints, it is paramount to guarantee the security of information exchange among IIoT devices over the public Internet. Several authors, as referenced in [17,18,19], have conducted surveys on information protection necessities in both IoT and smart home environments, shedding light on the diverse problems that require handling. In the context of a 6LoWPAN-based IoT environment, the study in  [20] offers a user authentication technique. This technique operates an AEAD scheme and a hash function, and undergoes security confirmation operating the random oracle model (ROM) and Scyther. Another article [21] demonstrates an authentication technique, which also undergoes security verification via ROM and Scyther. However, the security technique presented in [22] is discovered to be weak against identity guessing, impersonation, and “man-in-the-middle” (MITM) attacks. To handle these problems, an authentication technique operating ECC and a hash function is suggested in [23]. The security of this technique is corroborated by operating the ROM and BAN logic.
The authentication technique suggested in [24] operates a hash function but is encountered to be powerless to “privilege insider, password guessing, and temporary secret number leakage attack”, as evidenced in [25]. Moreover, user anonymity remains unprotected within the security technique presented in [24]. In contrast, the authors of [11] designed a user authentication technique utilizing ECC and a hash function. However, this technique is incapable of withstanding “password guessing, impersonation, MITM, stolen smart card, and device capture” attacks. Likewise, it does not guarantee user anonymity. Similarly, the authentication technique suggested in [26] for the IoT environment, which operates symmetric encryption and a hash function, fails to prevent device capture and desynchronization attacks. Additionally, the user authentication framework presented in [26] does not guarantee user anonymity. Another three-factor authentication scheme using ECC and a hash function is proposed in [10], but it is found to be weak against device capture and impersonation attacks. Additionally, user anonymity is not ensured by the user authentication technique in [10]. For an IoT-enabled healthcare system, an authentication technique based on a hash function is suggested in [27], while resource-efficient, this technique is susceptible to diverse attacks, and it does not cover user anonymity. An AEAD and hash-function-based authentication technique is suggested in [28]. The security of this technique is corroborated by operating ROM and Scyther-based formal security analysis. Lastly, an authentication technique for a 6LoWPAN-enabled IoT environment is demonstrated in [29], which mandates fewer computational and communication resources for the authentication phase.
The authors of [30] developed a user authentication technique that lacks mutual authentication capability. In [31], an authentication technique is suggested particularly for the smart home environment. This technique utilizes XOR, concatenation, and hash function operations. For real-time data retrieval from IIoT devices, a cloud-assisted authentication technique is suggested in [32]. This technique employs the chaotic map and hash function. The security of the technique suggested in [33] is validated via ROM. This work demonstrates a strong and efficient authentication technique established on AEAD and hash function, and its security is substantiated by employing ROM and Scyther. In the context of smart grids, an authentication technique is familiarized in [34]. This technique depends on the hash function “Esch256”, authenticated encryption, and XOR operations. Further, the security of this technique is corroborated by operating the ROM and Scyther. An exhaustive examination of diverse user authentication techniques is demonstrated in Table 1 [35,36].

3. System Models

This subsection focuses on the explication of the authentication and attack models, which play a crucial role in the design of the proposed scheme. These models are employed to ensure robust security measures within the system.

3.1. Authentication Model

The authentication model employed for the proposed ESCI-AKA consists of the following components, as illustrated in Figure 2:
  • Gateway: The trusted authority (TA) assumes the responsibility of deploying gateway nodes ( G W k ) within the smart home environment. These gateway nodes provide internet connectivity to the IIoT-enabled devices deployed in the environment. Additionally, G W k stores the sensitive parameters associated with the remote user and smart embedded devices. It possesses the capability to establish connections between IIoT-enabled devices and the Internet, using cellular or other Internet connectivity options. Furthermore, all IIoT-enabled devices deployed in the environment are connected to G W k through communication protocols such as WiFi, 6LoWPAN, or Zigbee.
  • Smart Embedded Device: Smart embedded devices (SEDs) refer to resource-limited devices deployed within the smart home environment. Each SED, denoted as S E D j , is equipped with communication, storage, and computational resources. These devices can establish communication with G W k using communication protocols like WiFi, 6LoWPAN, or Zigbee. Additionally, SEDs are equipped with sensing modules, allowing them to collect sensitive information from their surrounding environment. This collected data can be transmitted to a central location for further analysis.
  • Remote User: The user possesses smart devices ( S D i ) equipped with biometric sensors. Communication between U i and U i occurs through the gateway node ( G W k ). Furthermore, U i can communicate with G W k utilizing cellular or internet technology. In order to access real-time information from the deployed S E D j in the smart home environment, it is crucial to ensure that only authorized U i can obtain such information. To aid in comprehending the proposed scheme, Table 2 provides an elucidation of the various symbols employed.

3.2. Attack Model

In order to evaluate the security of the ESCI-AKA framework, we utilize the widely acknowledged Dolev–Yao (DY) model [53,54]. The DY model effectively simulates the smart home environment. In the simulation, we consider that all parties in the smart home environment establish their trust in a trusted authority (TA) and communicate information securely via a dedicated communication channel with the TA. The TA handles the system initialization, user registration, and  cancellation. Apart from exchanges with the TA, all parties intercommunicate with other parties via public channels. In the DY model, an attacker has the capability to both eavesdrop and modify messages if they are communicated over open channels. Given the complex nature of the smart home environment, an attacker may also resort to physically seizing devices to obtain private parameters and information.
Furthermore, there is a potential risk that the user’s S D i may be stolen or lost, which can result in the adversary attaining access to the user’s confidential information via the compromised device. This emphasizes the importance of addressing security concerns related to users’ S D i s. In addition, we consider the CK adversary attack model, which builds upon the DY model and enhances the capabilities of the adversary. This model grants the adversary the ability to obtain secret public parameters during the authentication session, thereby enabling them to acquire a short-lived partial key. This further amplifies the adversary’s capabilities and underscores the need for robust security measures.

4. The Proposed ESCI-AKA Framework

The ESCI-AKA system includes several phases: smart embedded registration, remote user registration, AKA, and password and biometric change. Each of these phases will be discussed in detail in the subsequent subsections.

4.1. Gateway Registration Phase

The TA is responsible for registration and deployment in the smart home environment. For deploying G W k , TA selects a distinct identity, G I D k , and generates a long-term gateway key, L G K , and stores the parameters { L G K , G I D k } in the database of the G W k .

4.2. Smart Embedded Device Registration Phase

The TA is responsible for deploying S E D j in the smart home environment after its registration. The following steps are imperative for the registration of S E D j .

Step SEDRP-1

The TA selects a unique identity for S I D S E D j and computes D S K = H ( S I D S E D j L G K ) . Finally, TA stores the parameters { S I D S E D j , D S K } in the memory of S E D j and stores the parameter S I D S E D j in the database of G W k .

4.3. Remote User Registration Phase

TA executes the following steps to register U i using a secure channel.

4.3.1. Step RMURP-1

U i selects its own secret parameter, such as distinct identity, I D U i , and password, P W U i . In addition, U i wakes its own biometric information ( B i o U i ) on the biometric sensor deployed on the IoT-enabled smart device ( S D U i ), and  S D U i uses F E . G e n ( · ) to generate the biometric key by computing ( σ 1 , h d ) = F E . G e n ( B i o U i ) after taking B i o U i as the input. In addition, S D U i picks a random number, R N U 1 , and, by using hashing algorithm, computes K 1 = H ( I D U i P W U i σ 1 ) and, by using the ASCON encryption algorithm, computes ( ( C 1 , C 2 , C 3 ) , M A C 1 ) = E K 1 { A D 1 , P 1 , P 2 , P 3 } , where C 1 , C 2 , and  C 3 are the ciphertext, P 1 = I D U i , P 2 = P W U i , and P 3 = σ 1 are the plaintext, and  A D 1 = R N U 1 is the associative data. Moreover, S D U i computes C I D i = C 1 C 2 and constructs the message with parameters { C I D i , C 3 } and sends it to TA via secure channel.

4.3.2. Step RMURP-2

TA, after obtaining { C I D i , C 3 }, picks R N U 2 and computes P I D i = ( C I D i R N U 2 ) . In addition, TA selects the list of registered S I D S E D j for U i , from where U i can access real-time information. TA stores the parameters { P I D i , C 3 } in the database of G W k . Finally, TA sends the parameters { R N U 2 , S I D S E D j , P I D i , G I D k } to U i / S D U i through a secure channel.

4.3.3. Step RMURP-3

U i / S D U i , after sending the parameters { R N U 2 , S I D S E D j , P I D i , G I D k } to U i / S D U i from TA, computes the following:
Q 1 = ( S I D S E D j C 3 ) H ( C 2 * C 3 * C 1 * ) ,
G I D k * = G I D k H ( C 2 * C 3 * ) ,
R N U 2 * = H ( C 2 * C 3 * C 1 * ) R N U 2 .
Finally, U i / S D U i stores the parameters { R N U 2 * , G I D k * , A D 1 , Q 1 , M A C 1 , h d , F E . G e n ( · ) , F E . R e p ( · ) } in its own memory.
Remark 1.
In the proposed ESCI-AKA, we utilize ASCON [6] as the encryption/decryption algorithm. ASCON is an AEAD scheme that ensures the simultaneous provision of integrity, authenticity, and confidentiality of information. The encryption operation of ASCON can be represented as ( ( C , MAC ) = E K { A D , P } ) , where C, MAC, A D , P, and K represent the ciphertext, authentication code (Tag), associated data, plaintext, and encryption key, respectively.
Similarly, the decryption operation can be expressed as ( ( P , MAC 1 ) = E K { A D , C } ) . In this case, the generated MAC1 during the decryption operation will be valid if it matches the original MAC value. If the condition, M A C = MAC 1 , holds, the plaintext will be considered valid. Otherwise, if the condition is not satisfied, the plaintext will be deemed invalid.
Definition 1.
An AEAD scheme is reflected as protected if A s ultimate OCCA3 advantage is insignificant. The OCCA3 advantage of A on an AEAD is the cumulative advantage of A for performing a chosen plaintext attack and compromising the integrity of an AEAD scheme [55,56].
A d v A E A D , A O C C A 3 ( p o l t ) A d v A E A D O P R P C P A ( Q r , l e n , p o l t ) + A d v A E A D I N T C T X T ( Q r , l e n , p o l t ) ,
Here, A d v , Q r , l e n , p o l t , O P R P C P A , and  I N T C T X T denote the advantage, number of queries performed by A , length, polynomial time, online permutations, and ciphertext integrity, respectively.
Remark 2.
In the proposed ESCI-AKA, the fuzzy extractor (FE) technique is utilized to derive a reliable biometric key from the user’s biometric information. The FE consists of two main functions: F E . G e n ( · ) and F E . R e p ( · ) . The F E . G e n ( · ) function takes the biometric information of the user as input and generates both the biometric key and the corresponding helper data. On the other hand, the  F E . R e p ( · ) function takes the helper data and the biometric information as input and reconstructs the biometric key. To reconstruct the biometric key, a condition is imposed: H D ( B i o U i , B i o U i * ) e t . Here, H D denotes the Hamming distance, and  e t represents the allowable difference between B i o U i and B i o U i * (the login biometric template and the current biometric sample, respectively). If the Hamming distance between these two values falls within the specified threshold, e t , the biometric key can be successfully reconstructed.

4.4. AKA Phase

During this stage, U i / S D U i and S E D j work together to establish a secure channel, also known as a session key, for secure information exchange. The secure channel is established through mutual authentication and session key exchange. The subsequent algorithms are performed by using U i / S D U i and S E D j to initiate the setup of the session key or secure channel.

4.4.1. Local Authentication and Generation of M G 1

Algorithm 1 accomplishes the task of local authentication and generates the authentication message, M G 1 . The algorithm starts by taking the input parameters as I D U i , P W U i , B i o U i * , M A C 1 , and h d . It then generates the biometric key ( σ 1 ) using the reproduction function of FE. This reproduction function takes the biometric information of the user and helper data as input and produces the biometric key. Furthermore, the algorithm derives the encryption key and utilizes the ASCON encryption algorithm for encryption. In this encryption process, P 1 * = I D U i , P 2 * = P W U i , and  P 3 * = σ 1 * serve as the plaintext, while C 1 * , C 2 * , and  C 3 * represent the associated ciphertext. The integrity of the secret credentials and the local authentication of the user is verified by checking if M A C 1 * = ? M A C 1 . Upon successful local authentication, the algorithm retrieves the values S I D S E D j , G I D k , and  C 3 for further processing.
In addition, the algorithm proceeds to derive a temporary pseudo-identity and compute associative data. ASCON encryption is employed to encrypt certain parameters, such as S I D S E D j and R N U 3 . It is worth noting that the nonce used in the ASCON encryption and decryption algorithm is computed by XORing associative data and a secret encryption key. Finally, S D U i constructs the message, M G 1 , which includes T i S 1 (timestamp), P I D i (pseudo-identity), C 4 , C 5 , and  M A C 2 . This message is then transmitted to G W k using an open channel of communication.

4.4.2. Validates M G 1 and Generates M G 2

Algorithm 2 facilitates the validation of the received message, M G 1 , by G W k and generates M G 2 . Upon receiving the message, M G 1 , G W k performs several checks to ensure its validity. Firstly, it examines whether the message M G 1 is a replay by comparing the condition T A D L | T i S 1 R T M | . If the message is determined to be a replay, G W k discards M G 1 . Otherwise, G W k proceeds with further checks.
Algorithm 1 Performs Local Authentication and Generates M G 1
Input: { I D U i , P W U i , B i o U i * , M A C 1 , h d }
Output: { T i S 1 , P I D i , C 4 , C 5 , M A C 2 }
  1:
procedure ALGO-1({ I D U i , P W U i , B i o U i * , h d , M A C 1 })
  2:
     σ 1 * F E . R e p ( B i o U i * , h d )
  3:
     K 1 * H ( I D U i P W U i σ 1 * )
  4:
     ( ( C 1 * , C 2 * , C 3 * ) , M A C 1 * ) E K 1 * { A D 1 , P 1 * , P 2 * , P 3 * }
  5:
     A D 1 R N U 1
  6:
    if  M A C 1 * = ? M A C 1  then
  7:
         ( S I D S E D j C 3 ) ( Q 1 H ( C 2 * C 3 * ) )
  8:
         G I D k G I D k * H ( C 2 * C 3 * C 1 * )
  9:
         R N U 2 H ( C 2 * C 3 * C 1 * ) R N U 2 *
10:
        selects R N U 3 and T i S 1
11:
         P I D i ( C 1 * C 2 * R N U 2 )
12:
         A D 2 ( P I D i T i S 1 G I D k )
13:
         N 1 ( P I D i T i S 1 G I D k ) C 3
14:
         ( ( C 4 , C 5 ) , M A C 2 ) E ( C 3 N 1 ) { A D 2 , S I D S E D j , R N U 3 }
15:
    else
16:
        terminates execution
17:
    end if
18:
end procedure
G W k verifies if the condition P I D i = ? P I D i c is satisfied. If it holds true, G W k retrieves C 3 and R N U 4 from its own database. On the other hand, if the condition P I D i = ? P I D o i is met, G W k retrieves C 3 and R N U 2 from its database. Here, P I D i refers to the received pseudo-identity with the message M G 1 , P I D i c represents the current pseudo-identity, and P I D i o corresponds to the old pseudo-identity. If no match is found in either case, G W k terminates the AKA process.
Upon obtaining C 3 and R N U 2 , G W k calculates the associative data, A D 3 , and nonce, N 2 . Furthermore, after performing the decryption using C 3 as the secret key, G W k obtains ( ( S I D S E D j , R N U 3 ) , M A C 3 ) . The decryption operation is carried out utilizing the ASCON decryption algorithm. Moreover, G W k verifies the integrity of the received message by checking if ( M A C 2 = ? M A C 3 ). Finally, G W k retrieves the values, S I D S E D j and R N U 3 , for further processing.
G W k performs the computation of plaintexts P 4 , P 5 , and  P 6 , along with the generation of associative data, A D 4 . By utilizing the ASCON encryption algorithm and the encryption key, K 2 , the encryption process encrypts P 4 , P 5 , and  P 6 , resulting in the generation of ( ( C 6 , C 7 , C 8 ) , M A C 4 ) . Finally, G W k constructs the message, M G 2 : { T i S 2 , C 6 , C 7 , C 8 , M A C 4 }, and sends M G 2 to S E D j using the open communication channel.
Remark 3.
To avoid identity desynchronization, G W k computes a new pseudo-identity, P I D i n = ( P I D i R N U 2 R N U 4 ) , and updates P I D i c with P I D i n . In addition, G W k also keeps C 3 and updates R N U 2 with R N U 4 . Furthermore, G W k also updates P I D i o with P I D i c and keeps C 3 and R N U 2 in its own database.
Algorithm 2 Validates M G 1 and Generates M G 2
Input: { T i S 1 , P I D i , C 4 , C 5 , M A C 2 }
Output: { T i S 2 , C 6 , C 7 , C 8 , M A C 4 }
  1:
procedure ALGO-2({ T i S 1 , P I D i , C 4 , C 5 , M A C 2 , L G K , S I D S E D j })
  2:
    if  T A D L | T i S 1 R T M |  then
  3:
        if ( P I D i = ? P I D i c ) then
  4:
           retrieves C 3 and R N U 4
  5:
           if ( P I D i = ? P I D i o ) then
  6:
               retrieves C 3 and R N U 2
  7:
                A D 3 ( P I D i T i S 1 G I D k )
  8:
                N 2 ( P I D i T i S 1 G I D k ) C 3
  9:
                ( ( S I D S E D j , R N U 3 ) , M A C 3 ) D ( C 3 N 2 ) { A D 3 , C 4 , C 5 }
10:
               if ( M A C 2 = ? M A C 3 ) then
11:
                   generates T i S 2 , R N U 4 and R N U 5
12:
                    P 4 C 3 R N U 3
13:
                    P 5 R N U 4
14:
                    P 6 R N U 5
15:
                    K 2 H ( L G K S I D S E D j )
16:
                    A D 4 ( S I D S E D j T i S 2 )
17:
                    ( ( C 6 , C 7 , C 8 ) , M A C 4 ) E K 2 { A D 4 , P 4 , P 5 , P 6 }
18:
                    P I D i n ( P I D i R N U 2 R N U 4 )
19:
                   updates P I D i c with P I D i n
20:
                   keeps C 3 and updates R N U 2 with R N U 4
21:
                   updates P I D i o with P I D i c
22:
                   keeps C 3 and R N U 2
23:
               else
24:
                   terminates execution
25:
               end if
26:
           else
27:
               terminates execution
28:
           end if
29:
        else
30:
           terminates execution
31:
        end if
32:
    else
33:
        terminates execution
34:
    end if
35:
end procedure

4.4.3. Validates M G 2 and Generates M G 3

Algorithm 3 is designed to enable the validation of the received message, M G 2 , by S E D j and subsequently generate M G 3 . The freshness of the message is validated by S E D j using the condition T A D L | T i S 2 R T M | . If the received message is determined to not be fresh, S E D j terminates the authentication process. Conversely, if the message is fresh, S E D j proceeds to compute the associative data, A D 5 , and the decryption key, K 3 . The ASCON decryption algorithm utilizes K 3 to decrypt the ciphertext and generate the plaintext along with the authentication parameter, i.e.,  ( ( P 4 , P 5 , P 6 ) , M A C 5 ) . The integrity of these returned parameters is verified by comparing M A C 4 with M A C 5 . If they match, the returned ( P 4 , P 5 , P 6 ) is considered valid, where P 4 = C 3 R N U 3 , P 5 is equal to R N U 4 , and  P 6 is equal to R N U 5 . In the case of a mismatch, the authentication process is terminated by S E D j .
Algorithm 3 Validates M G 2 and Generates M G 3
Input: { T i S 2 , C 6 , C 7 , C 8 , M A C 4 }
Output:  { T i S 3 , C 9 , C 10 , A D 6 , M A C 6 }
  1:
procedure ALGO-3({ T i S 2 , C 6 , C 7 , C 8 , M A C 4 })
  2:
    if  T A D L | T i S 2 R T M |  then
  3:
         A D 5 ( S I D S E D j T i S 2 )
  4:
         K 3 D S K
  5:
         ( ( P 4 , P 5 , P 6 ) , M A C 5 ) D K 3 { A D 5 , C 6 , C 7 , C 8 }
  6:
        if ( M A C 4 = ? M A C 5 ) then
  7:
           selects T i S 3 and R N U 6
  8:
            S K S E D j H ( R N U 6 ( C 3 R N U 3 ) ( S I D S E D j R N U 6 R N U 5 ) T i S 3 )
  9:
            A D 6 ( S K S E D j a S K S E D j b )
10:
            K 4 ( S I D S E D j ( C 3 R N U 3 ) )
11:
            N 3 ( S I D S E D j ( C 3 R N U 3 ) A D 6 )
12:
            P 7 R N U 4
13:
            P 8 ( S I D S E D j R N U 6 R N U 5 )
14:
            ( ( C 9 , C 10 ) , M A C 6 ) E ( K 4 N 3 ) { A D 6 , P 7 , P 8 }
15:
        else
16:
           terminates execution
17:
        end if
18:
    else
19:
        terminates execution
20:
    end if
21:
end procedure
Moreover, S E D j proceeds to select T i S 3 and R N U 6 , followed by the computation of the session key, S K S E D j , for future secure communication with the user. Once S K S E D j is computed, S E D j proceeds to calculate the associative data, A D 6 ; nonce, N 3 ; encryption key, K 4 ; and plaintexts, P 7 and P 8 . By utilizing the ASCON encryption algorithm, S E D j encrypts P 7 and P 8 with the encryption key, K 4 , generating ( ( C 7 , C 8 ) , M A C 6 ) . Subsequently, S E D j constructs the message, M G 3 , as { T i S 3 , C 9 , C 10 , A D 6 , M A C 6 } and transmits it to S D i or the user via the public communication channel.

4.4.4. Validates M G 3 and Session Key

Algorithm 4 is designed to enable the validation of the received message M G 3 by S D i and subsequently generate the session key. If S D i or the user verifies the freshness of the message M G 3 , they need to check the condition T A D L | T i S 3 R T M | . If the message is determined to be valid, S D i calculates the decryption key, K 5 , and the nonce, N 4 . By utilizing the ASCON decryption algorithm with K 5 and N 4 , ( P 7 , P 8 ) , and M A C 7 are generated.
In addition, the integrity of the message, M G 3 , is checked by comparing M A C 6 with M A C 7 . To ensure secure encrypted communication between S D i and S E D j , a session key, S K U i , is established. In order to verify the session key, S D i computes A D 7 and checks whether A D 6 matches A D 7 . If they match, this indicates that the session keys derived at S D i and S E D j , which are identical.
Finally, R N U 2 * is computed, and  S D i updates R N U 2 * with the new value, R N U 2 .

4.5. Secret Credentials Change Phase

The ESCI-AKA mechanism offers a user-friendly way to modify the secret credentials (e.g., passwords and biometrics) of U i using Algorithm 5. To initiate this process, U i provides its old secret credentials, namely, I D U i and P W o U i , and biometric information B i o U i o to S D i . Upon receiving these secret credentials, S D i utilizes the FE to generate the biometric key, σ 1 o , from B i o U i o and h d o as input parameters. Subsequently, S D i derives the encryption key, K 1 o , and employs the ASCON encryption algorithm to encrypt P 1 o , P 2 o , P 3 o , resulting in ( ( C 1 o , C 2 o , C 3 o ) , M A C 1 o ) using the encryption key, K 1 o , and A D 1 o = R N U 1 .
Algorithm 4 Validates M G 3 and Generates Session Key
Input:  { T i S 3 , C 9 , C 10 , A D 6 , M A C 6 }
Output: {Session key S K U i Generation and Mutual Authentication}
  1:
procedure ALGO-4( { T i S 3 , C 9 , C 10 , A D 6 , M A C 6 } )
  2:
    if  T A D L | T i S 3 R T M |  then
  3:
         K 5 ( S I D S E D j ( C 3 R N U 3 ) )
  4:
         N 4 K 5 A D 6
  5:
         ( ( P 7 , P 8 ) , M A C 7 ) D ( K 5 N 4 ) { A D 6 , C 9 , C 10 }
  6:
        if  M A C 6 = ? M A C 7  then
  7:
            P 7 R N U 4
  8:
            P 8 ( S I D S E D j R N U 6 R N U 5 )
  9:
            S K U i H ( R N U 6 ( C 3 R N U 3 ) ( S I D S E D j R N U 6 R N U 5 ) T i S 3 )
10:
            A D 7 ( S K U i a S K U i b )
11:
           if  A D 6 = ? A D 7  then
12:
                R N U 2 * H ( C 2 * C 3 * C 1 * ) R N U 4
13:
               updates R N U 2 with R N U 2 *
14:
               Mutual authentication is achieved
15:
           else
16:
               terminates execution
17:
           end if
18:
        else
19:
           terminates execution
20:
        end if
21:
    else
22:
        terminates execution
23:
    end if
24:
end procedure
Algorithm 5 Performs Password Change and Biometric Update
Input: { I D U i , B i o U i o , P W U i o , R N U 2 , A D 1 , Q 1 , M A C 1 , h d , G I D k * , F E . G e n ( · ) , F E . R e p ( · ) }
Output: { R N U 2 n , A D 1 n , Q 1 n , M A C 1 n , h d n , G I D k n , F E . G e n ( · ) , F E . R e p ( · ) }
  1:
procedure ALGO-1({ R N U 2 , A D 1 , Q 1 , M A C 1 , h d , G I D k * , F E . G e n ( · ) , F E . R e p ( · ) })
  2:
     σ 1 o F E . R e p ( B i o U i o , h d )
  3:
     K 1 o H ( I D U i P W U i o σ 1 o )
  4:
     ( ( C 1 o , C 2 o , C 3 o ) , M A C 1 o ) E K 1 o { A D 1 , P 1 o , P 2 o , P 3 o }
  5:
     A D 1 o R N U 1
  6:
    if  M A C 1 o = ? M A C 1  then
  7:
         ( S I D S E D j C 3 ) ( Q 1 H ( C 2 o C 3 o ) )
  8:
         G I D k G I D k o H ( C 2 o C 3 o C 1 o )
  9:
         R N U 2 H ( C 2 o C 3 o C 1 o ) R N U 2 o
10:
        Enters the new or fresh secret parameters
11:
         ( σ 1 n , h d n ) F E . G e n ( B i o U i n )
12:
         K 1 n H ( I D U i P W U i n σ 1 n )
13:
         A D 1 n R N U 1 n
14:
         ( ( C 1 n , C 2 n , C 3 n ) , M A C 1 n ) E K 1 n { A D 1 n , P 1 n , P 2 n , P 3 n }
15:
         Q 1 n ( ( S I D S E D j C 3 ) H ( C 2 n C 3 n ) )
16:
         G I D k n G I D k H ( C 2 n C 3 n C 1 n )
17:
         R N U 2 n H ( C 2 n C 3 n C 1 n ) R N U 2
18:
    else
19:
        terminates execution
20:
    end if
21:
end procedure
To ensure the authenticity of the secret credentials and perform local authentication, S D i verifies the condition, M A C 1 o = ? M A C 1 . If the condition holds true, S D i derives the parameters S I D S E D j , G I D k , and R N U 2 . Moreover, S D i notifies U i to input a new P W U i n and update the biometric information to B i o U i n to complete the process. S D i picks a new random number, R N U 1 n , and computes { R N U 2 n , A D 1 n , Q 1 n , M A C 1 n , h d n , G I D k n , F E . G e n ( · ) , F E . R e p ( · ) }. Finally, it replaces { R N U 2 , A D 1 , Q 1 , M A C 1 , h d , G I D k * , F E . G e n ( · ) , F E . R e p ( · ) } with { R N U 2 n , A D 1 n , Q 1 n , M A C 1 n , h d n , G I D k n , F E . G e n ( · ) , F E . R e p ( · ) } in S D i ’s memory.

5. Security Validation

We provide a security analysis of ESCI-AKA, formally and informally, in this section.

5.1. Informal Security Analysis

In this subsection, we provide an informal security analysis of the proposed ESCI-AKA framework.

5.1.1. Secret Credential Change Attack

A , after capturing S D i , can obtain the sensitive parameters, such as { R N U 2 * , A D 1 , Q 1 , M A C 1 , h d , G I D k * , F E . G e n ( · ) , F E . R e p ( · ) }, which are stored in the memory of S D i at the time of registration. A cannot update the secret credentials, such as P W U i , B i o U i , and I D U i , because A needs to compute:
( σ 1 A ) = F E . R e p ( B i o U i A , h d ) ,
K 1 A = H ( I D U i A P W U i A σ 1 A ) ,
( ( C 1 A , C 2 A , C 3 A ) , M A C 1 A ) = E K 1 A { A D 1 , P 1 A , P 2 A , P 3 A } ,
M A C 1 A = ? M A C 1 .
A can update the secret credentials, such as P W U i , B i o U i if Condition (8) holds. However, A cannot generate the biometric key. Thus, without knowing the secret credentials, it is hard for A to update the password and biometric key. Hence, the proposed ESCI-AKA is resistant to password and biometric key update attacks.

5.1.2. Replay Attack

To prevent a replay attack, in ESCI-AKA, timestamps are incorporated in all the communicated messages. The freshness of the messages, M G 1 , M G 2 , and M G 3 , are checked through the conditions T A D L | T i S 1 R T M | , T A D L | T i S 2 R T M | , and T A D L | T i S 3 R T M | , respectively. If any of the conditions fail, the associated message is considered to be invalid or replayed. Thus, the proposed ESCI-AKA demonstrates resistance against replay attacks.

5.1.3. DoS Attack

The proposed scheme prevents a DoS attack through the local authentication of U i secret credentials. To achieve local authentication, the S D i of U i needs to perform the following computations:
( σ 1 * ) = F E . R e p ( B i o U i * , h d ) ,
K 1 * = H ( I D U i P W U i σ 1 * ) ,
( ( C 1 * , C 2 * , C 3 * ) , M A C 1 * ) = E K 1 * { A D 1 , P 1 , P 2 , P 3 } ,
w h e r e A D 1 = R N U 1 ,
M A C 1 * = ? M A C 1 ,
If the condition in (13) holds, then S D i sends the authentication and AKA request to G W k . Otherwise, S D i stops the further execution of the AKA phase. In this way, the proposed ESCI-AKA prevents DoS attacks.

5.1.4. MITM Attack

An authentication and key agreement mechanism must be capable of resisting an MITM attack. In the proposed ESCI-AKA, there are three messages, such as M G 1 : { T i S 1 , P I D i , C 4 , C 5 , M A C 2 } , M G 2 : { T i S 2 , C 6 , C 7 , C 8 , M A C 4 } , and M G 3 : { T i S 3 , C 9 , C 10 , A D 6 , M A C 6 } , which are disseminated by S D i , G W k , and S E D j , respectively, to accomplish a secure channel. To effectuate an MITM attack, A requires knowing the secret parameters, which are used in the construction of all the messages communicated during the AKA phase, such as R N U 3 , R N U 4 , R N U 5 , R N U 6 , C 3 , G I D k , C 1 , and C 2 . A lack of knowledge of these parameters makes it hard for A to generate an MITM attack. This way, ESCI-AKA exhibits resistance to MITM attacks.

5.1.5. U i Impersonation Attack

In ESCI-AKA, when the message M G 1 : { T i S 1 , P I D i , C 4 , C 5 , M A C 2 } is transmitted to G W k for authentication and the AKA process, an impersonation attack requires A to generate fabricated or modified messages using random parameters, like C 3 A , G I D k A , and R N U 3 A . However, since A does not possess the knowledge of the actual valid parameters ( C 3 , G I D k , and R N U 3 ), it is unable to generate a valid message, especially the parameter M A C 2 . Consequently, A cannot impersonate a valid user in the smart home environment. Therefore, ESCI-AKA effectively prevents user impersonation attacks.

5.1.6. S E D j Impersonation Attack

In ESCI-AKA, the message, M G 3 : { T i S 3 , C 9 , C 10 , A D 6 , M A C 6 } , is transmitted to U i . Therefore, in order to impersonate a valid S E D j , A would need to generate a fabricated message, M G 3 A . However, for the generation of M G 3 A , A must possess knowledge of the parameters R N U 3 , R N U 4 , R N U 5 , R N U 6 , C 3 , and S I D S E D j . Without knowing these parameters, A cannot generate a valid M G 3 . As a result, the proposed ESCI-AKA effectively safeguards against impersonation attacks targeting S E D j .

5.1.7. Temporary Parameter Leakage Attack

In ESCI-AKA, the session key is computed as S K S E D j ( = S K U i ) = H ( R N U 6 ( C 3 R N U 3 ) ( S I D S E D j R N U 6 R N U 5 ) T i S 3 ) , which incorporates a combination of ephemeral and long-term parameters to enhance its security measure. A needs to obtain ephemeral parameters, such as R N U 3 , R N U 4 , R N U 5 , and R N U 6 , and long-term parameters, such as C 3 , S I D S E D j , G I D k , C 1 , and C 2 , to breach the security of the session key. Hence, the proposed ESCI-AKA is resistant to temporary parameter leakage attacks.

5.1.8. Anonymity and Untraceability

During the secure channel establishment (AKA) phase, three messages are exchanged: M G 1 : { T i S 1 , P I D i , C 4 , C 5 , M A C 2 } , M G 2 : { T i S 2 , C 6 , C 7 , C 8 , M A C 4 } , and M G 3 : { T i S 3 , C 9 , C 10 , A D 6 , M A C 6 } . After capturing these messages, A is unable to determine the user’s identity, which prevents user tracking. Additionally, all the messages generated during the current and previous AKA phases are different and random, making it impossible for A to establish any correlation between captured messages from different sessions. Furthermore, even if A obtains parameters such as { R N U 2 * , A D 1 , Q 1 , M A C 1 , h d , G I D k * , F E . G e n ( · ) , F E . R e p ( · ) }, it cannot extract the real identity of the user. Thus, the proposed ESCI-AKA ensures anonymous communication.

5.1.9. Desynchronization

In the proposed authentication scheme, the pseudo-identity is updated at the gateway. However, this updating of pseudo-identities introduces vulnerability to desynchronization attacks. To mitigate the risk of desynchronization attacks, we have implemented a solution by retaining both the old and current pseudo-identities at the gateway. In the event of eavesdropping or jamming attacks, an attacker can capture messages and drop them at any point during the execution of the proposed scheme. Nevertheless, even if the messages are dropped, users can still utilize the old identities to successfully complete the AKA phase of the scheme. This safeguard ensures protection against desynchronization attacks.

5.2. ROM-Based Validation

A formal analysis of the security of the session key generated during the AKA phase of ESCI-AKA is conducted using the random oracle model (ROM). The essential components of the ROM are outlined below:
  • Participants: In ESCI-AKA, there are three main participants: U i , G W k , and S E D j . We represent the instances, p 1 , p 2 , and p 3 , of U i , G W k , and S E D j of these participants as Π U i p 1 , Π G W k p 2 , and Π S E D j p 3 , which serve as oracles in the system.
  • Partnership: Upon reaching the acceptance state, the instances, Π U i p 1 and Π S E D j p 3 , establish a partnership if they possess a shared session key.
  • Freshness: A is incapable of disclosing the session key that is established between Π U i p 1 and Π S E D j p 3 during the AKA phase.
The capabilities of A are analyzed in Section 3.2. Furthermore, A can influence different queries to execute various attacks on ESCI-AKA.
  • Execute ( Π U i p 1 , Π G W k p 2 , Π S E D j p 3 ) : A passive attack can be simulated employing this query, authorizing A to model and observe the passive attack. With this query, A can acquire all the messages exchanged during the AKA process of ESCI-AKA.
  • Test ( Π p 1 ) : A operates this query to demonstrate whether the imagined session key is definitely the correct session key or merely a random guess.
  • Reveal ( Π p 1 ) : This query is effectuated by A to acquire the session key maintained by the oracle, Π p 1 .
  • Send ( Π p 1 , M G ) : This query is effectuated to establish an active attack. Additionally, Π p 1 can transmit a message, M G , to Π p 1 and acquire an affiliated response.
  • CorruptSD ( Π p 1 ) : This query is effectuated by A to acquire the long-term parameters held in the memory of S D i .
Theorem 1.
We consider that A is a polynomial-time ( p o l t ) adversary endeavoring to crack the security of the session key established between the user and S E D j in ESCI-AKA. Hence, the advantage of A in successfully cracking the security of the session key can be derived as follows:
A d v A E S C I A K A ( p o l t ) H q 2 | H S P | + S q 2 b k l 1 · | P S P | + 2 · A d v A E A D O C C A 3 .
In the above equation, H q 2 , S q , | P S P | , and 2 b k l , | H S P | represent the number of queries for the hash function, send queries, password space, biometric key space/length, and hash function space, respectively. Furthermore, A d v A O C C A 3 ( p o l t ) [55] denotes the advantage of A in breaking the security of ASCON within a polynomial-time constraint.
Proof. 
The proof of Theorem 1 is conducted in the same way as in [54,57,58]. Here, we consider the four games ( G q | q = 0 , 1 , 2 , 3 ) , where the winning probability of A to determine the correct bit “b” is denoted by A d v G . All the games are explicated in the following sections in detail.
G 0 : This is considered an initial attack from A against ESCI-AKA in the ROM model. As “b” must be decided before G 0 , it is obvious that
A d v A E S C I A K A ( p o l t ) = | 2 · A d v G 0 1 | .
G 1 : This game enables A to perform E x e c u t e ( Π U i p 1 , Π G W k p 2 , Π S E D j p 3 ) . By using this query, A can capture all the messages, such as M G 1 : { T i S 1 , P I D i , C 4 , C 5 , M A C 2 } , M G 2 : { T i S 2 , C 6 , C 7 , C 8 , M A C 4 } , and M G 3 : { T i S 3 , C 9 , C 10 , A D 6 , M A C 6 } , exchanged between network participants, such as S D i , G W k , and S E D j , respectively. Now, the primary objective of A is to construct the session key S K S E D j ( = S K U i ) = H ( R N U 6 ( C 3 R N U 3 ) ( S I D S E D j R N U 6 R N U 5 ) T i S 3 ) , which is constructed during the execution of the AKA phase. As the session key in ESCI-AKA is generated using a combination of long-term and ephemeral parameters, such as R N U 3 , R N U 4 , R N U 5 , R N U 6 , C 3 , G I D k , C 1 , and C 2 , the R e v e a l query is employed at the end of G 1 to reveal the session key, and the T e s t query is used to verify whether the constructed session key is a valid output or a random one. However, the probability of A winning without knowledge of R N U 3 , R N U 4 , R N U 5 , R N U 6 , C 3 , G I D k , C 1 , and C 2 is extremely low. Therefore, G 0 and G 1 can be considered equivalent. Thus, we can conclude that
A d v G 1 = A d v G 0
G 2 : An active attack is conducted by executing H q 2 queries. In ESCI-AKA, the hash function generates the session key (SK) for U i and S E D j . A attempts to find a collision by constructing H S P queries to compromise the security of the SK. However, the likelihood of a collision is minimal, as indicated by the birthday paradox.
A d v G 2 A d v G 1 H q 2 2 | H S P | .
G 3 : In this scenario, A captures the S D i of a user and extracts sensitive parameters, including { R N U 2 , A D 1 , Q 1 , M A C 1 , h d , G I D k , F E . G e n ( · ) , F E . R e p ( · ) }, from the memory of S D i . To accomplish this, A executes C o r r u p t S D ( Π p 1 ) . The objective of A is to modify or change the user’s password and biometrics. However, generating or guessing biometric keys is challenging, and the length of the biometric key, denoted as b k l , makes the probability of guessing the biometric key ( 1 2 b k l ) negligible. Furthermore, considering the limited number of permissible incorrect password attempts, we can deduce that the probability of successfully guessing or modifying the user’s password and biometrics within the allowed number of attempts is extremely low. Therefore, the security of ESCI-AKA is maintained, as it effectively protects against unauthorized access to and manipulation of user credentials. Hence, we have the following:
A d v G 3 A d v G 2 S q 2 b k l · | P S P | .
G 4 : In this game, A conducts a real attack by capturing all the exchanged messages, including M G 1 , M G 2 , and M G 3 , using the E x e c u t e ( Π U i p 1 , Π G W k p 2 , Π S E D j p 3 ) query. It is important to note that all the messages transmitted during the AKA phase are encrypted using the ASCON encryption algorithm. Based on the security definition of ASCON (refer to Definition 1), ASCON is deemed safe for usage. Consequently, the advantage of A in cracking the security of the AEAD scheme is nominal. Thus, we can extrapolate that
A d v G 4 A d v G 3 A d v A E A D , A O C C A 3 ( p o l t ) .
A , after finishing games, such as ( G q | q [ 0 , 3 ] ) , receives no considerable advantage to gain the correct bit “b”. Thus, we arrive at
A d v G 4 = 1 / 2
From (15) and (16), we obtain
A d v A E S C I A K A ( p o l t ) = | 2 · A d v G 0 1 2 | .
From (21), we obtain
1 2 · A d v A E S C I A K A ( p o l t ) = | A d v G 0 A d v G 4 | .
By using (20) and (22), we obtain
1 2 · A d v A E S C I A K A ( p o l t ) = | A d v G 1 A d v G 4 |
Upon considering the triangular inequality, we have
| A d v G 1 A d v G 4 | | A d v G 1 A d v G 2 | + | A d v G 2 A d v G 4 | | A d v G 1 A d v G 2 | + | A d v G 2 A d v G 3 | + | A d v G 3 A d v G 4 | .
By using (17), (19), and (24), we obtain
A d v A E S C I A K A ( p o l t ) H q 2 | H S P | + S q 2 b k l 1 · | P S P | + 2 . A d v A E A D , A O C C A 3 ( p o l t ) .
 □

5.3. Formal Validation Using Scyther

Scyther is employed to analyze potential vulnerabilities in security frameworks. Developed in Python, Scyther ensures that all cryptographic operations/functions are impenetrable. This implies that unless an attacker manages to seize the decryption key, the encrypted transmission remains incomprehensible to them. In this article, we employ Scyther to examine the security characteristics of ESCI-AKA. ESCI-AKA is implemented using Security Protocol Description Language (SPDL), which defines three roles: (i) G W K (gateway role), (ii) S E D J (smart embedded device role), and (iii) R M U / S D I (user role). The SPDL script contains both manually established claims and automatically generated ones, all of which are verified by Scyther, as depicted in Figure 3. Consequently, we can affirm that ESCI-AKA is well protected and secure, as illustrated in Figure 3.

6. Performance Comparison

The proposed ESCI-AKA was compared with several references, including [10,11,12,13,14,15,16], in terms of their security characteristics and communication and computational costs. To evaluate the computational performance of various cryptographic primitives, we conducted tests on “Raspberry-Pi-3 with a CPU clocked at 1.2 GHz and 1 GB of RAM”, running the Ubuntu operating system. Each cryptographic primitive was executed 100 times, and the average time taken by each primitive is presented in Table 3.

6.1. Security Comparison

In this subsection, we correlate the security characteristics of ESCI-AKA with other references: [10,11,12,13,14,15,16]. The security mechanism offered in [10] lacks protection against impersonation and device capture attacks, and it does not guarantee mutual authentication. The authentication mechanism offered in [11] is defenseless against password guessing, impersonation, and MITM attacks. Moreover, it is unable to accomplish mutual authentication and achieve user anonymity. The authentication mechanism offered in [12] does not guarantee protection against privileged insider, user anonymity, stolen smart card, and password guessing attacks. The security mechanism offered in [13] is ineffective against password guessing and temporary secret leakage, and it also lacks anonymity and untraceability characteristics. The scheme offered in [14] is defenseless against privileged insider, impersonation, replay, stolen smart card, identity guessing, and password guessing attacks. The security protocol proposed in [16] is unable to resist privileged insider and temporary parameter leakage attacks. In contrast, the proposed ESCI-AKA is protected against diverse security attacks. A comparison of the security characteristics is represented in Table 4.

6.2. Memory Cost

In the proposed scheme, the memory requirements at different nodes are as follows:
  • Smart device node: S I D S E D j , D S K = {128 + 256} = 384 bits;
  • Gateway node: 2 × ( P I D i R N U ) = {256 × 2} = 512 bits;
  • User device: { R N U 2 * , G I D k * , A D 1 , Q 1 , M A C 1 , h d , F E . G e n ( · ) , F E . R e p ( · ) } = {128 + 128 + 128 + 256 + 160} = 800 bits. In the proposed scheme, the total memory cost required is 1696 bits, while the works referenced as [10,11,12,13,14,15,16] require 1888 bits, 2048 bits, 1928 bits, 1024 bits, 992 bits, 1024 bits, and 992 bits, respectively. The proposed scheme requires more memory compared to certain security schemes but still demands less memory compared to other relevant security schemes. The proposed scheme, in comparison to related security schemes, incurs lower computational and communication costs while offering more significant security features.

6.3. Computational Cost

The computational cost of the proposed ESCI-AKA and other relevant security frameworks are computed using the computational time given in Table 3. The aggregated computational cost of ESCI-AKA is 8.569 ms, which is 65.71%, 66.18%, 84.87%, 66.18%, 79.65%, 61.01%, and 86.27% less than the security frameworks presented in [10,11,12,13,14,15,16], respectively. In addition, a comparison of the total computational cost is given in Figure 4, which indicates that the proposed ESCI-AKA requires low computational time to accomplish the AKA phase. The computational costs at U i , G W k , and S E D j are 6.201 ms, 1.184 ms, and 1.184 ms, respectively. A comparison of computational cost at U i , G W k , and S E D j is provided in Figure 5, which shows that ESCI-AKA requires low computation resources at U i , G W k , and S E D j .
In addition, the proposed ESCI-AKA requires fewer computational resources when many users are sending the security channel establishment or authentication request to G W k . A comparison of computation cost when increasing the number of users at G W k is provided in Figure 6 and Table 5.

6.4. Communication Cost

To estimate the communication cost of the proposed ESCI-AKA during the AKA phase or authentication phase, we consider the sizes of the different parameters given in Table 3. In ESCI-AKA, three messages are exchanged among various network entities: M G 1 : { T i S 1 , P I D i , C 4 , C 5 , M A C 2 } , M G 2 : { T i S 2 , C 6 , C 7 , C 8 , M A C 4 } , and M G 3 : { T i S 3 , C 9 , C 10 , A D 6 , M A C 6 } . The sizes of M G 1 , M G 2 , and M G 3 are 544 bits, 544 bits, and 416 bits, respectively. ESCI-AKA requires 544 + 544 + 416 = 1540 bits to complete the AKA phase. In comparison, the communication costs required by [10,11,12,13,14,15,16] (shown in Figure 7 and Table 6) are 2720 bits, 3550 bits, 2528 bits, 3552 bits, 3290 bits, 2880 bits, and 4416 bits, respectively. Figure 7 and Table 6 provide a comparison of the communication costs between ESCI-AKA and other related security mechanisms.

7. Conclusions

In this paper, we introduced ESCI-AKA, an innovative secure authentication framework designed specifically for the smart home environment. The primary goal of ESCI-AKA is to establish a secure channel between a user’s device and the smart home, ensuring secure communication over the public Internet. To achieve optimal resource efficiency, ESCI-AKA makes use of the lightweight cryptographic authenticated encryption scheme called “ASCON” and incorporates a hash function. The security of the session key established by ESCI-AKA is verified through a thorough ROM-based analysis. Furthermore, extensive informal analysis has demonstrated ESCI-AKA’s robustness against various types of attacks, including replay attacks, MITM attacks, and desynchronization attacks. This ensures that the communication between the device and the smart home remains secure even in the presence of potential threats. The security claims of ESCI-AKA are further supported by a Scyther-based implementation, which reinforces its reliability in real-world scenarios. This implementation has proven its effectiveness in practical applications, enhancing the overall security of the framework. Moreover, in performance evaluations, ESCI-AKA has shown significant improvements in computational and communication costs. The framework achieves a significant computational cost reduction, ranging from 61.01% to 86.27%, and a communication cost reduction, ranging from 40.51% to 65.94%. These improvements not only enhance the efficiency of the system but also ensure that the security features remain intact. In the future, we plan to utilize lightweight cryptographic primitives, such as ASCON and Esch256, to design data sharing and access control mechanisms using blockchain technology.

Author Contributions

Conceptualization, H.A. and M.T.; Methodology, H.A.; Software, H.A.; Formal analysis, H.A. and M.T.; Investigation, H.A.; Data curation, H.A.; Writing—original draft, M.T. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Deanship of Scientific Research at King Khalid University through Large Group Research Project under grant number RGP.2/312/44.

Data Availability Statement

This study did not utilize any external datasets in its analysis.

Acknowledgments

The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through the large group research project under grant number RGP2/312/44.

Conflicts of Interest

The authors state that there are no conflict of interest to disclose.

References

  1. Hassan, W.H. Current research on Internet of Things (IoT) security: A survey. Comput. Netw. 2019, 148, 283–294. [Google Scholar]
  2. Kaur, B.; Dadkhah, S.; Shoeleh, F.; Neto, E.C.P.; Xiong, P.; Iqbal, S.; Lamontagne, P.; Ray, S.; Ghorbani, A.A. Internet of things (IoT) security dataset evolution: Challenges and future directions. Internet Things 2023, 22, 100780. [Google Scholar] [CrossRef]
  3. Toh, C. Security for Smart Cities. IET Smart Cities 2020, 2, 95–104. [Google Scholar] [CrossRef]
  4. Fabrègue, B.F.; Bogoni, A. Privacy and Security Concerns in the Smart City. Smart Cities 2023, 6, 586–613. [Google Scholar] [CrossRef]
  5. Ragothaman, K.; Wang, Y.; Rimal, B.; Lawrence, M. Access control for IoT: A survey of existing research, dynamic policies and future directions. Sensors 2023, 23, 1805. [Google Scholar] [CrossRef]
  6. Dobraunig, C.; Eichlseder, M.; Mendel, F.; Schläffer, M. Ascon v1.2: Lightweight authenticated encryption and hashing. J. Cryptol. 2021, 34, 33. [Google Scholar] [CrossRef]
  7. Wu, H.; Preneel, B. AEGIS: A fast authenticated encryption algorithm. In Proceedings of the Selected Areas in Cryptography–SAC 2013: 20th International Conference, Burnaby, BC, Canada, 14–16 August 2013; Revised Selected Papers 20; Springer: Berlin/Heidelberg, Germany, 2014; pp. 185–201. [Google Scholar]
  8. Aagaard, M.; AlTawy, R.; Gong, G.; Mandal, K.; Rohit, R. ACE: An authenticated encryption and hash algorithm. LWC 2019. in submission. [Google Scholar]
  9. Tanveer, M.; Bhutta, M.N.M.; Alzahrani, B.A.; Albeshri, A.; Alsubhi, K.; Chaudhry, S.A. CMAP-IoT: Chaotic Map-Based Authentication Protocol for Crowdsourcing Internet of Things. Arab. J. Sci. Eng. 2023, 1–14. [Google Scholar] [CrossRef]
  10. Li, X.; Peng, J.; Obaidat, M.S.; Wu, F.; Khan, M.K.; Chen, C. A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems. IEEE Syst. J. 2019, 14, 39–50. [Google Scholar] [CrossRef]
  11. Yuanbing, W.; Wanrong, L.; Bin, L. An Improved Authentication Protocol for Smart Healthcare System Using Wireless Medical Sensor Network. IEEE Access 2021, 9, 105101–105117. [Google Scholar] [CrossRef]
  12. Challa, S.; Wazid, M.; Das, A.K.; Kumar, N.; Reddy, A.G.; Yoon, E.J.; Yoo, K.Y. Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 2017, 5, 3028–3043. [Google Scholar] [CrossRef]
  13. Choi, Y.; Lee, D.; Kim, J.; Jung, J.; Nam, J.; Won, D. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 2014, 14, 10081–10106. [Google Scholar] [CrossRef] [Green Version]
  14. Butt, T.M.; Riaz, R.; Chakraborty, C.; Rizvi, S.S.; Paul, A. Cogent and energy efficient authentication protocol for wsn in iot. Comput. Mater. Contin. 2021, 68, 1877–1898. [Google Scholar]
  15. Zou, S.; Cao, Q.; Wang, C.; Huang, Z.; Xu, G. A Robust Two-Factor User Authentication Scheme-Based ECC for Smart Home in IoT. IEEE Syst. J. 2022, 16, 4938–4949. [Google Scholar] [CrossRef]
  16. Sureshkumar, V.; Amin, R.; Vijaykumar, V.; Sekar, S.R. Robust secure communication protocol for smart healthcare system with FPGA implementation. Future Gener. Comput. Syst. 2019, 100, 938–951. [Google Scholar] [CrossRef]
  17. Liu, Y.; Wang, J.; Yan, Z.; Wan, Z.; Jäntti, R. A Survey on Blockchain-based Trust Management for Internet of Things. IEEE Internet Things J. 2023, 10, 5898–5922. [Google Scholar] [CrossRef]
  18. Corallo, A.; Lazoi, M.; Lezzi, M.; Luperto, A. Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review. Comput. Ind. 2022, 137, 103614. [Google Scholar] [CrossRef]
  19. Hussain, S.; Ullah, S.S.; Ali, I.; Xie, J.; Inukollu, V.N. Certificateless signature schemes in Industrial Internet of Things: A comparative survey. Comput. Commun. 2022, 181, 116–131. [Google Scholar] [CrossRef]
  20. Tanveer, M.; Abbas, G.; Abbas, Z.H.; Bilal, M.; Mukherjee, A.; Kwak, K.S. LAKE-6SH: Lightweight User Authenticated Key Exchange for 6LoWPAN-Based Smart Homes. IEEE Internet Things J. 2022, 9, 2578–2591. [Google Scholar] [CrossRef]
  21. Tanveer, M.; Khan, A.U.; Kumar, N.; Hassan, M.M. RAMP-IoD: A Robust Authenticated Key Management Protocol for the Internet of Drones. IEEE Internet Things J. 2022, 9, 1339–1353. [Google Scholar] [CrossRef]
  22. Srinivas, J.; Das, A.K.; Wazid, M.; Vasilakos, A.V. Designing secure user authentication protocol for big data collection in IoT-based intelligent transportation system. IEEE Internet Things J. 2020, 8, 7727–7744. [Google Scholar] [CrossRef]
  23. Xu, H.; Hsu, C.; Harn, L.; Cui, J.; Zhao, Z.; Zhang, Z. Three-factor anonymous authentication and key agreement based on fuzzy biological extraction for Industrial Internet of Things. IEEE Trans. Serv. Comput. 2023. [Google Scholar] [CrossRef]
  24. Kwon, D.K.; Yu, S.J.; Lee, J.Y.; Son, S.H.; Park, Y.H. WSN-SLAP: Secure and lightweight mutual authentication protocol for wireless sensor networks. Sensors 2021, 21, 936. [Google Scholar] [CrossRef] [PubMed]
  25. Kumar, D. Cryptanalysis and improvement of an authentication protocol for wireless sensor networks. Trans. Emerg. Telecommun. Technol. 2023, 34, e4747. [Google Scholar]
  26. Ali, R.; Pal, A.K.; Kumari, S.; Sangaiah, A.K.; Li, X.; Wu, F. An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring. J. Ambient. Intell. Humaniz. Comput. 2018, 1–22. [Google Scholar] [CrossRef]
  27. Masud, M.; Gaba, G.S.; Choudhary, K.; Hossain, M.S.; Alhamid, M.F.; Muhammad, G. Lightweight and anonymity-preserving user authentication scheme for IoT-based healthcare. IEEE Internet Things J. 2021, 9, 2649–2656. [Google Scholar] [CrossRef]
  28. Tanveer, M.; Alkhayyat, A.; Khan, A.U.; Kumar, N.; Alharbi, A.G. REAP-IIoT: Resource-Efficient Authentication Protocol for the Industrial Internet of Things. IEEE Internet Things J. 2022, 9, 24453–24465. [Google Scholar] [CrossRef]
  29. Ashrif, F.F.; Sundarajan, E.A.; Ahmed, R.; Hasan, M.K. SLAE6: Secure and Lightweight Authenticated Encryption Scheme for 6LoWPAN Networks. In Proceedings of the 12th International Conference on Sensor Networks-SENSORNETS, Online, 23–24 February 2023. [Google Scholar]
  30. Fotouhi, M.; Bayat, M.; Das, A.K.; Far, H.A.N.; Pournaghi, S.M.; Doostari, M.A. A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT. Comput. Netw. 2020, 177, 107333. [Google Scholar] [CrossRef]
  31. Fan, Q.; Chen, J.; Shojafar, M.; Kumari, S.; He, D. SAKE*: A Symmetric Authenticated Key Exchange Protocol with Perfect Forward Secrecy for Industrial Internet of Things. IEEE Trans. Ind. Inform. 2022, 18, 6424–6434. [Google Scholar] [CrossRef]
  32. Hu, H.; Liao, L.; Zhao, J. Secure Authentication and Key Agreement Protocol for Cloud-Assisted Industrial Internet of Things. Electronics 2022, 11, 1652. [Google Scholar] [CrossRef]
  33. Tanveer, M.; Alkhayyat, A.; Chaudhry, S.A.; Zikria, Y.B.; Kim, S.W. REAS-TMIS: Resource-efficient authentication scheme for telecare medical information system. IEEE Access 2022, 10, 23008–23021. [Google Scholar] [CrossRef]
  34. Tanveer, M.; Alasmary, H. LACP-SG: Lightweight Authentication Protocol for Smart Grids. Sensors 2023, 23, 2309. [Google Scholar] [CrossRef] [PubMed]
  35. Liu, Z.; Guo, J.; Huang, F.; Cai, D.; Wu, Y.; Chen, X.; Igorevich, K.K. Lightweight trustworthy message exchange in unmanned aerial vehicle networks. IEEE Trans. Intell. Transp. Syst. 2023, 24, 2144–2157. [Google Scholar] [CrossRef]
  36. Guo, J.; Xiong, L.; Li, J.; Liu, J.; Tian, S.; Li, H. An incentive mechanism for horizontal federated learning based on principle of compound interest. Phys. Commun. 2023, 60, 102128. [Google Scholar] [CrossRef]
  37. Meshram, C.; Obaidat, M.S.; Lee, C.C.; Meshram, S.G. An Efficient, Robust, and Lightweight Subtree-Based Three-Factor Authentication Procedure for Large-Scale DWSN in Random Oracle. IEEE Syst. J. 2021, 15, 4927–4938. [Google Scholar] [CrossRef]
  38. Li, Y.; Tian, Y. A Lightweight and Secure Three-Factor Authentication Protocol with Adaptive Privacy-Preserving Property for Wireless Sensor Networks. IEEE Syst. J. 2022, 16, 6197–6208. [Google Scholar] [CrossRef]
  39. Wu, F.; Li, X.; Xu, L.; Vijayakumar, P.; Kumar, N. A novel three-factor authentication protocol for wireless sensor networks with IoT notion. IEEE Syst. J. 2020, 15, 1120–1129. [Google Scholar] [CrossRef]
  40. Hussain, S.; Chaudhry, S.A.; Alomari, O.A.; Alsharif, M.H.; Khan, M.K.; Kumar, N. Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones. IEEE Syst. J. 2021, 15, 4431–4438. [Google Scholar] [CrossRef]
  41. Zhang, M.; Xu, C.; Li, S.; Jiang, C. On the Security of an ECC-Based Authentication Scheme for Internet of Drones. IEEE Syst. J. 2022, 16, 6425–6428. [Google Scholar] [CrossRef]
  42. Aman, M.N.; Basheer, M.H.; Sikdar, B. A Lightweight Protocol for Secure Data Provenance in the Internet of Things Using Wireless Fingerprints. IEEE Syst. J. 2021, 15, 2948–2958. [Google Scholar] [CrossRef]
  43. Aminian Modarres, A.M.; Sarbishaei, G. An Improved Lightweight Two-Factor Authentication Protocol for IoT Applications. IEEE Trans. Ind. Inform. 2022, 19, 6588–6598. [Google Scholar] [CrossRef]
  44. Lee, J.; Oh, J.; Park, Y. A Secure and Anonymous Authentication Protocol Based on Three-Factor Wireless Medical Sensor Networks. Electronics 2023, 12, 1368. [Google Scholar] [CrossRef]
  45. Kwon, D.; Park, Y.; Park, Y. Provably secure three-factor-based mutual authentication scheme with PUF for wireless medical sensor networks. Sensors 2021, 21, 6039. [Google Scholar] [CrossRef] [PubMed]
  46. Ding, Z.; Xie, Q. Provably Secure Dynamic Anonymous Authentication Protocol for Wireless Sensor Networks in Internet of Things. Sustainability 2023, 15, 5734. [Google Scholar] [CrossRef]
  47. Rangwani, D.; Om, H. A secure user authentication protocol based on ECC for cloud computing environment. Arab. J. Sci. Eng. 2021, 46, 3865–3888. [Google Scholar] [CrossRef]
  48. Wazid, M.; Das, A.K.; Kumar, N.; Vasilakos, A.V. Design of secure key management and user authentication scheme for fog computing services. Future Gener. Comput. Syst. 2019, 91, 475–492. [Google Scholar] [CrossRef]
  49. Yeh, H.L.; Chen, T.H.; Liu, P.C.; Kim, T.H.; Wei, H.W. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 2011, 11, 4767–4779. [Google Scholar] [CrossRef]
  50. Cho, Y.; Oh, J.; Kwon, D.; Son, S.; Lee, J.; Park, Y. A Secure and Anonymous User Authentication Scheme for IoT-Enabled Smart Home Environments Using PUF. IEEE Access 2022, 10, 101330–101346. [Google Scholar] [CrossRef]
  51. Kaveh, M.; Mosavi, M.R. A lightweight mutual authentication for smart grid neighborhood area network communications based on physically unclonable function. IEEE Syst. J. 2020, 14, 4535–4544. [Google Scholar] [CrossRef]
  52. Safkhani, M.; Bagheri, N.; Ali, S.; Hussain Malik, M.; Hassan Ahmed, O.; Hosseinzadeh, M.; Mosavi, A.H. Improvement and Cryptanalysis of a Physically Unclonable Functions Based Authentication Scheme for Smart Grids. Mathematics 2022, 11, 48. [Google Scholar] [CrossRef]
  53. Tanveer, M.; Ahmad, M.; Nguyen, T.N.; Abd El-Latif, A.A. Resource-Efficient Authenticated Data Sharing Mechanism for Smart Wearable Systems. IEEE Trans. Netw. Sci. Eng. 2022. [Google Scholar] [CrossRef]
  54. Tanveer, M.; Ahmad, M.; Khalifa, H.S.; Alkhayyat, A.; Abd El-Latif, A.A. A new anonymous authentication framework for secure smart grids applications. J. Inf. Secur. Appl. 2022, 71, 103336. [Google Scholar] [CrossRef]
  55. Abed, F.; Forler, C.; Lucks, S. General classification of the authenticated encryption schemes for the CAESAR competition. Comput. Sci. Rev. 2016, 22, 13–26. [Google Scholar] [CrossRef]
  56. Tanveer, M.; Bashir, A.K.; Alzahrani, B.A.; Albeshrir, A.; Alsubhi, K.; Chaudhry, S.A. CADF-CSE: Chaotic map-based authenticated data access/sharing framework for IoT-enabled cloud storage environment. Phys. Commun. 2023, 59, 102087. [Google Scholar] [CrossRef]
  57. Tanveer, M.; Alkhayyat, A.; Naushad, A.; Khan, A.U.; Kumar, N.; Alharbi, A.G. RUAM-IoD: A Robust User Authentication Mechanism for the Internet of Drones. IEEE Access 2022, 10, 19836–19851. [Google Scholar] [CrossRef]
  58. Tanveer, M.; Khan, A.U.; Kumar, N.; Naushad, A.; Chaudhry, S.A. A Robust Access Control Protocol for the Smart Grid Systems. IEEE Internet Things J. 2022, 9, 6855–6865. [Google Scholar] [CrossRef]
Figure 1. Smart home environment.
Figure 1. Smart home environment.
Mathematics 11 03450 g001
Figure 2. Authentication model for the smart home environment.
Figure 2. Authentication model for the smart home environment.
Mathematics 11 03450 g002
Figure 3. Results generated through Scyther.
Figure 3. Results generated through Scyther.
Mathematics 11 03450 g003
Figure 4. Computation cost to complete the secret channel establishment phase.
Figure 4. Computation cost to complete the secret channel establishment phase.
Mathematics 11 03450 g004
Figure 5. Computational cost at U i , G W k , and S E D j side during the accomplishment of the AKA phase.
Figure 5. Computational cost at U i , G W k , and S E D j side during the accomplishment of the AKA phase.
Mathematics 11 03450 g005
Figure 6. Computational cost at server increasing the number of U i .
Figure 6. Computational cost at server increasing the number of U i .
Mathematics 11 03450 g006
Figure 7. Communication cost required to accomplish the AKA phase.
Figure 7. Communication cost required to accomplish the AKA phase.
Mathematics 11 03450 g007
Table 1. Overview of Existing User AKA Frameworks.
Table 1. Overview of Existing User AKA Frameworks.
ReferenceEnvironmentCryptographic PrimitiveValidation + ImplementationAttack ModelStrength/WeaknessAnalyzed byNPME
[37]WSNHF + XORROMDY + CKVulnerable to privilege insider, device capture, and impersonation attacks.[38]33
[39]IoTHF + XORProVerify + NS2DY + CKVulnerable to password guessing, DoS, replay, and impersonation attacks.[38]33
[40]IoDHF + ECC + XORROMDY + CKVulnerable to drone impersonation attacks.[41]33
[42]IoTHF + XORBAN logicDY + CKThe devised authentication scheme is vulnerable to replay and DoS attacks.[43]33
[29]IoTHF + AEAD + XORBAN logicDY + CKThe devised authentication scheme is secure and resource-efficient.22
[28]IIoTHF + ECC + AEAD + XORROM + ScytherDY + CKThe devised authentication framework is lightweight and reliable.33
[21]IIoTHF + ECC + AEAD + XORROM + ScytherDY + CKThe propounded user authentication framework is resilient against various security attacks.33
[23]IIoTHF + ECC + XORROM + BAN logicDY + CKSecure against various security threats.33
[11]WSNHF + ECC + XORBAN logic + AVISPADY + CKIncapacitated against off-line guessing, impersonation, and MITM attacks.[44]34
[27]IoTHF + XORAVISPADY + CKCannot prevent password guessing and impersonation attacks.[45]34
[14]IIoTHF + ECC + XORBAN logic + AVISPADY + CKWeak against impersonation, replay, device capture attacks.[46]33
[47]WSNHF + ECC + XORROM + ScytherDY + CKCannot resist privilege insider attacks. 34
[48]FCHF + ECC + XORROM + AVISPADY + CKCannot prevent DoS, privilege insider, stolen smart card attacks.[47]33
[16]IIoTHF + ECC + XORBAN logicDY + CKWeak against privileged insider and temporary secret leakage attacks.33
[49]IIoTHF + ECC + XORDYWeak against identity guessing and stolen smart card attacks.33
[15]IoTHF + ECC + XORROMDY + CKWeak against forgery, session key disclosure, and temporary parameters leakage attacks.[50]34
[51]SGHF + PUF + XORBAN logicDY + CKCannot resist impersonation and desynchronization attacks[52]23
ESCI-AKAIIoTHF + ECC + AEAD + XORROM + ScytherDY + CKSecure against various security attacks.33
Note: HF: hash function; NP: number of participants; ME: message exchange; DY: Dolev–Yao; PUF: physical unclonable function; CK: Canetti–Krawczyk; AVISPA: automated validation of Internet security protocols and applications; FC: fog computing; WSN: wireless sensor network; BAN: Burrows–Abadi–Needham; SG: smart grid.
Table 2. Notations Utilized in ESCI-AKA.
Table 2. Notations Utilized in ESCI-AKA.
NotationDescription
U i The remote user
S D U i IoT-enabled smart device
G I D k The identity of the gateway
I D U i , P W U i The identity and password of U i , respectively
P I D c Current pseudo-identities
P I D o Old pseudo-identities
T i S 1 , T i S 2 , T i S 3 Timestamps utilized in ESCI-AKA’s authentication phase
A D L , T R Allowed time delay limit and received time of a message
A D x Associative data, where x = 1 , 2 , 3 , , n
E k ( P ) , D k ( C ) Secret-key-based encryption of string “P” and decryption “C” using ASCON
R N U y Random numbers utilized while accomplishing the AKA phase
P z Plaintext z = 1 , 2 , 3 , 4 , 5 , 6 , 7
C a Ciphertext a = 1 , 2 , 3 , , 7
B i o U i , σ , F E . G e n ( · ) , h d , F E . R e p ( · ) User biometric information and key, respectively
F E . G e n ( · ) , h d , F E . R e p ( · ) User key generation algorithm, reproduction parameter, and key reproduction algorithm, respectively
⊕, | | , H ( · ) XOR, concatenation, and hash function, respectively
Table 3. Execution Time.
Table 3. Execution Time.
Cryptographic FunctionNotationRaspberry Pi-3Size in Bits
ECC scalar multiplication T E C C 3.47 msECC size (320 bits)
Encryption/decryption T E N C 0.664 msID size (128 bits)
Hash function (SHA-256) T H F 0.382 msHASH output size (256 bits)
ASCON encryption/decryption T A E A D 0.401 msMAC size (128 bits)
Biometric key generation T B T E C C 3.47 msTimestamps (32 bits)
Table 4. Security Properties Comparison.
Table 4. Security Properties Comparison.
Features/Attacks[10][11][12][13][14][15][16]ESCI-AKA
“Anonymity/Untraceability”×××
“Password Guessing Attack”××××
“Impersonation Attack”×××
“MITM”×
“TSL Attack”××
“Replay Attack”×
“SSC Attack”
“Identity Guessing”×
“Desynchronization”
Note: SSC: stolen smart card; TSL: temporary secret leakage; ✓ denotes the availability of features; × indicates the feature not available.
Table 5. Computational Cost.
Table 5. Computational Cost.
Scheme U i Side GW k / TA Side SED j SideTotal Time (ms)
[10] 8 T H F + 3 T E C C 13.46 7 T H F + T E C C 6.144 5 T H F + T E C C 5.38 ms 20 T H F + 5 T E C C 24.99 ms
[11] 14 T H F + 2 T E C C 12.288 10 T H F 3.82 6 T H F + 2 T E C C 9.232 ms 30 T H F + 4 T E C C 25.34 ms
[12] 5 T H F + 5 T E C C + T B 22.73 4 T H F + 5 T E C C 18.87 3 T H F + 4 T E C C 15.026 ms 12 T H F + 14 T E C C + T B 56.634 ms
[13] 8 T H F + 2 T E C C 9.96 5 T H F + T E C C 5.38 6 T H F + 2 T E C C 9.232 ms 30 T H F + 4 T E C C 25.34 ms
[14] 3 T H F + 2 T E C C + 2 T E N C 9.41 12 T H F + 2 T E C C 1.71 T H F + 2 T E N C 19.24 ms 16 T H F + 3 T E N C + 4 T E C C 42.11 ms
[15] 6 T H F + 3 T E C C 12.70 6 T H F + T E C C 5.76 5 T H F + 2 T E C C 8.85 ms 17 T H F + 6 T E C C 21.98 ms
[16] 8 T H F + 3 T E C C 13.46 6 T H F + 6 T E C C 23.11 4 T H F + 5 T E C C 18.87 ms 18 T H F + 16 T E C C 62.39 ms
ESCI-AKA 4 T H F + 3 T A E A D + T B 6.201 T H F + 2 T A E A D 1.184 T H F + 2 T A E A D 1.184 ms 6 T H F + 7 T A E A D + T B 8.569 ms
Table 6. Communication Cost.
Table 6. Communication Cost.
FrameworksFactorCommunicated Messages
[10]3F2720 bits
[11]2F3552 bits
[12]3F2528 bits
[13]2F3552 bits
[14]3F3290 bits
[15]2F2880 bits
[16]3F4416 bits
ESCI-AKA3F1504 bits
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Alasmary, H.; Tanveer, M. ESCI-AKA: Enabling Secure Communication in an IoT-Enabled Smart Home Environment Using Authenticated Key Agreement Framework. Mathematics 2023, 11, 3450. https://doi.org/10.3390/math11163450

AMA Style

Alasmary H, Tanveer M. ESCI-AKA: Enabling Secure Communication in an IoT-Enabled Smart Home Environment Using Authenticated Key Agreement Framework. Mathematics. 2023; 11(16):3450. https://doi.org/10.3390/math11163450

Chicago/Turabian Style

Alasmary, Hisham, and Muhammad Tanveer. 2023. "ESCI-AKA: Enabling Secure Communication in an IoT-Enabled Smart Home Environment Using Authenticated Key Agreement Framework" Mathematics 11, no. 16: 3450. https://doi.org/10.3390/math11163450

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop