Open Access

ARTICLE

A Multi-Stage Secure IoT Authentication Protocol

Khalid Alhusayni1, Raniyah Wazirali1, Mousa AlAkhras1,2, Marwah Almasri1,*, Samah Alhazmi1
1 College of Computing and Informatics, Saudi Electronic University, Riyadh, 11673, Saudi Arabia
2 King Abdullah II School for Information Technology, The University of Jordan, Amman, 11942, Jordan
* Corresponding Author: Marwah Almasri. Email:

Computer Systems Science and Engineering 2023, 45(1), 459-481. https://doi.org/10.32604/csse.2023.028536

Received 12 February 2022; Accepted 19 April 2022; Issue published 16 August 2022

Abstract

The Internet of Things (IoT) is a network of heterogeneous and smart devices that can make decisions without human intervention. It can connect millions of devices across the universe. Their ability to collect information, perform analysis, and even come to meaningful conclusions without human capital intervention matters. Such circumstances require stringent security measures and, in particular, the extent of authentication. Systems applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious, wrongly authenticated device finds its way into the IoT system. This research provides a clear and updated view of the trends in the IoT authentication area. Among the issues covered include a series of authentication protocols that have remained research gaps in various studies. This study applies a comparative evaluation of authentication protocols, including their strengths and weaknesses. Thus, it forms the foundation in the IoT authentication field of study. In that direction, a multi authentication architecture that involves secured means is proposed for protocol authentication. Informal analysis can affect the security of the protocols. Burrows-Abadi-Needham (BAN) logic provides proof of the attainment of mutual authentication. NS3 simulator tool is used to compare the performance of the proposed protocol to verify the formal security offered by the BAN logic.

Keywords

Internet of Things (IoT); security; authentication; BAN logic; sensor networks

Cite This Article

K. Alhusayni, R. Wazirali, M. AlAkhras, M. Almasri and S. Alhazmi, "A multi-stage secure iot authentication protocol," Computer Systems Science and Engineering, vol. 45, no.1, pp. 459–481, 2023.



This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 371

    View

  • 198

    Download

  • 0

    Like

Share Link

WeChat scan