Open Access iconOpen Access

ARTICLE

A Multi-Stage Secure IoT Authentication Protocol

Khalid Alhusayni1, Raniyah Wazirali1, Mousa AlAkhras1,2, Marwah Almasri1,*, Samah Alhazmi1

1 College of Computing and Informatics, Saudi Electronic University, Riyadh, 11673, Saudi Arabia
2 King Abdullah II School for Information Technology, The University of Jordan, Amman, 11942, Jordan

* Corresponding Author: Marwah Almasri. Email: email

Computer Systems Science and Engineering 2023, 45(1), 459-481. https://doi.org/10.32604/csse.2023.028536

Abstract

The Internet of Things (IoT) is a network of heterogeneous and smart devices that can make decisions without human intervention. It can connect millions of devices across the universe. Their ability to collect information, perform analysis, and even come to meaningful conclusions without human capital intervention matters. Such circumstances require stringent security measures and, in particular, the extent of authentication. Systems applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious, wrongly authenticated device finds its way into the IoT system. This research provides a clear and updated view of the trends in the IoT authentication area. Among the issues covered include a series of authentication protocols that have remained research gaps in various studies. This study applies a comparative evaluation of authentication protocols, including their strengths and weaknesses. Thus, it forms the foundation in the IoT authentication field of study. In that direction, a multi authentication architecture that involves secured means is proposed for protocol authentication. Informal analysis can affect the security of the protocols. Burrows-Abadi-Needham (BAN) logic provides proof of the attainment of mutual authentication. NS3 simulator tool is used to compare the performance of the proposed protocol to verify the formal security offered by the BAN logic.

Keywords


Cite This Article

APA Style
Alhusayni, K., Wazirali, R., AlAkhras, M., Almasri, M., Alhazmi, S. (2023). A multi-stage secure iot authentication protocol. Computer Systems Science and Engineering, 45(1), 459-481. https://doi.org/10.32604/csse.2023.028536
Vancouver Style
Alhusayni K, Wazirali R, AlAkhras M, Almasri M, Alhazmi S. A multi-stage secure iot authentication protocol. Comput Syst Sci Eng. 2023;45(1):459-481 https://doi.org/10.32604/csse.2023.028536
IEEE Style
K. Alhusayni, R. Wazirali, M. AlAkhras, M. Almasri, and S. Alhazmi, “A Multi-Stage Secure IoT Authentication Protocol,” Comput. Syst. Sci. Eng., vol. 45, no. 1, pp. 459-481, 2023. https://doi.org/10.32604/csse.2023.028536



cc Copyright © 2023 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1859

    View

  • 742

    Download

  • 0

    Like

Share Link