Skip to main content
Entropy logoLink to Entropy
. 2026 Feb 11;28(2):205. doi: 10.3390/e28020205

Towards Information-Theoretic Security and Privacy in IoT: A Three-Factor AKA Protocol Supporting Forgotten Password Reset

Yicheng Yu 1, Kai Wei 1, Hongtu Li 2, Kai Zhang 3,*
Editors: Mohamed Seif, Hua Sun
PMCID: PMC12939264  PMID: 41751709

Abstract

The growth of the Internet of Things (IoT) has created many problems. A wise example is presented by the design of secure, efficient authentication and key agreement (AKA) protocols. A novel three-factor AKA protocol for the IoT is presented in this paper. The scheme integrates password, biometric, and device-based factors that achieved strong security, which gives anonymity to the user, achieves forward secrecy, and makes the scheme resilient to various attacks like replay, impersonation, and de-synchronization. It also adds a safe lost-password-reset functionality, which makes the protocol more usable. Security analysis proves its strength against the typical adversary, while performance evaluation shows that the solution is better than existing solutions in terms of computational and communication efficiency. The work proposes a practical and scalable security solution for IoT systems, which satisfies the high security standard but within the constraints of an IoT system.

Keywords: Internet of Things, authentication, security protocol, forgotten password reset

1. Introduction

The Internet of Things (IoT) is part of the new generation of information technology. This thing–thing interconnection system forms an intelligent programme. The IoT combines massive sensor and intelligent terminal communication technology [1]. The essence of the world of things—a comprehensive perception of the environment, reliable transmission of mass data, and intelligent processing of information—makes it possible to control and manage objects. The IoT is a key engine driving economic and societal digital transformation and high-quality development, as the application scenarios extend from smart homes to industrial manufacturing, smart cities, environmental monitoring, intelligent healthcare, and other critical fields.

However, these conveniences and increased efficiencies also bring with them serious security challenges due to the rapid proliferation and deep use of the IoT [2]. In this situation, reliable security systems are no longer optional, but necessary for the system to be trusted. Secure access control mechanisms that rely on reliable identity authentication play a critical role in preventing unauthorized data theft and malicious command injection.

Usually, IoT systems exhibit heavy resource asymmetry; there are powerful cloud servers and resourceful user terminals alongside a huge number of extremely resource-scarce sensor nodes. Due to limited computing power and battery life, the latter finds it difficult to bear the overhead of traditional cryptographic protocols [3]. Because of this reality, lightweight security schemes must be designed for heterogeneous environments [2]. The three-layer model (User–Gateway–Sensor Node) is an almost universally adopted model that uses the gateway as a trusted third party to offload the authentication burden. However, many existing schemes that are based on this model still suffer from serious drawbacks. Some are efficient but sacrifice security. Thus, they fail to achieve the basic properties like user anonymity, forward secrecy, and so on. Two properties should be achieved, and at the same time, they suffer from high latency. Other schemes, while achieving these security properties, suffer from other attacks such as gateway bypass, node capture, etc. [4].

In this work, we address the above issues and propose a new authentication and key agreement protocol that is intended to be used in IoT three-layer architecture for usefulness–security trade-off. The proposed protocol integrates lightweight security provisions that enable it to efficiently run on devices with limited resources without compromising the security strength required for sensitive applications, unlike existing schemes. It also provides a password reset and recovery system that is useful when users forget their passwords.

The principal contributions of this work can be summarized as follows:

  • We present a mutual authentication and key agreement scheme that facilitates the establishment of a secure session by the user with the sensor node through the gateway, significantly reducing their overhead on sensor nodes.

  • We can show by both formal and informal security analysis that the suggested protocol can withstand replay, impersonation, de-synchronization attacks, and user anonymity; forward secrecy is guaranteed in this scheme.

  • In comparison with state-of-the-art schemes, the protocol has overall advantages regarding security attributes and performance metrics. Due to its low communication and computational overhead, it is suitable for large-scale resource-constrained IoT environments.

  • A secure password-reset procedure is designed to handle user scenarios in case they forget their passwords. Moreover, the usability and robustness of the protocol have been enhanced for actual deployments.

The remainder of this paper is organized as follows: Section 2 reviews related work on IoT authentication protocols. Section 3 introduces the system model, threat assumptions, and cryptographic foundations. Section 4 elaborates on the detailed steps of the proposed protocol. Security analysis and performance evaluation are conducted in Section 5 and Section 6, respectively. Finally, Section 7 concludes the paper and outlines future research directions.

2. Related Work

From a methodological perspective, existing authentication protocols for WSN systems can be broadly categorized into two-factor authentication and three-factor AKA designs, depending on their assumed security scope and guaranteed properties. In this work, we focus on three-factor AKA protocols that operate under comparable system models and security objectives, including (i) explicit session key agreement for subsequent secure communications, (ii) design for a user–gateway–sensor architecture, where the gateway supports resource-constrained sensor nodes, and (iii) practical usability features such as secure credential update or recovery mechanisms. For instance, Yu et al. proposed a relevant prior two-factor authentication protocol with formal verification [5]. While such schemes constitute important early contributions, they do not target a comparable security scope to three-factor AKA protocols—e.g., they do not provide explicit session key agreement, PUF-based device binding, forgotten-password recovery, or resilience against desynchronization attacks. Therefore, as these two-factor schemes are not designed for the three-factor AKA setting (password, smart card, and biometrics), we exclude them from the set of baseline schemes in our security and performance evaluations to maintain fairness, consistency of underlying assumptions, and comparability of results. The baseline inclusion criteria are summarized in Appendix A.

In recent years, research on Authentication and Key Agreement (AKA) protocols for the Internet of Things (IoT) and Wireless Sensor Networks (WSN) has predominantly focused on lightweight three-factor designs, hardware-based root-of-trust mechanisms (e.g., Physical Unclonable Functions, PUFs), and formal security verification under strong adversarial models. Central to these efforts is the use of lightweight cryptographic techniques that facilitate the tightly coupled derivation of session keys from password, device, and biometric factors. Additionally, the incorporation of dynamic identities and the use of one-time random numbers have become key strategies for achieving a balance between high security and low computational overhead in resource-constrained devices. The security of these protocols is typically proven using formal methods, such as BAN logic, AVISPA, and ProVerif, which help mitigate security risks and ensure the robustness of the underlying protocol design [6,7,8,9].

The effort of Sahoo et al. in three-factor authentication with ECC [6] provides a bidirectional authentication scheme with dynamic identities, thus achieving low communication overhead and optimized sensor load. The proposed scheme of Sahoo et al. is useful for 5G WSNs and IoT systems that need to support high concurrency and low latency. Security proofs are according to the Random oracle model. Huang [7] suggested an ECC-based three-factor AKA scheme for general WSNs, which was shown to be secure against impersonation, and session-specific, stolen-verifier, and replay attacks as proven through BAN logic and ProVerif. Moreover, it was shown to be resistant to other attacks. Vinoth et al. [8] introduced a multifactor authentication scheme in the industrial IoT space, which allows using multiple devices to access the IoT environment. After a detailed analysis performed by Sun [10], it was found that it was vulnerable to impersonation, replay, and desynchronization attacks. Following this, the authors modified their existing protocol. Likewise, multi-gateway WSNs and hierarchical gateway architectures have also inspired the proposed techniques for improved cross-domain roaming, high availability, and efficient communication. These methods feature optimizations to balance the number of communication rounds and the load on edge nodes [11]. Moreover, various works tried to reduce the computational cost of ECC by using non-traditional number-theoretic foundations. One three-factor protocol based on Chebyshev chaotic mappings has been proposed, with security proofs in the RoR and BAN models emphasizing the freshness of the session [12].

To achieve noise robustness and privacy protection, biometrics are embedded into authentication protocols. The use of fuzzy extractors and auxiliary data is at the heart of this application, which transforms unstable biometric templates into stable key shares that contribute to session key generation. This mechanism effectively reduces the chance of linkability and template leakage, which are important security concerns in three-factor authentication schemes. When it comes to privacy-sensitive applications like healthcare, they include other mechanisms like honey lists and controlled disclosure to strike a balance between anonymity and accountability, enabling features like local password updates and resilient recovery from device loss. The use of hardware-based trust models is also on the rise. This is especially true when it comes to PUFs integrated into AKA protocols. PUFs offer a key material and a physically unclonable identity that is generated from the random microvariations that transpired during device manufacturing. This is very useful against device cloning, physical capture, and side-channel attacks. It also functions well in a hostile environment. In the IoMT and in medical WSNs, PUFs have been embedded into a three-factor AKA protocol, where CRPs bind session keys with its unique hardware feature. Thus, they are able to greatly reduce the risk of static keys being stored and device replication. These solutions also focus on tackling key optimization problems such as CRP management, environmental robustness, and error correction to make PUF-based solutions applicable in ultra-low-power devices [13,14,15,16].

Continued systematic cryptanalysis and iterative enhancement of existing protocols are critical directions for improving the security of AKA protocols. The analysis by Kumar et al. [17] on various three-factor schemes showed that substantial loss of smart card security is possible with offline password guessing attacks, insider attacks, and de-synchronization attacks. As per their findings, they proposed a modified version of the protocol, which had security proofs and performance evaluations in the random oracle model. The following studies have strengthened these protocols with a focus on user anonymity, unlinkability, device-side state, key rotation, and other important aspects. These improvements give complete security against adversaries who can make use of session key leaks and temporary secrets [10,18].

3. Preliminaries

3.1. System Model

The Internet of Things authentication system model has three main participants, which are the user, the gateway node, and the sensor node. By rationally partitioning functions, this model resolves conflicts between the resource constraints and security requirements for IoT [19].

The user is the ultimate requestor of data, initiating data access requests to sensor nodes with devices such as mobile terminals. Sensor nodes undertake the collection of environmental data and are usually constrained by resources; in particular, limited computation capability, memory capacity, and energy availability. The gateway node is the system’s safe central core of the system. Having processing power far superior to sensor nodes, the gateway node takes care of the registration of both users and sensor nodes. In addition, it helps the user and sensor node achieve mutual authentication and secure communication.

Under the model, the user needs to authenticate with the sensor node before starting their communication. The authentication process encompasses an offline registration phase, wherein the user and the sensor node provide their registration details to the gateway node separately. This gateway generates and securely delivers initial authentication credentials for the devices. When a user initiates an access request, they first submit their authentication information to the gateway. Once verified by the gateway, it helps mutually authenticate the user and the target sensor node. The successful authentication not only verifies the legitimacy of the communicating parties, but also enables the user and sensor node to negotiate a temporary session key. This session key keeps any following data transmissions private and unaltered. The authentication process of this model is shown in Figure 1.

Figure 1.

Figure 1

System model.

The primary advantage of this model lies in the rationality of its architectural design. The gateway node, acting as a trusted intermediary, does the heavy lifting of the authentication process, while the very resource-constrained sensor nodes are only tasked with simple computations. This division of labor satisfies the low power consumption requirements of IoT terminals while also enabling reliable identity authentication and key agreement, thus providing a practical and feasible security foundation for large-scale IoT applications [20].

3.2. Adversary Model

To precisely evaluate the security of the authentication protocol, it is essential to explicitly define the adversary’s capabilities, thereby establishing a formal adversary model. Although the Dolev-Yao model [21] serves as a standard for such analysis, stricter assumptions regarding the adversary’s power are necessary to address emerging threats like side-channel attacks [22]. Accordingly, we define an adversary with the following capabilities:

  • The adversary can perform offline exhaustive attacks on the user identity space and the weak password space.

  • The adversary can extract sensitive information stored in entities such as smart cards via means like side-channel analysis.

  • The adversary has full control over the public channel, meaning they can eavesdrop on, intercept, tamper with, replay, or block any message in transit.

  • When evaluating an n-factor authentication protocol, it is assumed that the adversary has compromised n-1 authentication factors. This assumption is used solely to assess the protocol’s robustness under partial credential leakage, and it does not imply that the smart cards, passwords, or biometrics are always considered unprotected during normal operation.

  • The adversary may have obtained a temporary session key from a past session through other means. For evaluating forward secrecy, it is assumed that the adversary has obtained the long-term private key(s) of one or more parties.

3.3. Fuzzy Extractor (FE)

Intra-class noise refers to the natural variations in the biometric signature of the same user. Fuzzy extractors are meant to remove this noise, such that a biometric input that is nearly the same can produce the exact same output. Its operational principle consists of two core phases:

  • The Generation function GEN(Bioi)=(bi,pari): This function takes the user’s initial biometric template Bioi as input. It generates a secret output bi and a public auxiliary data pari.

  • The Reproduction function REP(Bioi,pari)=bi,dis(Bioi,Bioi)t: This function takes a new biometric sample Bioi, and public auxiliary data pari as input during the subsequent verification. As long as Bioi is close enough to the original Bioi, the function can reproduce the same secret output bi which means that the biometric reading can tolerate minor variations.

3.4. Physical Unclonable Function (PUF)

A Physical Unclonable Function, often referred to as a PUF, is a security mechanism that employs distinct and unavoidable microscopic physical variations that occur during semiconductor fabrication, giving every physical entity a unique digital fingerprint. Usually integrated in integrated circuits, PUF is a physically observable unconventional response generated by the intrinsic physical characteristics when stimulated by an input challenge signal, denoted as Re=PUF(Ch). The response to this challenge is determined by the internal physical structure of the chip. It gives the chip a very high degree of uniqueness and randomness. This results in chips made in the same batch having a unique PUF response. The fact that these devices do not rely on any specific secure storage makes them ideal for lightweight action, as performed in the case of IoT sensor nodes for the purposes of device authentication and key derivation.

4. Proposed Scheme

The proposed protocol primarily comprises the following phases: initialization, user registration, sensor node registration, and authentication login. In addition, auxiliary phases for forgotten password reset and password/biometric update are designed. For ease of reading, the main symbols used in the proposed protocol are summarized in Appendix B.

4.1. Initialization Phase

The gateway GWN establishes two tables in its secure memory: TableSensornodeInfo for storing sensor node parameters and TableUserInfo for user credentials. GWN then selects a system master key τ, specifies a symmetric encryption scheme Ek(·)/D(·), and designates cryptographic hash functions h(·) and H(·), where H(·) is reserved for fuzzy verification on the user side.

4.2. User Registration Phase

Figure 2 illustrates the user registration process, with the specific steps as follows:

  • 1.

    The user Ui selects the identity IDi and the password PWi, and collects biometric information Bioi. Ui selects a random number ui, and computes (bi,pari)=GEN(Bioi), PWBi=h(PWi||bi), UIDi=h(IDi||ui), and Ci=uibi, then transmits the registration information {UIDi,PWBi} to the gateway node GWN via a secure channel. The secure channel during the registration phase can be realized through practical means, such as an out-of-band channel, pre-shared credentials during device provisioning, or physical access at deployment time.

  • 2.

    Upon receiving the user registration information, GWN verifies whether UIDi exists in TableUserInfo. If a match is found, GWN rejects the registration request. Otherwise, GWN selects two random numbers a and b, assigns NCi=a and PIDi=PIDinew=b, sets PIDiold=NULL, and computes Ki=h(UIDi||τ), Ai=KiPWBi, and Bi=H(UIDi||PWBi)modp. GWN then inserts the tuple {PIDinew,PIDiold,UIDi,NCi} into TableUserInfo. Finally, GWN writes {PIDi,Ai,NCi,Bi,h(·),H(·)} to a smart card SC and sends it to Ui through a secure channel.

  • 3.

    Upon receiving the registration response, Ui randomly selects a polynomial f(x)=a0+a1x1+a2x22++aN1xN1N1modp of degree N1 and computes PWCi=h(a0)PWBi. Subsequently, Ui chooses N security questions {Quen,1nN} with corresponding answers {Ansn,1nN}, selects N distinct points {(xn,yn),1nN} on the polynomial f(x), and computes secret shares zn=ynh(IDi||bi||h(Ansn)) for each point. Finally, Ui initializes a state flag as flag=0 and stores {pari,Ci,flag,GEN(·),REP(·),{(xn,zn),1nN},PWCi} in SC.

Figure 2.

Figure 2

User registration phase.

Notably, the number of security questions N should be selected by balancing security strength and usability in practical IoT deployments. A small value of N reduces user burden but may weaken resistance against guessing or social engineering attacks, while an excessively large N increases cognitive load and degrades user experience, especially for long-lived or frequently accessed IoT systems. In typical scenarios, we recommend choosing N in the range of 4 to 6, which provides sufficient entropy for secure password recovery while maintaining acceptable usability.

4.3. Sensor Node Registration Phase

The sensor node Sj selects the identity SIDj and a challenge Chj, generates a random number uj, and computes TSDj=h(SIDj||uj). Using the PUF function, it generates the response Rej=PUF(Chj). Subsequently, Sj transmits TSDj and Chj to the gateway GW. GW checks whether TSDj duplicates any record in the database. If no duplicates are found, it computes Kj=h(TSDj||τ), stores TSDj and Chj, and transmits Kj back to Sj. Upon receiving Kj, Sj calculates TKj=KjRej and stores TKj and uj. The process of sensor node registration is shown in Figure 3.

Figure 3.

Figure 3

Sensor node registration phase.

4.4. Authentication Phase

During the authentication phase, messages are exchanged among the user, the gateway node, and the sensor node. To prevent replay attacks, upon receiving a message, the receiving entity is required to follow the Common Message Acceptance Rule (CMAR). For any received authentication message carrying a timestamp Tk, the receiver performs described as follows:

  • 1.

    Freshness: check |TnowTk|T; otherwise reject.

  • 2.

    Anti-replay (strict ordering): maintain a lightweight last-accepted timestamp record Tlast for the sender and reject if TkTlast.

  • 3.

    Authentication: verify the message-specific authenticator.

  • 4.

    Upon successful verification, update Tlast=Tk; otherwise reject. The record Tlast is updated only after successful authentication and is initialized to 0.

The process during the authentication phase is shown in Figure 4, and the specific steps are as follows:

  • 1.

    Ui inserts SC into a terminal and enters IDi, PWi, and provides biometric input Bioi. SC computes values bi*=REP(Bioi*,pari), PWBi=h(PWi*||bi*), Ki=AiPWBi, ui=Cibi*, UIDi=h(IDi*||ui), and Bi*=H(UIDi||PWBi)modp, then verifies whether Bi* equals the stored value Bi. If the verification fails, SC terminates the session. Otherwise, it checks the state flag. If flag=0, SC computes NCi=h(NCi) and updates flag=1. Subsequently, SC selects the identity SIDj of the target sensor node to be accessed, generates a random number ri, acquires the current timestamp T1, and computes values M1=(ri||SIDj)h(PIDi||Ki||NCi), Ri=h(Ki||PIDi||ri), and MUG=h(ri||Ki||PIDi||Ri||T1). Finally, SC sends the message Msg1={PIDi,M1,MUG,T1} to GWN.

  • 2.
    Upon receiving the user login request, GWN processes it according to the common message acceptance rule (CMAR) described above. Then, GWN searches the TableUserInfo for a (PIDinew,PIDiold) pair and operates according to the following rules:
    • If a pair exists where PIDi=PIDinew, GWN retrieves the corresponding UIDi and NCi, computes values NCi=h(NCi), Ki=h(UIDi||τ), (ri||SIDj)=h(PIDinew||Ki||NCi)M1, Ri*=h(Ki||PIDinew||ri), and MUG=h(ri||Ki||PIDinew||Ri*||T1), and verifies whether MUG equals MUG. If the check fails, GWN terminates the session and rejects the login request. Otherwise, GWN performs the reassignments PIDiold=PIDinew, PIDinew=h(PIDinew||NCi||IDi), and NCi=NCi.
    • If a pair exists where PIDi=PIDiold, GWN retrieves the corresponding UIDi and NCi, computes values Ki=h(UIDi||τ), (ri||SIDj)=h(PIDiold||Ki||NCi)M1, Ri*=h(Ki||PIDiold||ri), and MUG=h(ri||Ki||PIDiold||Ri*||T1), and verifies whether MUG equals MUG. If the check fails, GWN terminates the session and rejects the login request.
    • If no pair exists where either PIDi=PIDinew or PIDi=PIDiold, GWN terminates the session and rejects the login request.

    After completing the aforementioned operations, GWN acquires a new timestamp T2 and queries TableSensorNodeInfo using SIDj to retrieve the corresponding Kj and Chj. GWN then computes MGS=h(IDi||SIDj||Ri*||Kj||T2) and M2=(Ri*||IDi)h(Kj||SIDj), and subsequently transmits the message Msg2={M2,MGS,Chj,T2} to the sensor node Sj.

  • 3.

    Upon receiving the message from GWN, Sj first processes it according to the common message acceptance rule (CMAR) described above. Subsequently, Sj computes values Kj=TKjPUF(Chj), (Ri*||IDi)=M2h(Kj||SIDj), and MGS=h(IDi||SIDj||Ri*||Kj||T2), and subsequently verifies whether MGS equals MGS. If the verification fails, the session is terminated. If successful, Sj generates a new random number rj, acquires a fresh timestamp T3, and computes values Rj=h(SIDj||rj), SKji=h(Ri*||Rj), MSG=h(SIDj||IDi||Rj||T3), and M3=(Rj||IDi)h(Kj||SIDj). Finally, Sj transmits the response message Msg3={M3,MSG,SIDj,T3} back to GWN.

  • 4.

    Upon receipt of the message from Sj, GWN processes it according to the common message acceptance rule (CMAR) described above. GWN then computes (Rj*||IDi)=M3h(Kj||SIDj) and MSG=h(SIDj||IDi||Rj*||T3), and checks whether the locally computed MSG equals the received MSG. If not, GWN terminates the session. Otherwise, GWN acquires a new timestamp T4 and computes M4=(Rj*||SIDj)h(ri||PIDiold||Ki||NCi) and MGU=h(IDi||Rj*||ri||T4). Finally, GWN transmits the response message Msg4={M4,MGU,T4} back to Ui.

  • 5.

    Following the receipt of the authentication response, Ui processes it according to the common message acceptance rule (CMAR) described above. Subsequently, Ui computes (Rj*||SIDj)=M4h(ri||PIDi||Ki||NCi) and MGU=h(IDi||Rj*||ri||T4). If the equivalence MGU=MGU is confirmed, the mutual authentication is deemed successful and a session key SKij=h(Ri||Rj*) is established. To conclude the process, Ui assigns PIDi=h(PIDi||NCi||IDi) and resets flag=0.

Figure 4.

Figure 4

Authentication phase (all receivers additionally apply the common message acceptance rule for freshness and replay prevention).

4.5. Forgotten Password Reset Phase

If user Ui forgets his password PWi, Ui initiates the reset process by entering the identity IDi, providing the biometric Bioi, and inserting the smart card SC. Ui then sequentially submits the answers {Ansn,1nN} to the N security questions. Following this, Ui computes bi=REP(Bioi,pari) and yn=znh(IDi||bi||h(Ansn)). Upon correct response to all N security questions, Ui successfully reconstructs the polynomial f(x)=a0+a1x1+a2x22+···+an1xn1n1modp, computes f(0)=a0, and executes operations PWBi=h(a0)PWCi and ui=Cibi. Subsequently, Ui enters a new password PWinew, computes PWBinew=h(PWinew||bi), Ainew=AiPWBiPWBinew, Binew=H(h(IDi||ui)||PWBinew)modp, and PWCinew=h(a0)PWBinew, and finally updates SC by overwriting the existing Ai, Bi, and PWCi with new values Ainew, Binew, and PWCinew.

4.6. Password/Biometrics Update Phase

Ui inserts SC into the terminal and enters IDi and PWi, and provides biometric Bioi. SC executes a verification algorithm to authenticate Ui’s identity, consistent with the process described in the login and authentication phase. If the verification is successful, Ui then inputs a new password PWinew, provides a new biometric Bioinew, and computes values (binew,parinew)=GEN(Bioinew), PWBinew=h(PWinew||binew), Cinew=Cibibinew, Ainew=AiPWBiPWBinew, and Binew=H(UIDi||PWBinew)modp. Subsequently, Ui randomly selects a new private polynomial, f(x)=a0+a1x1+a2x22++aN1xN1N1modp of degree N1, chooses N new security questions {Quennew,1nN} with corresponding answers {Ansnnew,1nN}, selects N distinct points {(xnnew,ynnew),1nN} on the polynomial f(x), and computes secret shares znnew=ynnewh(IDi||binew||h(Ansnnew)) for each point. Furthermore, Ui updates the SC by overwriting the existing stored data with these newly computed values.

5. Security Analysis

5.1. Correctness Verification

To formally verify the correctness of the authentication protocol, we employ BAN logic [23], which was introduced by Burrows, Abadi, and Needham in 1989. BAN logic is widely adopted in the analysis of authentication and key agreement protocols for IoT and wireless sensor networks due to its clear abstraction of authentication beliefs, message freshness, and key establishment goals. Its interpretability makes it particularly suitable for reasoning about mutual authentication and session key agreement in resource-constrained IoT environments. This logic characterizes authentication goals using modal operators, and its associated formal notation and rules provide the foundational methodology for protocol verification, as specified in Table 1. These definitions are generic and not specific to the proposed scheme.

Table 1.

Standard BAN logic notations and inference rules.

Symbol Description
PX P believes X
PX P sees X
PX P once said X
#(X) X is fresh
PX P has jurisdiction over X
(X,Y) The combination of X and Y
(X)K Encrypt X in some form using K as the key
PSKQ P and Q share the key K
Formula Symbol Rule
P(PKQ),P(X)KPQX Message meaning rule (MMR)
P#(X)P#(X,Y) Freshness conjunction rule (FCR)
P#(X),PQXPQX Nonce verification rule (NVR)
PQX,PQXPX Jurisdiction rule (JR)
PQ(X,Y)PQXPX,PYP(X,Y) Belief conjunction rule (BCR)

The verification process commences with the idealization of the protocol messages and the postulation of initial assumptions. Following this, the authentication goals are formalized. The process concludes with the application of logical inference rules to satisfy all defined goals. The corresponding details for the idealization, assumptions/goals, and derivations are provided in Table 2, Table 3, and Table 4, respectively.

Table 2.

Idealized forms.

Message Idealized Forms
M1 UiGWN:(ri,SIDj)Ui(Ki,NCi)GWN
M2 GWNSj:(Ri,IDi)GWNKjSj
M3 SjGWN:(Rj,IDi)SjKjGWN
M4 GWNUi:(Rj)GWN(PIDi,Ki,NCi)Ui

Table 3.

Assumptions and goals.

No. Assumptions
A1 Ui#(ri,rj)
A2 Sj#(ri,rj)
A3 GWN#(ri,rj)
A4 UiUi(PIDi,IDi,Ki,NCi)GWN
A5 GWNUi(PIDi,IDi,Ki,NCi)GWN
A6 GWNGWNKjSj
A7 GWNSjKjSj
A8 UiSj(UiSKSj)
A9 SjUi(UiSKSj)
No. Goals
G1 Ui(UiSKSj)
G2 UiSj(UiSKSj)
G3 Sj(UiSKSj)
G4 SjUi|(UiSKSj)

Table 4.

Analysis based on BAN logic.

No. Statement Premise and Rule
s1 GWN(ri,SIDj)Ui(Ki,NCi)GWN M1
s2 GWNUi(ri,SIDj)Ui(Ki,NCi)GWN s1,A5,MMR
s3 GWNUi(ri,SIDj)Ui(Ki,NCi)GWN s2,A3,NVR
s4 Sj(ri,IDi)GWNKjSj M2
s5 SjGWN(Ri,IDi)UiKjGWN s4,A7,MMR
s6 Sj#(Ri) A2,FCR,Ri=h(Ki||PIDi||ri)
s7 SjGWN(Ri,IDi)UiKjGWN s5,s6,NVR
s8 SjUi|(UiSKSj)G4 s3,s7,SKij=h(Ri||Rj)
s9 Sj(UiSKSj)G3 s8,A9,JR
s10 GWN(Rj,IDi)SjKjGWN M3
s11 GWNSj(Rj,IDi)SjKjGWN s10,A6,MMR
s12 GWNSj(Rj,IDi)SjKjGWN s11,A3,NVR,Rj=h(SIDj||rj)
s13 Ui(Rj)GWN(PIDi,Ki,NCi)Ui M4
s14 UiGWN(Rj)GWN(PIDi,Ki,NCi)Ui s13,A4,MMR
s15 UiGWN(Rj)GWN(PIDi,Ki,NCi)Ui s14,A1,NVR,Rj=h(SIDj||rj)
s16 UiSj|(UiSKSj)G2 s12,s15,SKij=h(Ri||Rj)
s17 Ui(UiSKSj)G1 s16,A8,JR

5.2. Informal Security Analysis

We demonstrate that the proposed protocol has critical security features and demonstrates resilience against a range of well-known attacks.

5.2.1. Anonymity and Untraceability

During the login and authentication phase, an adversary may intercept messages transmitted over public channels among the user, the gateway node, and sensor nodes. However, in the proposed protocol, none of the messages generated throughout this phase contain the user’s identity identifier Uid. Consequently, the attacker cannot obtain any identity-related information, thus ensuring the anonymity of the user. Furthermore, the pseudo-identity is updated after each session, and random numbers ri and rj are regenerated randomly per session. Thus, for the same user, the information transmitted over the public channel differs between sessions, making it infeasible for an adversary to determine whether two distinct sessions originate from the same user. As a result, the proposed protocol also achieves untraceability of the user.

5.2.2. Mutual Authentication

The formal verification results using BAN logic indicate that the user and the sensor node are convinced of the authenticity of each other and the session key. This result provably verifies that the proposed protocol successfully achieves mutual authentication.

5.2.3. Session Key Agreement

According to the protocol description, the user and the sensor node collaboratively establish a session key SKij=h(Ri||Rj) during the authentication phase, which will be used for their subsequent secure communication.

5.2.4. Perfect Forward Secrecy

Assume that an attacker accidentally captures Ui’s long-term private key Ki, the nonce NCi, Sj’s long-term private key Kj, and GWN’s long-term private key τ, in addition to intercepting previously transmitted information over the public channel. In the proposed protocol, the session key is calculated as SKij=h(Ri||Rj),Ri=h(Ki||PIDi||ri),(ri||SIDj)=h1(PIDi||Ki||NCi)M1, where the session key is determined by the nonce NCi of the current session. However, NCi is updated via a hash function after each session. As a result, even if the attacker obtains the current NCi, the one-way nature of the hash function prevents them from deriving the nonce NCi from previous sessions, thus making it impossible to compute past session keys. Therefore, the proposed protocol ensures forward security effectively.

5.2.5. N-Factor Security

In this subsection, we analyze a worst-case scenario in which the adversary compromises N1 authentication factors, including the smart card via side-channel attacks, to evaluate the robustness of the proposed three-factor design. Among the three security factors considered in the protocol, the password is cryptographically weaker than the smart card and the biometric. Consider a scenario in which an adversary obtains the smart card (extracting its data through a side-channel attack) and also steals the user’s biometric. The adversary could then attempt to guess the identity IDi* and password PWi*, and calculate bi=REP(Bioi,pari), PWBi*=h(PWi*||bi), Ki*=AiPWBi*, ui=Cibi, UIDi*=h(IDi*||ui) and Bi*=?H(UIDi*||PWBi*)modp. Due to the fuzzy verification mechanism, there are approximately 10,000 candidate pairs (IDi*,PWi*) that can satisfy the verification condition. Distinguishing the correct credentials from this set would require the adversary to perform about 10,000 online login attempts, which is computationally prohibitive. Moreover, such a high volume of attempts can be easily detected and blocked by GWN.

5.2.6. Forgotten Password Reset

The proposed protocol incorporates a secure forgotten password recovery function. A user who has forgotten their password can regain access only by correctly providing their identities, biometrics, and correct answers to all security questions. Successful verification of these factors allows the reconstruction of the polynomial f(x) and grants the authorization to reset the password.

5.2.7. Resistance Against Man-in-the-Middle (MITM) Attack

The analysis of the Man-in-the-Middle (MITM) attack relies on the results derived from BAN logic (as discussed in Section 4), which formalizes the mutual authentication process in the proposed protocol. This analysis demonstrates that the protocol can effectively prevent MITM attacks by ensuring that both the user and sensor node authenticate each other through a secure session establishment process.

5.2.8. Resistance Against Replay Attack

Each authentication message (Msg1Msg4) carries a timestamp and includes a hash-based authenticator (MUG, MGS, MSG and MGU), so any modification will be detected. In addition to the freshness check |TnowTk|T, the protocol adopts the common message acceptance rule (CMAR): each receiver maintains a lightweight last-accepted timestamp record for its peer and rejects any message with a non-increasing timestamp (i.e., TkTlast). The last-accepted record is updated only after successful authentication. Therefore, any replay of Msg1Msg4 will be detected and rejected, even if replayed within T. Consequently, replay attacks are effectively prevented.

5.2.9. Resist Known Session-Specific Temporary Information Attack

Ui and Sj successfully negotiate and establish a session key SKij=h(Ri||Rj)=h(h(Ki||PIDi||ri)||h(SIDj||rj)). Even if an adversary obtains the temporary random numbers ri and rj from the current session, the correct session key SKij cannot be calculated without knowing the long-term secret Ki of Ui. Therefore, the proposed protocol is resistant to known session-specific temporary information attacks.

5.2.10. Resistance Against De-Synchronization Attack

To effectively resist de-synchronization attacks, it is crucial to maintain synchronization between Ui and GWN, particularly for the pseudo-identity PIDi and NCi. The proposed protocol incorporates a flag on the Ui side and stores the last two pseudo-identifiers (PIDinew and PIDiold) for each user on the GWN side to preserve synchronization. The mechanism for maintaining synchronization is explained in two attack scenarios. First, if A blocks the authentication message Msg1, Ui will update NCi and set flag=1, while GWN, not having received Msg1, will not update its NCi, leading to a temporary state of de-synchronization. However, since flag=1, Ui will not increment NCi again in the subsequent login request. Upon receiving this request, GWN can resynchronize by computing NCi=h(NCi), thus restoring the consistency of the state. Second, if A intercepts the message Msg4, GWN completes the update of PIDinew (with PIDiold recording the previous value), but Ui, not having received Msg4, cannot update PIDi. When Ui initiates a new session, GWN will detect that the submitted PIDi matches the stored PIDiold. This identifies a de-synchronization attempt, triggering a resynchronization of PIDi and NCi according to Step 2 of the authentication phase, which recovers protocol state consistency. In summary, through the flag mechanism and the dual pseudo-identity storage strategy, the protocol can maintain or recover synchronization between the user and the gateway even after message interception, effectively resisting de-synchronization attacks.

To ensure a fair and meaningful evaluation, we compare our protocol with four representative and recent three-factor AKA schemes that share similar system models and security objectives, while schemes operating under different authentication factors or security scopes are excluded from the comparative analysis. Table 5 compares the security properties achieved by our proposed protocol with those of four recently counterparts.

Table 5.

Comparison of security features.

Wu et al. [13] Sahoo et al. [6] Huang et al. [7] Kumar et al. [17] Ours
Anonymity
Untraceability × ×
Mutual authentication
Session key agreement
Perfect forward secrecy × ×
N-factor security × ×
Forgotten password reset × × × ×
Resistance against MITM attack
Resistance against replay attack
Resist known session-specific temporary information attack ×
Resistance against de-synchronization attack

6. Performance Analysis

Given that the registration phase for both the user and the sensor node is a one-time operation, and password/biometric updates are infrequent, the performance comparison focuses on the authentication phases.

6.1. Computational Performance Analysis

The computational performance comparison is based on counting the cryptographic operations executed by each entity during one complete authentication session. The following notations are used: Th, Tf, Tpuf, Ted and TM, representing the time cost of a single hash operation, fuzzy extractor operation, PUF operation, symmetric encryption/decryption, and elliptic curve point multiplication, respectively. The time consumption for string concatenation and XOR operations is considered insignificant and is ignored. We evaluated the computational overhead following the experimental environment described by Wu et al. [13], which utilized a platform with the following specifications: an Intel(R) Core(TM) i7-13700K CPU (5.40 GHz), 32.0 GB RAM, with Windows 10 OS. The execution times for various operations are summarized in Table 6, indicating that the fuzzy extractor function requires a running time similar to that of an ECC point multiplication operation [24].

Table 6.

Computation times for operations (ms).

Symbol Computation Time (ms)
Th 0.0083
Tf 6.0926
TM 6.0926
Ted 5.6396
Tpuf 1.9741

During the authentication phase of the scheme proposed by Wu et al. [13], the user performs six hash operations and one fuzzy extraction operation when initiating a login request. After receiving the response from the gateway node GWN, the user further performs three hash operations. Therefore, the total computational cost at the user side consists of nine hash operations and one fuzzy extraction operation. Upon receiving the user’s login request, the GWN executes eight hash operations, two PUF operations, and one fuzzy extraction operation. After obtaining the response message from the sensor node Sj, the GWN additionally performs four hash operations. As a result, the total computational overhead at the GWN amounts to twelve hash operations, two PUF operations, and one fuzzy extraction operation. Meanwhile, after receiving message M2, the sensor node performs a total of six hash operations, one PUF operation, and one fuzzy extraction operation.

In the authentication phase of the scheme introduced by Sahoo et al. [6], the user incurs four hash operations, one fuzzy extraction operation, one elliptic curve point multiplication, and one symmetric encryption when generating the login request. Upon receiving the reply from the gateway node GWN, the user carries out two additional hash operations and one symmetric decryption. Hence, the overall computational burden at the user side includes six hash operations, one fuzzy extraction operation, one elliptic curve point multiplication, and two symmetric cryptographic operations. At the gateway node, four hash operations, one symmetric encryption, one symmetric decryption, and one elliptic curve point multiplication are executed upon processing the user’s login request. Subsequently, after the response from the sensor node Sj is received, the GWN performs two further hash operations along with one elliptic curve point multiplication. Accordingly, the cumulative computational cost at the GWN amounts to six hash operations, two symmetric cryptographic operations, and two elliptic curve point multiplications. For the sensor node, once the message from the gateway node is obtained, the authentication procedure requires seven hash operations, two elliptic curve point multiplications, one symmetric encryption, and one symmetric decryption in total.

With respect to the authentication phase in the scheme presented by Huang et al. [7], the user executes seven hash operations, one fuzzy extraction operation, and three elliptic curve point multiplications while constructing the login request. After the feedback from the gateway node GWN is received, the user additionally conducts ten hash operations and one elliptic curve point multiplication. Consequently, the user-side computation involves a total of seventeen hash operations, one fuzzy extraction operation, and four elliptic curve point multiplications. On the gateway side, processing the user’s login request requires ten hash operations together with one elliptic curve point multiplication. Once the response from the sensor node Sj is obtained, the GWN proceeds to carry out seven further hash operations and an additional elliptic curve point multiplication. Therefore, the overall computational effort at the GWN amounts to seventeen hash operations and two elliptic curve point multiplications. From the perspective of the sensor node, upon reception of the message from the gateway node, the authentication procedure entails eight hash operations and three elliptic curve point multiplications in total.

For the authentication procedure in the scheme developed by Kumar et al. [17], the user carries out five hash operations, one fuzzy extraction operation, and two symmetric encryption operations when submitting the login request. After receiving the return message from the gateway node GWN, the user performs two additional hash operations and two symmetric decryption operations. Accordingly, the total computational requirement at the user side consists of seven hash operations, one fuzzy extraction operation, and four symmetric cryptographic operations. At the gateway node, two symmetric encryption operations and one symmetric decryption operation are executed during the processing of the user’s login request. Following the reception of the response from the sensor node Sj, the GWN conducts two hash operations together with one symmetric encryption and one symmetric decryption. Hence, the aggregate computational cost incurred by the GWN includes five hash operations and five symmetric cryptographic operations. As for the sensor node, once the message forwarded by the gateway node is received, a total of four hash operations, one symmetric encryption, and one symmetric decryption are required to complete the authentication process.

In the authentication phase of our proposed scheme, the user computes seven hash operations and one fuzzy extraction operation while initiating the login request. Upon receiving the response from the gateway node GWN, the user further computes four hash operations. As such, the overall computational load at the user side is limited to eleven hash operations and one fuzzy extraction operation. For the gateway node, eight hash operations are required to process the user’s login request, followed by four additional hash operations after the response from the sensor node Sj is obtained. Consequently, the total computational cost incurred by the GWN amounts to twelve hash operations. Regarding the sensor node, after receiving the message from the gateway node, the authentication procedure involves six hash operations and one PUF operation in total.

This comparative analysis of computational overhead, presented in Table 7, shows that our proposed protocol outperforms four recent counterparts [6,7,13,17].

Table 7.

Computational overhead comparison (ms).

Protocol User Sensor Node Gateway
Wu et al. [13] 9Th+Tf6.17 6Th+Tf+Tpuf8.12 12Th+2Tf+Tpuf14.26
Sahoo et al. [6] 6Th+Tf+2Ted+TM23.51 7Th+2Ted+2TM23.52 6Th+2Ted+2TM23.51
Huang et al. [7] 17Th+Tf+4TM30.60 8Th+3TM18.34 17Th+2TM12.33
Kumar et al. [17] 7Th+4Ted+Tf28.71 4Th+2Ted11.31 5Th+5Ted28.24
Ours 11Th+Tf6.18 6Th+Tpuf2.02 12Th0.10

6.2. Communication Performance Analysis

In this subsection, we compare the communication performance of the proposed protocol with the four protocols mentioned above. The communication performance comparison considers only the authentication messages exchanged over the public channel. The bit lengths of all parameters and message components are explicitly defined, and the total communication overhead is obtained by summing the sizes of all transmitted messages. The bit widths for the parameters in the protocol are defined as follows: random number (256 bits), hash value (256 bits), PUF challenge (128 bits), identity (128 bits), elliptic curve point (256 bits), and timestamp (32 bits). Concurrently, the output of the symmetric encryption is defined as an integer multiple of 128 bits (i.e., its block size).

In the authentication phase of the scheme proposed by Wu et al. [13], a total of four messages, namely M1={HIDi,R1,V1,T1}, M2={SIDj,R2,TPWi,Chj,V2,T2}, M3={R3,V3,T3}, and M4={R4,V4,T4}, are transmitted among the participating entities. In these messages, HIDi, V1, V2, V3 and V4 denote hash values, while T1, T2, T3 and T4 represent timestamps. In addition, SIDj corresponds to the identity of the sensor node, and Chj denotes the PUF challenge. The values R1, R2, TPWi, R3 and R4 are obtained through XOR operations, whose lengths are determined by the longer operands involved, resulting in bit-lengths of 256 bits, 512 bits, 256 bits, 256 bits and 512 bits, respectively. Consequently, the total size of the transmitted information in this scheme amounts to 2655+324+128+128+256+512+256+256+512=3456 bits.

In the authentication phase of the scheme proposed by Sahoo et al. [6], four messages, denoted as {M2,M4,UIDi,T1}, {G1,G2,G5,T2}, {S2,S4,S5,S6,T3}, and {S5,S6,T4}, are exchanged during the authentication procedure. In these messages, M2, UIDi, G2, S4 and S6 represent hash values, whereas T1, T2, T3 and T4 correspond to timestamps. Moreover, S2 denotes a point on the elliptic curve. The value G1 is generated through a XOR operation, whose length is determined by the longer operand and is equal to 256 bits. In addition, M4, G5 and S5 are the outputs of symmetric encryption. According to the lengths of their corresponding plaintexts, the sizes of M4, G5 and S5 are 512 bits, 1024 bits and 128 bits, respectively. Consequently, the total amount of transmitted data in this scheme is 2656+324+256+256+512+1024+1282=3968 bits.

In the authentication phase of the scheme proposed by Huang et al. [7], four messages, namely {Ru,D2,D3,TIDi,T1}, {Ru,Rg,D4,D5,D6,D7,T2}, {Rs,D9,D10,T3}, and {Rs,ei,D10,D11,D12,D13,D14,T4}, are transmitted during the authentication process. In these messages, Ru, Rg and Rs denote points on the elliptic curve, while D3, TIDi, D7, D9, D10 and D14 represent hash values. In addition, T1, T2, T3 and T4 are timestamps. The values D2, D4, D5, D6, ei, D11, D12 and D13 are generated through XOR operations, whose bit-lengths are determined by the longer operands involved and are equal to 512 bits, 256 bits, 256 bits, 256 bits, 256 bits, 256 bits, 256 bits and 256 bits, respectively. Consequently, the total amount of transmitted information in this scheme is 2565+2567+324+512+256+256+256+256+256+256+256=5504 bits.

In the authentication phase of the scheme proposed by Kumar et al. [17], four messages, denoted as {B4,B5,B6,TS1}, {B7,B9,TS2}, {B10,B11,TS3} and {B11,B12,TS4}, are exchanged during the authentication process. In these messages, TS1, TS2, TS3 and TS4 represent timestamps, while B7 and B10 denote hash values. In addition, B4, B5, B9, B11 and B12 are the outputs of symmetric encryption, whose lengths are integer multiples of 128 bits. Based on the lengths of the corresponding plaintexts, the sizes of B4, B5, B9, B11 and B12 are 640 bits, 1152 bits, 1408 bits, 896 bits and 896 bits, respectively. The value B6 is generated through a XOR operation, and its bit-length is determined by the longer operand involved, resulting in a length of 1152 bits. Consequently, the total amount of transmitted information in this scheme is 324+2562+640+1152+1408+8962+896+1152=7680 bits.

During the authentication phase, the proposed protocol exchanges a total of four messages (Msg1 to Msg4). The composition of Msg1 is as follows:

  • PIDi: User’s pseudo-identity, 128 bits.

  • M1: Generated by XORing the concatenation of the random number ri and the sensor node’s identity SIDj with a hash value (using cyclic padding). Its length equals the sum of the bit lengths of ri and SIDj, i.e., 256 bits + 128 bits.

  • MUG: Hash output, 256 bits.

  • T1: Timestamp, 32 bits.

The length of Msg1 is 800 bits. The lengths of Msg2, Msg3, and Msg4 are subsequently derived as 800, 800, and 672 bits, respectively. Consequently, the aggregate communication cost for the authentication phase is 3072 bits. A comparison with four recent relevant protocols, presented in Table 8, further confirms that our protocol holds an advantage in communication overhead.

Table 8.

Communication overhead comparison.

Protocol Rounds Communication Overhead
Wu et al. [13] 4 3456 bits
Sahoo et al. [6] 4 3968 bits
Huang et al. [7] 4 5504 bits
Kumar et al. [17] 4 7680 bits
Ours 4 3072 bits

7. Discussion

The proposed protocol for three-factor authentication and key agreement seeks to resolve security and efficiency issues in the Internet of Things (IoT) environment. The protocol enables secure communication in extremely constrained settings, which are often seen in the IoT, by using lightweight cryptographic operations. The protocol enjoys a high level of security, as the integration of Physical Unclonable Functions (PUFs) for device authentication and fuzzy extractors for biometric authentication have low cost. This is essential for applications that require both safety and real-time performance in industrial IoT and healthcare systems.

This protocol also features a secure and easy-to-use password reset procedure, which is a useful solution to the problem of lost passwords in IoT systems. The reset was structured to combine biometric verification with security questions and will ensure that accounts can be reset without exposing anyone to the system. The importance of this feature significantly increases in case the user has to interact with such a device for a long time in large-scale IoT deployments.

A follow-up stage of research could include assessments of how well the protocol can operate in environments with more capable computing resources. Furthermore, integrating additional trust models, such as decentralized identities or blockchain-based authentication, could further enhance the protocol’s security and scalability in more complex IoT ecosystems.

8. Conclusions

This work proposes a new three-factor authentication and key agreement protocol for the IoT that solves security and performance problems in the resource-constrained environment. The protocol employs password, biometric and device-based authentication for enhanced security features. Furthermore, user anonymity, forward secrecy, and other attacks are resistant to it. Additionally, enabling a secure forgotten password reset feature enhances the overall user experience while maintaining a high level of security. The proposed scheme is more efficient than the existing schemes and has been shown by performance evaluations to be practical for large-scale IoT deployment.

The analysis and the comparison of performance of the protocol show that it is useful to provide reliable and scalable security services for IoT systems. Nonetheless, additional optimization of other trust models for high-capacity IoT devices can also be referenced from future works. In summary, this work provides a secure, efficient, and scalable solution that will aid in advancing the state of security in the IoT.

Appendix A. Baseline Inclusion Criteria for Comparative Evaluation

To avoid unfair comparisons across fundamentally different security objectives and system assumptions, a protocol is included as a baseline in Table 5, Table 7 and Table 8 only if it satisfies all of the following criteria:

  • It is explicitly formulated as an AKA protocol with a defined session key establishment objective for subsequent secure communications.

  • It adopts a three-factor authentication setting (password, biometric and smart card), or an explicitly equivalent three-factor model.

  • It is designed for the User–Gateway–Sensor architecture (or an explicitly comparable three-party WSN setting), where the gateway assists resource-constrained sensor nodes.

  • It considers practical usability mechanisms relevant to long-lived deployments, such as secure credential update or recovery.

These criteria are introduced to ensure that the comparative evaluation focuses on protocols that share comparable goals and assumptions with our three-factor AKA design.

Appendix B. Protocol Notations

Table A1.

Notations used in the proposed protocol.

Symbol Description Symbol Description
Ui User i Sj Sensor node j
GWN Gateway node IDi Identity of user Ui
SIDj Identity of sensor node Sj PIDi Pseudo-identity of user Ui
PWi Password of user Ui Bioi Biometric information of user Ui
bi Biometric key derived from the fuzzy extractor pari Public helper data for the fuzzy extractor
Ki Long-term secret key of user Ui Kj Long-term secret key of sensor node Sj
NCi Nonce counter associated with user Ui ri,rj Session random numbers generated by Ui and Sj
SKij Session key shared between Ui and Sj Chj Challenge input to the PUF
Rej Response generated by the PUF h(·),H(·) Cryptographic hash functions
GEN/REP Fuzzy extractor generation and reproduction functions N Number of security questions for password recovery

Author Contributions

Conceptualization, Y.Y. and K.W.; methodology, Y.Y.; software, Y.Y.; validation, Y.Y., K.W., H.L. and K.Z.; formal analysis, Y.Y. and H.L.; investigation, K.W.; resources, K.Z.; data curation, K.Z.; writing—original draft preparation, Y.Y. and H.L.; writing—review and editing, Y.Y.; visualization, Y.Y.; supervision, K.W.; project administration, K.W.; and funding acquisition, K.Z. All authors have read and agreed to the published version of the manuscript.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data is contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Funding Statement

This work was supported by the Scientific Research Startup Fund for Shenzhen High-Caliber Personnel of SZPT, No. 6022310051K, and the Industry-University-Research Innovation Fund for Chinese Universities (No. 2023IT068).

Footnotes

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

References

  • 1.Stangaciu V., Stangaciu C., Gusita B., Curiac D.I. Integrating Real-Time Wireless Sensor Networks into IoT Using MQTT-SN. J. Netw. Syst. Manag. 2025;33:37. doi: 10.1007/s10922-025-09916-1. [DOI] [Google Scholar]
  • 2.Kong L., Tan J., Huang J., Chen G., Wang S., Jin X., Zeng P., Khan M., Das S.K. Edge-computing-driven internet of things: A survey. ACM Comput. Surv. 2022;55:174. doi: 10.1145/3555308. [DOI] [Google Scholar]
  • 3.Deb P.K., Mukherjee A., Singh D., Misra S. Loop-the-loops: Fragmented learning over networks for constrained IoT devices. IEEE Trans. Parallel Distrib. Syst. 2022;34:316–327. doi: 10.1109/TPDS.2022.3220221. [DOI] [Google Scholar]
  • 4.Alsheavi A.N., Hawbani A., Othman W., Wang X., Qaid G., Zhao L., Al-Dubai A., Zhi L., Ismail A., Jhaveri R., et al. Iot authentication protocols: Challenges, and comparative analysis. ACM Comput. Surv. 2025;57:116. doi: 10.1145/3703444. [DOI] [Google Scholar]
  • 5.Yu S., Lee J., Lee K., Park K., Park Y. Secure authentication protocol for wireless sensor networks in vehicular communications. Sensors. 2018;18:3191. doi: 10.3390/s18103191. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 6.Sahoo S.S., Mohanty S., Sahoo K.S., Daneshmand M., Gandomi A.H. A Three-Factor-Based Authentication Scheme of 5G Wireless Sensor Networks for IoT System. IEEE Internet Things J. 2023;10:15087–15099. doi: 10.1109/JIOT.2023.3264565. [DOI] [Google Scholar]
  • 7.Huang W. ECC-based three-factor authentication and key agreement scheme for wireless sensor networks. Sci. Rep. 2024;14:1787. doi: 10.1038/s41598-024-52134-z. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 8.Vinoth R., Deborah L.J., Vijayakumar P., Kumar N. Secure multifactor authenticated key agreement scheme for industrial IoT. IEEE Internet Things J. 2020;8:3801–3811. doi: 10.1109/JIOT.2020.3024703. [DOI] [Google Scholar]
  • 9.Blanchet B. Foundations and Trends® in Privacy and Security. Volume 1. Now Publishers Inc.; Hanover, MA, USA: 2016. Modeling and verifying security protocols with the applied pi calculus and ProVerif; pp. 1–135. [Google Scholar]
  • 10.Sun D.Z. Security and privacy analysis of Vinoth et al.’s authenticated key agreement scheme for industrial IoT. Symmetry. 2021;13:1952. doi: 10.3390/sym13101952. [DOI] [Google Scholar]
  • 11.Guo H., Gao Y., Xu T., Zhang X., Ye J. A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks. Ad Hoc Netw. 2019;95:101965. doi: 10.1016/j.adhoc.2019.101965. [DOI] [Google Scholar]
  • 12.Mo J., Hu Z., Shen W. A provably secure three-factor authentication protocol based on chebyshev chaotic mapping for wireless sensor network. IEEE Access. 2022;10:12137–12152. doi: 10.1109/ACCESS.2022.3146393. [DOI] [Google Scholar]
  • 13.Wu T.Y., Wu H., Kumari S., Chen C.M. An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT. Peer-to-Peer Netw. Appl. 2025;18:83. doi: 10.1007/s12083-024-01839-z. [DOI] [Google Scholar]
  • 14.Herder C., Yu M.D., Koushanfar F., Devadas S. Physical unclonable functions and applications: A tutorial. Proc. IEEE. 2014;102:1126–1141. doi: 10.1109/JPROC.2014.2320516. [DOI] [Google Scholar]
  • 15.Wang W., Chen Q., Yin Z., Srivastava G., Gadekallu T.R., Alsolami F., Su C. Blockchain and PUF-based lightweight authentication protocol for wireless medical sensor networks. IEEE Internet Things J. 2021;9:8883–8891. doi: 10.1109/JIOT.2021.3117762. [DOI] [Google Scholar]
  • 16.Mahmood K., Saleem M.A., Ghaffar Z., Shamshad S., Das A.K., Alenazi M.J. Robust and efficient three-factor authentication solution for WSN-based industrial IoT deployment. Internet Things. 2024;28:101372. doi: 10.1016/j.iot.2024.101372. [DOI] [Google Scholar]
  • 17.Kumar D. Cryptanalysis and improvement of an authentication protocol for wireless sensor networks. Trans. Emerg. Telecommun. Technol. 2023;34:e4747. doi: 10.1002/ett.4747. [DOI] [Google Scholar]
  • 18.Canetti R., Krawczyk H. Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques. Springer; Berlin/Heidelberg, Germany: 2001. Analysis of key-exchange protocols and their use for building secure channels; pp. 453–474. [Google Scholar]
  • 19.Alghamdi A.M. Design and analysis of lightweight and robust authentication protocol for securing the resource constrained IIoT environment. PLoS ONE. 2025;20:e0318064. doi: 10.1371/journal.pone.0318064. [DOI] [PubMed] [Google Scholar]
  • 20.Emati J.H.M., Tchendji V.K., Djam-Doudou M. Enhancing trust in machines integration with Dirichlet distribution and self-sovereign identity. Array. 2025;28:100579. doi: 10.1016/j.array.2025.100579. [DOI] [Google Scholar]
  • 21.Dolev D., Yao A. On the security of public key protocols. IEEE Trans. Inf. Theory. 2003;29:198–208. doi: 10.1109/TIT.1983.1056650. [DOI] [Google Scholar]
  • 22.Veyrat-Charvillon N., Standaert F.X. Proceedings of the Annual Cryptology Conference. Springer; Berlin/Heidelberg, Germany: 2011. Generic side-channel distinguishers: Improvements and limitations; pp. 354–372. [Google Scholar]
  • 23.Burrows M., Abadi M., Needham R. A logic of authentication. ACM Trans. Comput. Syst. (TOCS) 1990;8:18–36. doi: 10.1145/77648.77649. [DOI] [Google Scholar]
  • 24.He D., Kumar N., Lee J.H., Sherratt R.S. Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Trans. Consum. Electron. 2014;60:30–37. doi: 10.1109/tce.2014.6780922. [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

Data is contained within the article.


Articles from Entropy are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES