Volume 33, Issue 7 e4479
RESEARCH ARTICLE

Continuous lightweight authentication according group priority and key agreement for Internet of Things

Reza Sarabi Miyanaji

Reza Sarabi Miyanaji

Department of Computer Engineering, North Tehran Branch, Islamic Azad University, Tehran, Iran

Search for more papers by this author
Sam Jabbehdari

Corresponding Author

Sam Jabbehdari

Department of Computer Engineering, North Tehran Branch, Islamic Azad University, Tehran, Iran

Correspondence

Sam Jabbehdari, Department of Computer Engineering, North Tehran Branch, Islamic Azad University, Tehran, Iran.

Email: [email protected]

Search for more papers by this author
Nasser Modiri

Nasser Modiri

Department of Computer Engineering, Zanjan Branch, Islamic Azad University, Zanjan, Iran

Search for more papers by this author
First published: 08 March 2022

Abstract

In the IoT, authentication is challenged by the limited resources of devices. Most existing continuous authentications require plenty of memory and computing. Also, the time interval between static authentications is fixed, and no attention is paid to the importance of their traffic. Therefore, in this article, we propose a lightweight protocol for mutual authentication between nodes and servers in IoT. To this aim, the nodes have been divided into three priority groups, and for the high priority group, a longer time interval is considered. Each group node at the beginning of the time interval performs static authentication and generates tokens. Continuous authentication is performed until the end of the time interval using this token. High-priority nodes also perform more continuous authentication instead of static authentication. The proposed method provides privacy-preserving through node anonymity, forward secrecy without using asynchronous encryption, key agreement. It is resistant to eavesdropping, replay, server spoofing, and impersonation attacks. Also, the proposed method has been verified using BAN logic and AVISPA tools. The computation time of the node and server in authentication has been decreased by 16.8% and 8.7%, respectively, compared with reviewing protocols, and the communication cost is 1902 bits.

CONFLICT OF INTEREST

The present article has no financial sponsor and there is no disagreement among the authors, therefore there is no conflict of interest.

DATA AVAILABILITY STATEMENT

Research data are not shared.

The full text of this article hosted at iucr.org is unavailable due to technical difficulties.