Table 2: Computation and communication costs with energy consumption.
Protocols User node Gateway node Sensor node Total running cost Messages Total cost Energy
P 1 2T
M
+ 2T
RF
— 2T
M
+ 2T
RF
4T
M
+ 4T
RF
= 0.0264 sec. 3 0384 bits 763.6 mJ
P 2 2T
E
+ T
D
+ 2T
H
+ 2T
X
T
E/D
+2T
H
+3T
X
T
E/D
+3T
H
+4T
X
4T
E
+ 3T
D
+ 7T
H
+ 9T
X
= 0.0825 sec. 4 1856 bits 247.2 mJ
P 3 2T
H
+ T
X
— 10T
H
+ 9T
X
12T
H
+ 10T
X
= 0.026 sec. 4 1200 bits 78 mJ
P 4 3T
M
+ T
E
— 3T
M
6T
M
+ T
E
= 0.38715 sec. 3 2464 bits 1166.1 mJ
P 5 7T
H
+ T
D
— 9T
H
+ T
D
+ 2T
E
16T
H
+ 2T
E
+ 2T
D
= 0.04285 sec. 4 1600 bits 128.4 mJ
Ours 3T
H
+ T
D
+ 2T
X
— 2T
H
+ T
E
+ 2T
X
5T
H
+ T
E/D
+ 4T
X
= 0.0279 sec. 4 1088 bits 83.7 mJ
Table 3: Features comparison.
Features P 1 P 2 P 3 P 4 P 5 Ours
Dynamic scalability 5 5 5 5 5 3
Anonymity 3 5 3 3 3 3
Robust security 3 5 5 3 3 3
No complete rights policy 5 5 5 5 5 3
Symmetric key cryptography 5 5 3 5 3 3
Formal analysis using ROR model 5 5 5 3 3 3
Security verification 5 5 5 5 5 3
Safe against impersonation attacks 3 3 3 3 3 3
Safe against replay attacks 3 3 3 3 3 3
IND-CPA secure 5 5 5 3 3 3
Pairing-free scheme 3 5 5 3 3 3
Efficient token updation 5 5 5 5 5 3
Efficient shared key updation 5 5 5 5 5 3
Number of factors used 2 2 2 2 2 2
6 CONCLUDING REMARKS
In this paper, we propose privacy preserving au-
thentication protocol for dynamic system expansion
with partially TTP. Our protocol achieves superior
trade-off between robust security and effective pri-
vacy by adopting one-time alias identity with dy-
namic JWT and shared key updation during authenti-
cation. To achieve dynamic and anonymous scalabil-
ity we mitigate complete rights policy and knowledge
sharing with TTP. Empirical analysis demonstrates
that our proposed protocol is light-weight with addi-
tional security features as compared to similar mod-
eled schemes.
REFERENCES
Alcaide, A., Palomar, E., Montero-Castillo, J., and Rib-
agorda, A. (2013). Anonymous authentication
for privacy-preserving iot target-driven applications.
computers & security, 37:111–123.
Babbage, S., Catalano, D., Cid, C., de Weger, B., Dunkel-
man, O., Gehrmann, C., Granboulan, L., Lange, T.,
Lenstra, A. K., Mitchell, C., et al. (2009). Ecrypt
yearly report on algorithms and keysizes. Technical
report.
Chang, C.-C. and Le, H.-D. (2015). A provably secure, ef-
ficient, and flexible authentication scheme for ad hoc
wireless sensor networks. IEEE Transactions on wire-
less communications, 15(1):357–366.
Chen, Y., Xu, W., Peng, L., and Zhang, H. (2019). Light-
weight and privacy-preserving authentication protocol
for mobile payments in the context of iot. IEEE Ac-
cess, 7:15210–15221.
Das, M. L., Kumar, P., and Martin, A. (2020). Secure and
privacy-preserving rfid authentication scheme for in-
ternet of things applications. Wireless Personal Com-
munications, 110(1):339–353.
Gope, P. and Sikdar, B. (2018). Lightweight and privacy-
preserving two-factor authentication scheme for iot
devices. IEEE Internet of Things Journal, 6(1):580–
589.
Kang, J., Park, G., and Park, J. H. (2016). Design of
secure authentication scheme between devices based
on zero-knowledge proofs in home automation ser-
vice environments. The Journal of Supercomputing,
72(11):4319–4336.
Khan, M. K., Kim, S.-K., and Alghathbar, K. (2011). Crypt-
analysis and security enhancement of a ‘more efficient
& secure dynamic id-based remote user authentication
scheme’. Computer Communications, 34(3):305–309.
Lai, C., Li, H., Liang, X., Lu, R., Zhang, K., and Shen, X.
(2014). Cpal: A conditional privacy-preserving au-
thentication with access linkability for roaming ser-
vice. IEEE Internet of Things Journal, 1(1):46–57.
Lin, X.-J., Sun, L., and Qu, H. (2015). Insecurity of
an anonymous authentication for privacy-preserving
iot target-driven applications. computers & security,
48:142–149.
Saeed, M. E. S., Liu, Q.-Y., Tian, G., Gao, B., and Li, F.
(2018). Remote authentication schemes for wireless
body area networks based on the internet of things.
IEEE Internet of Things Journal, 5(6):4926–4944.
Trivedi, H. S. and Patel, S. J. (2020). Design of secure
authentication protocol for dynamic user addition in
distributed internet-of-things. Computer Networks,
178:107335.
Turkanovi
´
c, M., Brumen, B., and H
¨
olbl, M. (2014). A novel
user authentication and key agreement scheme for het-
erogeneous ad hoc wireless sensor networks, based
on the internet of things notion. Ad Hoc Networks,
20:96–112.
Vijayakumar, P., Chang, V., Deborah, L. J., Balusamy, B.,
and Shynu, P. (2018). Computationally efficient pri-
vacy preserving anonymous mutual and batch authen-
tication schemes for vehicular ad hoc networks. Fu-
ture generation computer systems, 78:943–955.
Wang, Y.-y., Liu, J.-y., Xiao, F.-x., and Dan, J. (2009). A
more efficient and secure dynamic id-based remote
user authentication scheme. Computer communica-
tions, 32(4):583–585.
Privacy Preserving Scalable Authentication Protocol with Partially Trusted Third Party for Distributed Internet-of-Things
817