Document Type : Original Article


Department of Electrical and Computer Engineering, Malek- Ashtar University, Tehran, Iran.


The internet of things is an emerging paradigm that will change the way we interact with objects and computers in the future. It envisions a global network of devices interacting with each other, over the internet, to perform a useful action. Firstly, we provided the overview of the internet of things and then the relevant technologies that can help in large-scale development of internet of things, then the security issues in internet of things and its challenging. Secondly, we analyzed some of the lightweight authentication protocol in internet of things based on different techniques such as RFID authentication and continuous authentication to evaluate their vulnerability. Finally, we proposed the solution for one of RFID authentication protocol by using physically unclonable functions. In this protocol, the valid authentication time period is proposed to enhance robustness of authentication between internet of things devices and used the authentication token to authenticate the message which transmits from sensor node to the gateway and at the end the security analysis is conducted to evaluate the security strength of the proposed protocol.


[1] K. Keyur Patel, M. Sunil Patel, “Internet of Things-IOT: Definition, Characteristics, Architecture, Enabling Technologies, Application & Future Challenges”, IJESC, 2016.
[2] L. Atzori, A. Iera, G. Morabito, “The Internet of Things: A survey”, Elsevier, 2010.
[3] R. Subha, “Biometrics in Internet of Things (IoT) Security”, IJERGS, 2017.
[4] M.  Naveed Aman, K. Chaing Chua, and B.  Sikdar,  “A Light-Weight Mutual Authentication Protocol for IoT Systems”, IEEE, 2017.
[5] A. Braeken, “PUF Based Authentication Protocol for IoT”, mdpi/journal/ symmetry, 2018.
[6] M. El-hajj, A. Fadlallah, M. Chamoun and A. Serhrouchni, “A Survey of Internet of Things (IoT) Authentication Schemes”, mdpi/journal/sensors, 2019.
[7] H. Xu, J. Ding, P. Li, F. Zhu and R. Wang, “A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function”, Sensors, 2018.
[8] S. Jaiswal, D. Gupta, “Security Requirements for Internet of Things (IoT)”, Springer, 2017.
[9] M. Conti, A. Dehghantanha, K. Franke, S. Watson, “Internet of Things security and forensics: Challenges and opportunities”, Elsevier, 2018.
[10] S. Kaur, I. Singh, “A Survey Report on Internet of Things Applications”, IJCS T, 2016.
[11] N. Park and N. Kang, “Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle”, mdpi/journal/sensors, 2016.
[12] R. Balasubramaniam , R. Sathya , S. Ashicka3 and S. SenthilKumar , “an analysis of rfid authentication schemes for internet of things (iot) in healthcare environment using elgamal elliptic curve cryptosystem”, IJRTER, 2016.
[13] E. Michael, W. Herbert,  J. Mattord, ” Principles of Information Security, Fourth Edition”, Course Technology, 2012.
[14] K. Fan, W. Jiang, H. Li, and Y. Yang, “Lightweight RFID Protocol for Medical Privacy Protection in IoT”,  IEEE, 2018.