{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T23:04:15Z","timestamp":1767827055672,"version":"3.49.0"},"reference-count":35,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2023,4,29]],"date-time":"2023-04-29T00:00:00Z","timestamp":1682726400000},"content-version":"vor","delay-in-days":118,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002074"],"award-info":[{"award-number":["62002074"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Intelligent Systems"],"published-print":{"date-parts":[[2023,1]]},"abstract":"<jats:p>With the rapid development of Internet of Things (IoT), designing a secure two\u2010factor authentication scheme for IoT is becoming increasingly demanding. Two\u2010factor protocols are deployed to achieve a higher security level than single\u2010factor protocols. Given the resource constraints of IoT devices, other factors such as biometrics are ruled out as additional authentication factors due to their large overhead. Smart cards are also prone to side\u2010channel attacks. Therefore, historical big data have gained interest recently as a novel authentication factor in IoT. In this paper, we show that existing big data\u2010based schemes fail to achieve their claimed security properties such as perfect forward secrecy (PFS), key compromise impersonation (KCI) resilience, and server compromise impersonation (SCI) resilience. Assuming a real strong attacker rather than a weak one, we show that previous schemes not only fail to provide KCI and SCI but also do not provide real two\u2010factor security and revocability and suffer inside attack. Then, we propose our novel scheme which can indeed provide real two\u2010factor security, PFS, KCI, and inside attack resilience and revocability of the client. Furthermore, our performance analysis shows that our scheme has reduced modular exponentiation operation and multiplication for both the client and the server compared to Liu et al.\u2019s scheme which reduces the execution time by one third for security levels of <jats:italic>\u03bb<\/jats:italic> = 128. Moreover, in order to cope with the potential threat of quantum computers, we suggest using lightweight XMSS signature schemes which provide the desired security properties with <jats:italic>\u03bb<\/jats:italic> = 128 bit postquantum security. Finally, we prove the security of our proposed scheme formally using both the real\u2010or\u2010random model and the ProVerif analysis tool.<\/jats:p>","DOI":"10.1155\/2023\/9731239","type":"journal-article","created":{"date-parts":[[2023,4,29]],"date-time":"2023-04-29T18:35:09Z","timestamp":1682793309000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Lightweight, Secure Big Data\u2010Based Authentication and Key\u2010Agreement Scheme for IoT with Revocability"],"prefix":"10.1155","volume":"2023","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9140-2747","authenticated-orcid":false,"given":"Behnam","family":"Zahednejad","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7261-6398","authenticated-orcid":false,"given":"Huang","family":"Teng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1427-5473","authenticated-orcid":false,"given":"Saeed","family":"Kosari","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2837-5157","authenticated-orcid":false,"given":"Ren","family":"Xiaojun","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2023,4,29]]},"reference":[{"key":"e_1_2_14_1_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_5"},{"key":"e_1_2_14_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91356-4_6"},{"key":"e_1_2_14_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-00893-7"},{"key":"e_1_2_14_4_2","first-page":"2276","article-title":"A comprehensive survey on various biometric systems","volume":"13","author":"Sabhanayagam T.","year":"2018","journal-title":"International Journal of Applied Engineering Research"},{"key":"e_1_2_14_5_2","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.129"},{"key":"e_1_2_14_6_2","unstructured":"DiazJ. Hackers Unlock Any Phone Using Photographed Fingerprints in Just 20 minutes 2019 https:\/\/www.tomsguide.com\/news\/hackers-unlock-any-phone-using-photographed-fingerprints-in-just-20-minutes."},{"key":"e_1_2_14_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.10.001"},{"key":"e_1_2_14_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.07.001"},{"key":"e_1_2_14_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2017.2714179"},{"key":"e_1_2_14_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2018.2857811"},{"key":"e_1_2_14_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2930542"},{"key":"e_1_2_14_12_2","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2019.1627072"},{"key":"e_1_2_14_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-020-02523-9"},{"key":"e_1_2_14_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3156629"},{"key":"e_1_2_14_15_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.017338"},{"key":"e_1_2_14_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108465"},{"key":"e_1_2_14_17_2","doi-asserted-by":"crossref","unstructured":"JhaveriR. H. PatelS. J. andJinwalaD. C. Dos attacks in mobile ad hoc networks: a survey Proceedings of the 2012 Second International Conference on Advanced Computing & Communication Technologies January 2012 Rohtak India 535\u2013541.","DOI":"10.1109\/ACCT.2012.48"},{"key":"e_1_2_14_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2018.2844403"},{"key":"e_1_2_14_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.03.034"},{"key":"e_1_2_14_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2975615"},{"key":"e_1_2_14_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2021.3128826"},{"key":"e_1_2_14_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/tie.2019.2893831"},{"key":"e_1_2_14_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3187537"},{"key":"e_1_2_14_24_2","doi-asserted-by":"crossref","unstructured":"BrainardJ. JuelsA. RivestR. L. SzydloM. andYungM. Fourth-factor authentication: somebody you know Proceedings of the 13th ACM Conference on Computer and Communications Security October 2006 Alexandria VA USA 168\u2013178.","DOI":"10.1145\/1180405.1180427"},{"key":"e_1_2_14_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2928303"},{"key":"e_1_2_14_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/11774716_19"},{"key":"e_1_2_14_27_2","unstructured":"DanielA.andLejlaB. Initial Recommendations of Long-Term Secure post-quantum Systems 2015 https:\/\/pqcrypto.eu.org\/slides\/recommendations-20150907.pdf."},{"key":"e_1_2_14_28_2","unstructured":"GalbraithS. D. Authenticated Key Exchange for Sidh 2018 https:\/\/eprint.iacr.org\/2018\/266."},{"key":"e_1_2_14_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34578-5_11"},{"key":"e_1_2_14_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-52153-4_11"},{"key":"e_1_2_14_31_2","first-page":"273","volume-title":"International Conference on Security and Cryptography for Networks","author":"Pino R.","year":"2016"},{"key":"e_1_2_14_32_2","unstructured":"GhoshS. MisoczkiR. andSastryM. R. Lightweight post-quantum-secure Digital Signature Approach for Iot Motes 2019 https:\/\/eprint.iacr.org\/2019\/122."},{"key":"e_1_2_14_33_2","doi-asserted-by":"publisher","DOI":"10.1049\/ip-ifs:20055073"},{"key":"e_1_2_14_34_2","unstructured":"GitHub Our Source Code 2022 https:\/\/github.com\/Crypto164\/AKEwithBigdata\/."},{"key":"e_1_2_14_35_2","unstructured":"ZahednejadB. A Lightweight Secure Big Data-Based Authentication and Key-Agreement Scheme for Iot with Revocability 2022 https:\/\/eprint.iacr.org\/2022\/1080."}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijis\/2023\/9731239.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijis\/2023\/9731239.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2023\/9731239","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T05:28:45Z","timestamp":1735622925000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2023\/9731239"}},"subtitle":[],"editor":[{"given":"Mohammad R.","family":"Khosravi","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2023,1]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["10.1155\/2023\/9731239"],"URL":"https:\/\/doi.org\/10.1155\/2023\/9731239","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"value":"0884-8173","type":"print"},{"value":"1098-111X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1]]},"assertion":[{"value":"2022-10-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-03-26","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-04-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"9731239"}}