{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T22:27:14Z","timestamp":1772490434824,"version":"3.50.1"},"reference-count":32,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T00:00:00Z","timestamp":1714694400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Internet-of-things networks consist of multiple sensor devices spread over a wide area. In order to protect the data from unauthorized access and tampering, it is essential to ensure secure communication between the sensor devices and the central server. This security measure aims to guarantee authenticity, confidentiality, and data integrity. Unlike traditional computing systems, sensor node devices are often limited regarding memory and computing power. Lightweight communication protocols, such as LoRaWAN, were introduced to overcome these limitations. However, despite the lightweight feature, the protocol is vulnerable to different types of attacks. This proposal presents a highly secure key establishment protocol that combines two cryptography schemes: Elliptic Curve Qu\u2013Vanstone and signcryption key encapsulation. The protocol provides a method to establish a secure channel that inherits the security properties of the two schemes. Also, it allows for fast rekeying with only one exchange message, significantly reducing the handshake complexity in low-bandwidth communication. In addition, the selected schemes complement each other and share the same mathematical operations in elliptic curve cryptography. Moreover, with the rise of a community-friendly platform like RISC-V, we implemented the protocol on a RISC-V system to evaluate its overheads regarding the cycle count and execution time.<\/jats:p>","DOI":"10.3390\/fi16050157","type":"journal-article","created":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T05:52:02Z","timestamp":1714715522000},"page":"157","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Realization of Authenticated One-Pass Key Establishment on RISC-V Micro-Controller for IoT Applications"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2616-2510","authenticated-orcid":false,"given":"Tuan-Kiet","family":"Dang","sequence":"first","affiliation":[{"name":"Department of Computer and Network Engineering, University of Electro-Communications (UEC), 1-5-1 Chofugaoka, Tokyo 182-8585, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3623-5250","authenticated-orcid":false,"given":"Khai-Duy","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Department of Computer and Network Engineering, University of Electro-Communications (UEC), 1-5-1 Chofugaoka, Tokyo 182-8585, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7240-7203","authenticated-orcid":false,"given":"Binh","family":"Kieu-Do-Nguyen","sequence":"additional","affiliation":[{"name":"Department of Computer and Network Engineering, University of Electro-Communications (UEC), 1-5-1 Chofugaoka, Tokyo 182-8585, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4078-0836","authenticated-orcid":false,"given":"Trong-Thuc","family":"Hoang","sequence":"additional","affiliation":[{"name":"Department of Computer and Network Engineering, University of Electro-Communications (UEC), 1-5-1 Chofugaoka, Tokyo 182-8585, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5255-4919","authenticated-orcid":false,"given":"Cong-Kha","family":"Pham","sequence":"additional","affiliation":[{"name":"Department of Computer and Network Engineering, University of Electro-Communications (UEC), 1-5-1 Chofugaoka, Tokyo 182-8585, Japan"}]}],"member":"1968","published-online":{"date-parts":[[2024,5,3]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Aras, E., Ramachandran, G.S., Lawrence, P., and Hughes, D. (2017, January 21\u201323). Exploring the Security Vulnerabilities of LoRa. Proceedings of the 2017 3rd IEEE International Conference on Cybernetics (CYBCONF), Exeter, UK.","DOI":"10.1109\/CYBConf.2017.7985777"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1109\/COMST.2019.2949598","article-title":"A Survey on LoRa Networking: Research Problems, Current Solutions, and Open Issues","volume":"22","author":"Sundaram","year":"2019","journal-title":"IEEE Comm. Surv. Tutor."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"101825","DOI":"10.1109\/ACCESS.2022.3208171","article-title":"Investigation on Security Risk of LoRaWAN: Compatibility Scenarios","volume":"10","author":"Loukil","year":"2022","journal-title":"IEEE Access"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Han, J., and Wang, J. (2018). An Enhanced Key Management Scheme for LoRaWAN. Cryptography, 2.","DOI":"10.3390\/cryptography2040034"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Naoui, S., Elhdhili, M.E., and Saidane, L.A. (2016, January 22\u201325). Enhancing the Security of the IoT LoraWAN Architecture. Proceedings of the International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN), Paris, France.","DOI":"10.1109\/PEMWN.2016.7842904"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"21136","DOI":"10.1109\/JIOT.2022.3175756","article-title":"A Lightweight and Anonymous Authentication and Key Agreement Protocol for Wireless Body Area Networks","volume":"9","author":"Pu","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Zheng, Y., and Chang, C.-H. (2021, January 22\u201328). Secure Mutual Authentication and Key-Exchange Protocol between PUF-Embedded IoT Endpoints. Proceedings of the 2021 IEEE International Symposium on Circuits and Systems (ISCAS), Daegu, Republic of Korea.","DOI":"10.1109\/ISCAS51556.2021.9401135"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Torres, N., Pinto, P., and Lopes, S.I. (2021). Security Vulnerabilities in LPWANs\u2014An Attack Vector Analysis for the IoT Ecosystem. Appl. Sci., 11.","DOI":"10.3390\/app11073176"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1109\/JIOT.2014.2323395","article-title":"Securing the Internet of Things: A Standardization Perspective","volume":"1","author":"Keoh","year":"2014","journal-title":"IEEE Internet Things J."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/LES.2016.2630729","article-title":"Public Key Authentication and Key Agreement in IoT Devices with Minimal Airtime Consumption","volume":"9","author":"Sciancalepore","year":"2017","journal-title":"IEEE Embed. Syst. Lett."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Rehman, A., Haseeb, K., Fati, S.M., Lloret, J., and Pe\u00f1alver, L. (2021). Reliable Bidirectional Data Transfer Approach for the Internet of Secured Medical Things Using ZigBee Wireless Network. Appl. Sci., 11.","DOI":"10.3390\/app11219947"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Gaabouri, I.E., Senhadji, M., Belkasmi, M., and Bhiri, B.E. (2023). A Systematic Literature Review on Authentication and Threat Challenges on RFID Based NFC Applications. Future Internet, 15.","DOI":"10.3390\/fi15110354"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"3044","DOI":"10.1109\/JIOT.2023.3296135","article-title":"REALISE-IoT: RISC-V-Based Efficient and Lightweight Public-Key System for IoT Applications","volume":"11","author":"Mao","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Li, B., Zhang, G., Lei, S., Fu, H., and Wang, J. (2022, January 21\u201322). A Lightweight Authentication and Key Agreement Protocol for IoT Based on ECC. Proceedings of the 2021 International Conference on Advanced Computing and Endogenous Security, Nanjing, China.","DOI":"10.1109\/IEEECONF52377.2022.10013341"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Zhang, W., Lin, D., Zhang, H., Chen, C., and Zhou, X. (2017, January 1\u20134). A Lightweight Anonymous Mutual Authentication with Key Agreement Protocol on ECC. Proceedings of the IEEE Trustcom\/BigDataSE\/ICESS, Sydney, Australia.","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.234"},{"key":"ref_16","unstructured":"Certicom Research (2013). SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV), Certicom Research."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1137\/S0097539702403773","article-title":"Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack","volume":"33","author":"Cramer","year":"2003","journal-title":"SIAM J. Comp."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Bj\u00f8rstad, T.E., and Dent, A.W. (2006, January 24\u201326). Building Better Signcryption Schemes with Tag-KEMs. Proceedings of the International Conference on Public Key Cryptography (PKC), New York, NY, USA.","DOI":"10.1007\/11745853_32"},{"key":"ref_19","unstructured":"Bj\u00f8rstad, T.E., Dent, A.W., and Smart, N.P. (2023, January 12\u201314). Efficient KEMs with Partial Message Recovery. Proceedings of the International Conference on Cryptography and Coding, London, UK."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Barnes, R., Bhargavan, K., Lipp, B., and Wood, C. (2024, February 02). RFC9180-Hybrid Public Key Encryption. February 2022. Available online: https:\/\/www.rfc-editor.org\/rfc\/rfc9180.html.","DOI":"10.17487\/RFC9180"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Zheng, Y. (1997, January 17\u201321). Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption). Proceedings of the Annual International Cryptology Conference CRYPTO \u201997, Santa Barbara, CA, USA.","DOI":"10.1007\/BFb0052234"},{"key":"ref_22","unstructured":"Dent, A.W. (2024, April 30). Hybrid Cryptography. IACR Cryptology ePrint Archive, 2004. p. 210. Available online: https:\/\/eprint.iacr.org\/2004\/210."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Dent, A.W. (2005, January 20\u201323). Hybrid Signcryption Schemes with Outsider Security. Proceedings of the Information Security (ISC 2005), Singapore.","DOI":"10.1007\/11556992_15"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Dent, A.W. (2005, January 4\u20136). Hybrid Signcryption Schemes with Insider Security. Proceedings of the Information Security and Privacy (ACISP), Brisbane, Australia.","DOI":"10.1007\/11506157_22"},{"key":"ref_25","unstructured":"Gorantla, M.C., Boyd, C., Nieto, G., and Manuel, J. (2007, January 18\u201320). On the Connection between Signcryption and One-Pass Key Establishment. Proceedings of the Cryptography and Coding, Cirencester, UK."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Krawczyk, H. (2005, January 14\u201318). HMQV: A High-performance Secure Diffie-Hellman Protocol. Proceedings of the Annual International Conference on Advances in Cryptology (CRYPTO), Santa Barbara, CA, USA.","DOI":"10.1007\/11535218_33"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Okamoto, T., Tso, R., and Okamoto, E. (2005, January 25\u201327). One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing. Proceedings of the International Conference on Modeling Decisions for Artificial Intelligence (MDAI), Tsukuba, Japan.","DOI":"10.1007\/11526018_13"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"3028","DOI":"10.1109\/ACCESS.2017.2676119","article-title":"Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications","volume":"5","author":"Challa","year":"2017","journal-title":"IEEE Access"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1503","DOI":"10.1109\/ACCESS.2015.2474705","article-title":"Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications","volume":"3","author":"Porambage","year":"2015","journal-title":"IEEE Access"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"7727","DOI":"10.1109\/JIOT.2020.3040938","article-title":"Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System","volume":"8","author":"Srinivas","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Porambage, P., Schmitt, C., Kumar, P., Gurtov, A., and Ylianttila, M. (2014, January 6\u20139). Two-phase Authentication Protocol for Wireless Sensor Networks in Distributed IoT Applications. Proceedings of the 2014 IEEE Wireless Communications and Networking Conference (WCNC), Istanbul, Turkey.","DOI":"10.1109\/WCNC.2014.6952860"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"834","DOI":"10.1109\/JSYST.2016.2535730","article-title":"A Light-Weight Countermeasure to Forwarding Misbehavior in Wireless Sensor Networks: Design, Analysis, and Evaluation","volume":"12","author":"Pu","year":"2018","journal-title":"IEEE Syst. J."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/16\/5\/157\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T14:39:06Z","timestamp":1760107146000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/16\/5\/157"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,3]]},"references-count":32,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2024,5]]}},"alternative-id":["fi16050157"],"URL":"https:\/\/doi.org\/10.3390\/fi16050157","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,3]]}}}