{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:56:17Z","timestamp":1771613777045,"version":"3.50.1"},"reference-count":45,"publisher":"MDPI AG","issue":"18","license":[{"start":{"date-parts":[[2022,9,13]],"date-time":"2022-09-13T00:00:00Z","timestamp":1663027200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>For the betterment of human life, smart Internet of Things (IoT)-based systems are needed for the new era. IoT is evolving swiftly for its applications in the smart environment, including smart airports, smart buildings, smart manufacturing, smart homes, etc. A smart home environment includes resource-constrained devices that are interlinked, monitored, controlled, and analyzed with the help of the Internet. In a distributed smart environment, devices with low and high computational power work together and require authenticity. Therefore, a computationally efficient and secure protocol is needed. The authentication protocol is employed to ensure that authorized smart devices communicate with the smart environment and are accessible by authorized personnel only. We have designed a novel, lightweight secure protocol for a smart home environment. The introduced novel protocol can withstand well-known attacks and is effective with respect to computation and communication complexities. Comparative, formal, and informal analyses were conducted to draw the comparison between the introduced protocol and previous state-of-the-art protocols.<\/jats:p>","DOI":"10.3390\/s22186902","type":"journal-article","created":{"date-parts":[[2022,9,13]],"date-time":"2022-09-13T22:37:28Z","timestamp":1663108648000},"page":"6902","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["LR-AKAP: A Lightweight and Robust Security Protocol for Smart Home Environments"],"prefix":"10.3390","volume":"22","author":[{"given":"Rana Muhammad Abdul","family":"Haseeb-ur-rehman","sequence":"first","affiliation":[{"name":"Faculty of Information Science and Technology, University Kebangsaan Malaysia, Bangi 43600, Malaysia"}]},{"given":"Misbah","family":"Liaqat","sequence":"additional","affiliation":[{"name":"Department of Information Technology, College of Computing and Information Technology, University of Jeddah, Khulais 21959, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7337-6736","authenticated-orcid":false,"given":"Azana Hafizah Mohd","family":"Aman","sequence":"additional","affiliation":[{"name":"Faculty of Information Science and Technology, University Kebangsaan Malaysia, Bangi 43600, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7181-2100","authenticated-orcid":false,"given":"Abdulwahab Ali","family":"Almazroi","sequence":"additional","affiliation":[{"name":"Department of Information Technology, College of Computing and Information Technology, University of Jeddah, Khulais 21959, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5511-0205","authenticated-orcid":false,"given":"Mohammad Kamrul","family":"Hasan","sequence":"additional","affiliation":[{"name":"Faculty of Information Science and Technology, University Kebangsaan Malaysia, Bangi 43600, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7567-3101","authenticated-orcid":false,"given":"Zeeshan","family":"Ali","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Software Engineering, International Islamic University Islamabad, Islamabad 44000, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7924-3854","authenticated-orcid":false,"given":"Rana Liaqat","family":"Ali","sequence":"additional","affiliation":[{"name":"Department of Physics, COMSATS University Islamabad, Islamabad 45550, Pakistan"}]}],"member":"1968","published-online":{"date-parts":[[2022,9,13]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"101867","DOI":"10.1016\/j.telpol.2019.101867","article-title":"What will be the possible barriers to consumers\u2019 adoption of smart home services?","volume":"44","author":"Hong","year":"2020","journal-title":"Telecommun. Policy"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"102886","DOI":"10.1016\/j.jnca.2020.102886","article-title":"Iomt amid COVID-19 pandemic: Application, architecture, technology, and security","volume":"174","author":"Aman","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"111763","DOI":"10.1109\/ACCESS.2020.3002932","article-title":"A Survey on Trend and Classification of Internet of Things Reviews","volume":"8","author":"Aman","year":"2020","journal-title":"IEEE Access"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Hassan, R., Qamar, F., Hasan, M.K., Aman, A.H.M., and Ahmed, A.S. (2020). Internet of Things and Its Applications: A Comprehensive Survey. Symmetry, 12.","DOI":"10.3390\/sym12101674"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"e733","DOI":"10.7717\/peerj-cs.733","article-title":"MAC protocol with grouping awareness GMAC for large scale Internet-of-Things network","volume":"7","author":"Sadeq","year":"2021","journal-title":"PeerJ Comput. Sci."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"8389","DOI":"10.1002\/er.6451","article-title":"Internet of things energy system: Smart applications, technology advancement, and open issues","volume":"45","author":"Aman","year":"2021","journal-title":"Int. J. Energy Res."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/MSEC.2021.3117471","article-title":"Toward Cybersecurity Personalization in Smart Homes","volume":"20","author":"Bringhenti","year":"2022","journal-title":"IEEE Secur. Priv."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1109\/THMS.2022.3142112","article-title":"Theory and Design Considerations for the User Experience of Smart Environments","volume":"52","author":"Reig","year":"2022","journal-title":"IEEE Trans. Hum.-Mach. Syst."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Pathy, B., and Sujatha, R. (2022). IoT Enabled Smart Connected Homes and Its Social Graces. Internet of Things and Its Applications, Springer.","DOI":"10.1007\/978-3-030-77528-5_25"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"106140","DOI":"10.1016\/j.ijepes.2020.106140","article-title":"A privacy protection scheme of smart meter for decentralized smart home environment based on consortium blockchain","volume":"121","author":"Zhang","year":"2020","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1016\/j.ijepes.2019.01.001","article-title":"Smart metering in the netherlands: What, how, and why","volume":"109","author":"Aubel","year":"2019","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"3264","DOI":"10.1109\/TMC.2017.2684806","article-title":"Virtual Occupancy Sensing: Using Smart Meters to Indicate Your Presence","volume":"16","author":"Jin","year":"2017","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1109\/TASE.2016.2619720","article-title":"Occupancy detection via environmental sensing","volume":"15","author":"Jin","year":"2018","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"ref_14","first-page":"589","article-title":"An innovative AAL system based on neural networks and IoT-aware technologies to improve the quality of life in elderly people","volume":"19","author":"Taccardi","year":"2020","journal-title":"Int. J. Intell. Syst. Technol. Appl."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"181","DOI":"10.36548\/jismac.2020.4.001","article-title":"A Survey on Internet of Things (IoT) based Smart Systems","volume":"2","author":"Smys","year":"2020","journal-title":"J. ISMAC"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1109\/TLA.2018.8327425","article-title":"Notification Oriented Paradigm Applied to Ambient Assisted Living Tool","volume":"16","author":"Oliveira","year":"2018","journal-title":"IEEE Lat. Am. Trans."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","article-title":"On the security of public key protocols","volume":"29","author":"Dolev","year":"1983","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Wagner, D. (2008). On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme. Advances in Cryptology\u2014CRYPTO 2008, Springer.","DOI":"10.1007\/978-3-540-85174-5"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/S0167-4048(99)80136-9","article-title":"Password authentication schemes with smart cards","volume":"18","author":"Yang","year":"1999","journal-title":"Comput. Secur."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/j.jcss.2011.01.002","article-title":"An improved two-party identity-based authenticated key agreement protocol using pairings","volume":"78","author":"Welzer","year":"2012","journal-title":"J. Comput. Syst. Sci."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Wiener, M. (1999). Differential power analysis. Advances in Cryptology\u2014CRYPTO\u2019 99, Springer.","DOI":"10.1007\/3-540-48405-1"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","article-title":"Examining smart-card security under the threat of power analysis attacks","volume":"51","author":"Messerges","year":"2002","journal-title":"IEEE Trans. Comput."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Banerjee, S., Odelu, V., Das, A.K., Chattopadhyay, S., and Park, Y. (2020). An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments. Sensors, 20.","DOI":"10.3390\/s20041215"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"5492","DOI":"10.1109\/ACCESS.2018.2888923","article-title":"SPADE: Activity Prediction in Smart Homes Using Prefix Tree Based Context Generation","volume":"7","author":"Farayez","year":"2018","journal-title":"IEEE Access"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.enbuild.2016.12.026","article-title":"An intelligent system architecture in home energy management systems (HEMS) for efficient demand response in smart grid","volume":"138","author":"Shakeri","year":"2017","journal-title":"Energy Build."},{"key":"ref_26","first-page":"1","article-title":"Public Key Authentication and Key Agreement in IoT Devices With Minimal Airtime Consumption","volume":"9","author":"Sciancalepore","year":"2016","journal-title":"IEEE Embed. Syst. Lett."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"5540296","DOI":"10.1155\/2021\/5540296","article-title":"Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications","volume":"2021","author":"Hasan","year":"2021","journal-title":"Complexity"},{"key":"ref_28","first-page":"156","article-title":"Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain","volume":"45","author":"Alshahrani","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"7500204","DOI":"10.1109\/LSENS.2019.2905020","article-title":"Session-Key Establishment and Authentication in a Smart Home Network Using Public Key Cryptography","volume":"3","author":"Dey","year":"2019","journal-title":"IEEE Sens. Lett."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1109\/JSEN.2015.2475298","article-title":"Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments","volume":"16","author":"Kumar","year":"2015","journal-title":"IEEE Sens. J."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"968","DOI":"10.1109\/TIFS.2016.2647225","article-title":"Anonymous Secure Framework in Connected Smart Home Environments","volume":"12","author":"Kumar","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1109\/JIOT.2018.2846299","article-title":"Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices","volume":"6","author":"Gope","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1109\/TDSC.2017.2764083","article-title":"Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment","volume":"17","author":"Wazid","year":"2017","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.cose.2019.06.002","article-title":"Anonymous authentication scheme for smart home environment with provable security","volume":"86","author":"Shuai","year":"2019","journal-title":"Comput. Secur."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Lee, Y.S., Lee, H.J., and Alasaarela, E. (2013, January 1\u20135). Mutual authentication in wireless body sensor networks (WBSN) based on Physical Unclonable Function (PUF). Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC), Sardinia, Italy.","DOI":"10.1109\/IWCMC.2013.6583746"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Khernane, N., Potop-Butucaru, M., and Chaudet, C. (2016, January 10\u201313). BANZKP: A secure authentication scheme using zero knowledge proof for WBANs. Proceedings of the 2016 IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Brasilia, Brazil.","DOI":"10.1109\/MASS.2016.046"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.comnet.2018.05.006","article-title":"Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network","volume":"140","author":"Koya","year":"2018","journal-title":"Comput. Netw."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P.H., He\u00e1m, P.C., Kouchnarenko, O., and Mantovani, J. (2005). The AVISPA tool for the automated validation of internet security protocols and applications. Computer Aided Verification, Springer.","DOI":"10.1007\/11513988_27"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1550147719879379","DOI":"10.1177\/1550147719879379","article-title":"Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things","volume":"15","author":"Yu","year":"2019","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Naoui, S., Elhdhili, M.H., and Saidane, L.A. (2019, January 15\u201318). Novel smart home authentication protocol LRP-SHAP. Proceedings of the 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco.","DOI":"10.1109\/WCNC.2019.8885493"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"100158","DOI":"10.1016\/j.iot.2020.100158","article-title":"Secure remote anonymous user authentication scheme for smart home environment","volume":"9","author":"Fakroon","year":"2020","journal-title":"Internet Things"},{"key":"ref_42","first-page":"1","article-title":"US secure hash algorithm 1 (SHA1)","volume":"3174","author":"Eastlake","year":"2001","journal-title":"RFC"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.adhoc.2014.03.009","article-title":"A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion","volume":"20","author":"Brumen","year":"2014","journal-title":"Ad Hoc Netw."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"70072","DOI":"10.1109\/ACCESS.2018.2880225","article-title":"An Enhanced Symmetric Cryptosystem and Biometric-Based Anonymous User Authentication and Session Key Establishment Scheme for WSN","volume":"6","author":"Alotaibi","year":"2018","journal-title":"IEEE Access"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"4431","DOI":"10.1109\/JSYST.2021.3057047","article-title":"Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones","volume":"15","author":"Hussain","year":"2021","journal-title":"IEEE Syst. J."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/18\/6902\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:30:15Z","timestamp":1760142615000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/18\/6902"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,13]]},"references-count":45,"journal-issue":{"issue":"18","published-online":{"date-parts":[[2022,9]]}},"alternative-id":["s22186902"],"URL":"https:\/\/doi.org\/10.3390\/s22186902","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,13]]}}}