A Contiki OS–Based Hybrid Authentication Framework for IoT Employing ECC and LBAS
Keywords:
Contiki OS, Secure Communication Protocols, Elliptic Curve Cryptography, Internet of Things (IoT), Lightweight Block Authentication SystemAbstract
This research explores a secure and efficient authentication protocol for Internet of Things (IoT) environments, employing a hybrid model that integrates Elliptic Curve Cryptography (ECC) with the Lightweight Block Authentication System (LBAS). The approach aims to meet key IoT requirements, including resource efficiency, low latency, and strong security. Using Contiki OS as the simulation framework, three protocol variations are evaluated to measure their performance in terms of authentication success rate, latency, energy usage, packet loss, and communication overhead. Scenario 1 represents a baseline protocol focused on minimal computational load, providing high energy efficiency and low latency but offering only limited security. Scenario 2 enhances security with ECC-based encryption and multi-factor authentication, achieving stronger protection but at the cost of higher latency and energy consumption, making it best suited for sensitive data applications. Scenario 3 introduces a hybrid ECC-LBAS model with adaptive network optimizations, striking a balance between security and efficiency. This optimized protocol achieves a 99.1% authentication success rate, just 0.4% packet loss, and moderate energy consumption, making it highly reliable for resource-constrained IoT networks. The findings confirm that the ECC-LBAS hybrid approach is a practical solution for IoT deployments, offering adaptability to varying security and energy demands. This study provides a foundational reference for developing scalable, secure, and resource-aware IoT authentication protocols.
Downloads
References
D. Evans, “The Internet of Things: How the Next Evolution of the Internet is Changing Everything,” Cisco IBSG, 2011.
Y. Chen, J. Wang, "Security Issues and Challenges for IoT-based Smart Grid," IEEE Access, 2020.
M. K. Afzal, M. Umair, and N. Kumar, "Secure Authentication for IoT and 5G: Challenges and Future Directions," Journal of Information Security, 2019.
C. Alcaraz, P. Najera, J. Lopez, and R. Roman, "Security in Cyber-Physical Systems for IoT," IEEE Internet of Things Journal, 2013.
M. M. Islam, N. Sultana, "A Lightweight Authentication Protocol for IoT," Computers & Security, 2021.
A. Shafique, F. Jabeen, "The Risks and Challenges in IoT Security," International Journal of Computer Science, 2018.
J. Gubbi, R. Buyya, "Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions," Future Generation Computer Systems, 2013.
F. Wu, S. Xu, "A Survey on the IoT Security," IEEE Access, 2019.
A. K. Das, "A Novel Authentication Protocol for Secure IoT Communications," IEEE Transactions on Network Science and Engineering, 2017.
S. Sicari, A. Rizzardi, "Security, Privacy, and Trust in IoT," Computer Networks, 2015.
M. S. Hossain, M. Fotouhi, "IoT in the Healthcare Sector: An Overview," IEEE Internet of Things Journal, 2017.
P. Gope, B. Sikdar, "An Efficient Authentication Protocol for IoT," IEEE Transactions on Wireless Communications, 2018.
N. Zhang, W. Liu, "ECC for IoT: A Secure and Efficient Approach," IEEE Internet of Things Journal, 2020.
J. W. Bos, D. A. Osvik, "Elliptic Curve Cryptography for the Internet of Things," Future Internet, 2014.
A. Abdullah, H. Rahman, "A Lightweight Authentication System for IoT," Journal of Security and Communication Networks, 2021.
A. Dunkels, B. Gronvall, T. Voigt, "Contiki - A Lightweight and Flexible Operating System for Tiny Networked Sensors," IEEE Conference on Local Computer Networks, 2004.
T. Shree, S. Ghosh, "Simulation of Lightweight Authentication Protocol in Contiki OS," International Journal of Embedded Systems, 2020.
S. H. Islam, M. K. Khan, "Toward Secure IoT Communication via Hybrid Authentication Protocol," IEEE Internet of Things Journal, 2020.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.