Simple Authentication Method for Vehicle Monitoring IoT Device With Verifiable Data Integrity

Muhammad Yazid*, F. Fahmi, Erwin Sutanto, Rachmad Setiawan, Aripriharta, Muhammad Aziz

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

4 Citations (Scopus)


This article proposes a new authentication method for vehicular monitoring Internet of Things (IoT) systems. Based on parallel hash chains, the proposed method is suitable for low-power and low-cost IoT devices. Encryption keys are continuously generated on identical parallel hash chains on both the IoT device and the server, removing the need to transmit secret keys over the network. The proposed method only needs two transmission handshakes for each authentication and data transmission. It does not need random number generation on the IoT device, reducing hardware requirements and potential security vulnerability. It minimizes power consumption and data transmission cost while providing mutual authentication of both the server and the device. Other merits of our proposed methods include: it provides device anonymity, allows message authentication, provides database integrity verification, is resistant to transmission loss, and is dynamically adaptable to disturbances in transmission network quality.

Original languageEnglish
Pages (from-to)7027-7037
Number of pages11
JournalIEEE Internet of Things Journal
Issue number8
Publication statusPublished - 15 Apr 2023


  • Authentication
  • Internet of Things (IoT)
  • energy efficiency
  • hash chain
  • transport systems


Dive into the research topics of 'Simple Authentication Method for Vehicle Monitoring IoT Device With Verifiable Data Integrity'. Together they form a unique fingerprint.

Cite this