TY - EJOU AU - Alhusayni, Khalid AU - Wazirali, Raniyah AU - AlAkhras, Mousa AU - Almasri, Marwah AU - Alhazmi, Samah TI - A Multi-Stage Secure IoT Authentication Protocol T2 - Computer Systems Science and Engineering PY - 2023 VL - 45 IS - 1 SN - AB - The Internet of Things (IoT) is a network of heterogeneous and smart devices that can make decisions without human intervention. It can connect millions of devices across the universe. Their ability to collect information, perform analysis, and even come to meaningful conclusions without human capital intervention matters. Such circumstances require stringent security measures and, in particular, the extent of authentication. Systems applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious, wrongly authenticated device finds its way into the IoT system. This research provides a clear and updated view of the trends in the IoT authentication area. Among the issues covered include a series of authentication protocols that have remained research gaps in various studies. This study applies a comparative evaluation of authentication protocols, including their strengths and weaknesses. Thus, it forms the foundation in the IoT authentication field of study. In that direction, a multi authentication architecture that involves secured means is proposed for protocol authentication. Informal analysis can affect the security of the protocols. Burrows-Abadi-Needham (BAN) logic provides proof of the attainment of mutual authentication. NS3 simulator tool is used to compare the performance of the proposed protocol to verify the formal security offered by the BAN logic. KW - Internet of Things (IoT); security; authentication; BAN logic; sensor networks DO - 10.32604/csse.2023.028536