IEEE Internet of Things Journal, 2026 (SCI-Expanded, Scopus)
The recent rise in Internet of Things (IoT)-based smart homes has introduced new security risks, particularly due to resource constraints in IoT devices, which make it challenging to design efficient security solutions. Current authentication schemes are vulnerable to various security attacks, including replay, man-in-the-middle, and impersonation attacks; lack forward secrecy; and exhibit high computational and communication complexity. To address these issues, this paper presents a secure and efficient authentication scheme tailored to IoT-based smart home surveillance networks. The proposed scheme employs Elliptic Curve Cryptography (ECC), SHA-256 hashing, and XOR operations to achieve mutual authentication and establish session keys between mobile devices, gateway nodes, and sensor nodes. The security analysis, conducted using the Random Oracle Model and ProVerif, confirms that the proposed scheme is secure against various attacks. The performance analysis carried out on a heterogeneous testbed reveals that the proposed protocol has low computation cost (1.15 ms), small communication overhead (6784 bits), optimal storage requirement (576 bytes), and low energy consumption (1.67 mJ per session), which makes it highly appropriate for resource-limited IoT networks. The proposed scheme achieves a good trade-off between security and efficiency, offering a viable solution for secure smart-home surveillance.