Abstract: The advent of the Internet of Things (IoT) has dramatically increased the demand for secure and efficient authentication protocols, particularly within resource constrained environments.