An Anonymous Authentication Protocol Based on Blind Signature for Internet of Things

被引:0
|
作者
Zhao, Yue [1 ]
Yang, Bin [2 ]
Yang, Yarang [3 ]
机构
[1] Sci & Technol Commun Secur Lab, Chengdu 610041, Peoples R China
[2] Chuzhou Univ, Sch Comp & Informat Engn, Chuzhou 239000, Peoples R China
[3] Kashi Univ, Coll Phys & Elect Engn, Kashi 84006, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things; anonymous authentication; blind signature; security analysis; performance evaluation;
D O I
10.1145/3651671.3651724
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes an anonymous authentication protocol based on blind signature for the Internet of Things (IoTs), which is proposed to provide protection for the identity information of the node while ensuring the legitimacy of the identity verification of the node in the IoTs. The arbitration mechanism is adopted to enhance the security of anonymous authentication to meet the requirements in terms of access authentication, node anonymity, and malicious node tracking, and so on. The threshold secret sharing algorithm and hash function are introduced to achieve anonymous authentication within and between autonomic systems, and meet the needs of the IoTs for low communication and computation overheads. The security analysis shows that the authentication protocol proposed in this paper has these good features: real-time tracking & revocation and anti-theft signature under the premise of satisfying the privacy information protection. The performance evaluation results show that compared with the existing anonymous authentication protocols, the proposed anonymous authentication protocol based on blind signature guarantees security and anonymity, while reducing the anonymous authentication time by 19.8% and ensuring the size of data packages less than 350KB.
引用
收藏
页码:73 / 79
页数:7
相关论文
共 50 条
  • [41] An anonymous inter-network routing protocol for the internet of things
    Palmieri P.
    Calderoni L.
    Maio D.
    1600, River Publishers (06): : 127 - 146
  • [42] AN AUTHENTICATION TECHNIQUE BASED ON OAUTH 2.0 PROTOCOL FOR INTERNET OF THINGS (IOT) NETWORK
    Khan, Jalaluddin
    Li, Jian Ping
    Ali, Ikram
    Parveen, Shadma
    Khan, Ghufran Ahmad
    Khalil, Mudassir
    Khan, Asif
    Ul Haq, Amin
    Shahid, Mohammad
    2018 15TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2018, : 160 - 165
  • [43] A provably secure RFID authentication protocol based on ECQV for the medical internet of things
    Abhay Kumar Agrahari
    Shirshu Varma
    Peer-to-Peer Networking and Applications, 2021, 14 : 1277 - 1289
  • [44] Modified Cryptosystem-Based Authentication Protocol for Internet of Things in Fog Networks
    Kanthimathi, S.
    Sivakami, R.
    Indira, B.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2025, 37 (4-5):
  • [45] A secure ECC-based RFID mutual authentication protocol for internet of things
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jongsung
    Seo, Changho
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (09): : 4281 - 4294
  • [46] A secure ECC-based RFID mutual authentication protocol for internet of things
    Amjad Ali Alamr
    Firdous Kausar
    Jongsung Kim
    Changho Seo
    The Journal of Supercomputing, 2018, 74 : 4281 - 4294
  • [47] A privacy-preserving code-based authentication protocol for Internet of Things
    Noureddine Chikouche
    Pierre-Louis Cayrel
    El Hadji Modou Mboup
    Brice Odilon Boidje
    The Journal of Supercomputing, 2019, 75 : 8231 - 8261
  • [48] A provably secure RFID authentication protocol based on ECQV for the medical internet of things
    Agrahari, Abhay Kumar
    Varma, Shirshu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) : 1277 - 1289
  • [49] A privacy-preserving code-based authentication protocol for Internet of Things
    Chikouche, Noureddine
    Cayrel, Pierre-Louis
    Mboup, El Hadji Modou
    Boidje, Brice Odilon
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (12): : 8231 - 8261
  • [50] Construction of elliptic curve cryptography-based authentication protocol for internet of things
    Chhikara, Deepak
    Rana, Saurabh
    Mishra, Ankita
    Mishra, Dheerendra
    SECURITY AND PRIVACY, 2022, 5 (04)