An Improved Identity-Based Anonymous Authentication Scheme Resistant to Semi-Trusted Server Attacks

被引:7
|
作者
Xie, Dong [1 ,2 ]
Yang, Jinghua [1 ,2 ]
Bian, Weixin [1 ,2 ]
Chen, Fulong [1 ,2 ]
Wang, Taochun [1 ,2 ]
机构
[1] Anhui Normal Univ, Anhui Prov Key Lab Network & Informat Secur, Wuhu, Peoples R China
[2] Anhui Normal Univ, Sch Comp & Informat, Wuhu 241002, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Security; Servers; Protocols; Internet of Things; Privacy; Impersonation attacks; Anonymous authentication key agreement (AKA); mobile edge computing; ProVerif; random oracle model; semi-trusted server attacks; KEY AGREEMENT; SECURE; OPPORTUNITIES; PROTOCOL;
D O I
10.1109/JIOT.2022.3203991
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In mobile edge computing, the computing tasks of IoT terminal devices with limited computing power often need to be offloaded to servers for processing. However, there are malicious attacks by adversaries and malicious behaviors of servers in the network, coupled with the use of insecure network channels for data information transmission. These factors seriously threaten the privacy and data security of terminal devices and users. Therefore, it is urgent to use a safe and efficient anonymous authentication key agreement mechanism to verify the legitimacy of the identities of computing participants and ensure the safe transmission of task data. Recently Jia et al. proposed an identity-based authentication scheme, which combines many advantages of previous work and is resistant to various attacks. However, we found that their scheme has security problems, such as offline key guessing attack, internal attack, and user anonymity problems. We classify them as semi-trusted server attacks. In order to solve these security problems, we propose an improved scheme to better realize the authentication function by using flexible and security-enhanced keys for terminal equipment (TE), while ensuring the anonymity of the TE through implicit ID. Furthermore, we provide formal security proof, formal security verification, and security analysis for the improved protocol. Compared with the previous scheme, the scheme has certain improvements in security and performance.
引用
收藏
页码:734 / 746
页数:13
相关论文
共 50 条
  • [1] An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
    Cui, Jie
    Wu, Di
    Zhang, Jing
    Xu, Yan
    Zhong, Hong
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (03) : 2972 - 2986
  • [2] Research on Identity-based Batch Anonymous Authentication Scheme for VANET
    Song, Cheng
    Gu, Xinan
    Wang, Lei
    Liu, Zhizhong
    Ping, Yuan
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (12): : 6175 - 6189
  • [3] An Improved Lightweight Pseudonym Identity-Based Authentication Scheme on Multi-server Environment
    Lin, Hao
    Wen, Fengtong
    Du, Chunxia
    [J]. WIRELESS COMMUNICATIONS, NETWORKING AND APPLICATIONS, WCNA 2014, 2016, 348 : 1115 - 1126
  • [4] An Identity-Based One-Time Password Scheme with Anonymous Authentication
    Luo, Song
    Hu, Jianbin
    Chen, Zhong
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 864 - 867
  • [5] Research on Identity-Based Batch Anonymous Authentication Scheme for Vehicular Network
    Song, Cheng
    Gu, Xin-An
    Wang, Lei
    Liu, Zhi-Zhong
    Yan, Xi-Xi
    [J]. Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2019, 42 (05): : 69 - 74
  • [6] Identity-Based Identification Scheme without Trusted Party against Concurrent Attacks
    Tang, Fei
    Bao, Jiali
    Huang, Yonghong
    Huang, Dong
    Wang, Fuqun
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [7] A Redesigned Identity-Based Anonymous Authentication Scheme for Mobile-Edge Computing
    Jia, Xiaoying
    Luo, Min
    Choo, Kim-Kwang Raymond
    Li, Li
    He, Debiao
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12): : 10108 - 10120
  • [8] An Improved Identity-Based Society Oriented Signature Scheme with Anonymous Signers
    TANG Chunming School of Mathematics and Information Sciences/ Guangdong Province Key Laboratory
    [J]. Wuhan University Journal of Natural Sciences, 2007, (01) : 121 - 125
  • [9] Hierarchical Access Control Scheme Based on the Semi-Trusted Center
    Zhang Min-Qing
    Liu Yun-Hao
    Yang Xiao-Yuan
    [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 8, 2010, : 162 - 165
  • [10] An improved anonymous multi-receiver identity-based encryption scheme
    Zhang, Jianhong
    Mao, Jian
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (04) : 645 - 658