An efficient anonymous authentication and key agreement scheme with privacy-preserving for smart cities

被引:19
|
作者
Xia, Xueya [1 ]
Ji, Sai [1 ,2 ]
Vijayakumar, Pandi [3 ]
Shen, Jian [1 ,4 ]
Rodrigues, Joel J. P. C. [5 ,6 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Peoples R China
[2] Suqian Univ, Suqian, Peoples R China
[3] Anna Univ Chennai, Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Melpakkam 604001, India
[4] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen, Peoples R China
[5] Fed Univ Piaui UFPI, Teresina, Brazil
[6] Inst Telecomunicac, Covilha, Portugal
基金
中国国家自然科学基金;
关键词
Smart cities; non-interactive zero knowledge; trustworthiness evaluation; anonymous authentication; SECURE DATA-TRANSMISSION; INTERNET; SIGNATURE; MANAGEMENT; PROTOCOL;
D O I
10.1177/15501477211026804
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things devices are responsible for collecting and transmitting data in smart cities, assisting smart cities to release greater potential. As Internet of Things devices are increasingly connected to smart cities, security and privacy have gradually become important issues. Recently, research works on mitigating security challenges of Internet of Things devices in smart cities mainly focused on authentication. However, in most of the existing authentication protocols, the trustworthiness evaluation of Internet of Things devices in smart cities is ignored. Considering the trustworthiness evaluation of Internet of Things devices is an important constituent of data source authentication, in this article, a cloud-aided trustworthiness evaluation mechanism is first designed to improve the credibility of the Internet of Things devices in smart cities. Furthermore, aiming at the problem that the user's privacy is easy to leak in the process of authentication, an anonymous authentication and key agreement scheme based on non-interactive zero knowledge argument is proposed. The proposed scheme can ensure the privacy preservation and data security of Internet of Things devices in smart cities. The security analysis demonstrates that the proposed scheme is secure under q-SDH problem. The experimental simulation indicates that the performance of the proposal is greatly improved compared with other similar schemes.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] An Efficient Anonymous Authentication Scheme for Privacy-preserving in Smart Grid
    Xia, Xueya
    Ji, Sai
    [J]. 2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [2] An efficient and certificateless conditional privacy-preserving authentication and key agreement scheme for smart healthcare
    Hu, Yihao
    Huang, Chunguang
    Cheng, Hai
    [J]. COMPUTER COMMUNICATIONS, 2024, 219 : 29 - 41
  • [3] An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications
    Ren, Jian
    Harn, Lein
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (03) : 1018 - 1025
  • [4] Anonymous and Efficient Authentication Scheme for Privacy-Preserving Distributed Learning
    Jiang, Yili
    Zhang, Kuan
    Qian, Yi
    Zhou, Liang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2227 - 2240
  • [5] A secure and privacy-preserving key agreement and mutual authentication scheme
    Li, Hui
    Jing, Tao
    Qian, Jin
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2020, 34 (04) : 201 - 213
  • [6] A Privacy-Preserving Authentication and Key Agreement Scheme with Deniability for IoT
    Zhou, Yousheng
    Liu, Tong
    Tang, Fei
    Wang, Feng
    Tinashe, Magara
    [J]. ELECTRONICS, 2019, 8 (04):
  • [7] Anonymous and Efficient Authentication Scheme for Privacy-Preserving Federated Cross Learning
    Li, Zeshuai
    Liang, Xiaoyan
    [J]. ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IX, ICIC 2024, 2024, 14870 : 281 - 293
  • [8] An improved efficient anonymous authentication with conditional privacy-preserving scheme for VANETs
    Cahyadi, Eko Fajar
    Hwang, Min-Shiang
    [J]. PLOS ONE, 2021, 16 (09):
  • [9] An efficient and privacy-preserving mutual authentication with key agreement scheme for telecare medicine information system
    Chen, Yulei
    Chen, Jianhua
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (01) : 516 - 528
  • [10] An efficient and privacy-preserving mutual authentication with key agreement scheme for telecare medicine information system
    Yulei Chen
    Jianhua Chen
    [J]. Peer-to-Peer Networking and Applications, 2022, 15 : 516 - 528