E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT

被引:82
|
作者
Zeng, Xianjiao [1 ]
Xu, Guangquan [1 ]
Zheng, Xi [2 ]
Xiang, Yang [3 ]
Zhou, Wanlei [4 ]
机构
[1] Tianjin Univ, Tianjin Key Lab Adv Networking, Sch Comp Sci & Technol, Tianjin 300350, Peoples R China
[2] Macquarie Univ, Dept Comp, Sydney, NSW 2109, Australia
[3] Swinburne Univ Technol, Sch Software & Elect Engn, Hawthorn, Vic 3122, Australia
[4] Deakin Univ, Sch IT, Melbourne, Vic 3125, Australia
基金
美国国家科学基金会;
关键词
Anonymous user authentication (AUA); dual messages mechanism; innovative cryptographic scheme; mobile Internet of Things (IoT); multiserver architectures; online/offline respective-processing mechanism; KEY AGREEMENT PROTOCOL; CERTIFIED PUBLIC KEYS; SCHEME; ATTACKS;
D O I
10.1109/JIOT.2018.2847447
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of the mobile Internet of Things (IoT) has made our lives smarter, relying on its various mobile IoT devices and services provided. However, with the explosively emerging mobile IoT services, malicious attackers can access them in an unauthorized way. In this paper, we designed an Efficient Anonymous User Authentication (E-AUA) protocol between the users and servers based on multiserver architectures, which contain multiple servers to address the problem of network congestion in mobile IoT. Furthermore, the E-AUA protocol was designed with a dual messages mechanism with strong anti-attack ability, lower communication and computation costs. Comparing with the state of the art protocols, our E-AUA protocol reduced both communication and computation costs. We also provided a security analysis to demonstrate that our E-AUA protocol is secure and meets a variety of security requirements in a motivated mobile IoT scenario.
引用
收藏
页码:1506 / 1519
页数:14
相关论文
共 50 条
  • [41] Computationally efficient and secure anonymous authentication scheme for IoT-based mobile pay-TV systems
    Kumaravelu, Ramesh
    Sadaiyandi, Rajakumar
    Selvaraj, Anandamurugan
    Selvaraj, Jeeva
    Karthick, Gayathiri
    [J]. COMPUTATIONAL INTELLIGENCE, 2020, 36 (03) : 994 - 1009
  • [42] Anonymous authentication for mobile Single Sign-On to protect user privacy
    Elmufti, Kalid
    Weerasinghe, Dasun
    Rajarajan, Muttukrishnan
    Rakocevic, Veselin
    [J]. INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2008, 6 (06) : 760 - 769
  • [43] A secure and efficient authentication protocol for anonymous channel in wireless communications
    Yang, CC
    Tang, YL
    Wang, RC
    Yang, HW
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1431 - 1439
  • [44] An efficient anonymous authentication protocol using batch operations for VANETs
    Liu, Yawei
    He, Zongjian
    Zhao, Shengjie
    Wang, Liangmin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (24) : 17689 - 17709
  • [45] A Secure and Efficient ECC-Based Anonymous Authentication Protocol
    Wang, Feifei
    Xu, Guoai
    Gu, Lize
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [46] Anonymous Authentication Protocol for Efficient Communications in Vehicle to Grid Networks
    Belkaaloul, Abdallah
    Bensaber, Boucif Amar
    [J]. 26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,
  • [47] An efficient anonymous authentication protocol using batch operations for VANETs
    Yawei Liu
    Zongjian He
    Shengjie Zhao
    Liangmin Wang
    [J]. Multimedia Tools and Applications, 2016, 75 : 17689 - 17709
  • [48] Secure and Efficient Anonymous Authentication Protocol for Global Roaming Services
    Roy, Prasanta Kumar
    Bhattacharya, Ansuman
    [J]. 2019 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2019, : 44 - 49
  • [49] Dynamic User Authentication Protocol for Industrial IoT without Timestamping
    Eldefrawy, Mohamed H.
    Ferrari, Nico
    Gidlund, Mikael
    [J]. 2019 15TH IEEE INTERNATIONAL WORKSHOP ON FACTORY COMMUNICATION SYSTEMS (WFCS), 2019,
  • [50] A hybrid user authentication protocol for mobile IPTV service
    Soo-Cheol Kim
    Sang-Soo Yeo
    Sung Kwon Kim
    [J]. Multimedia Tools and Applications, 2013, 65 : 283 - 296