Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT

被引:1
|
作者
Li, Hongjun [1 ,2 ]
Kong, Fanyu [1 ]
Yu, Jia [2 ]
Zhang, Hanlin [2 ]
Diao, Luhong [3 ]
Tao, Yunting [1 ]
机构
[1] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[2] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[3] Beijing Univ Technol, Coll Math, Fac Sci, Beijing 100022, Peoples R China
基金
中国国家自然科学基金;
关键词
IoT; edge computing; secure outsourcing computation; authentication protocol; privacy-preserving; SECURE; ALGORITHMS; EFFICIENT;
D O I
10.1109/TrustCom56396.2022.00082
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of Internet of Things (IoT) and 5G, privacy-preserving message transmission and authentication have become an indispensable part in the field of data collection and analysis. There exist many protocols based on the public key cryptosystem, which allow the users to utilize their own identity as the public key to carry out data encryption and digital signature, which is very suitable for applying in the IoT environment with a large number of terminal devices. However, these protocols usually involve some complex cryptographic operations, which hinder their application on the resource-constrained IoT devices. In this paper, we design a privacy-preserving and verifiable outsourcing message transmission and authentication protocol, which allows the resource-constrained users to delegate some complex operations to the two untrusted edge servers and reduce the computational burden on the users side. The designed protocol contains several secure and novel outsourcing algorithms for modular exponentiation, bilinear pairing and scalar multiplication. For the different operations in the different situations, we design several different blinding techniques and verification methods, which not only protect the users' private information, but also ensure the users can verify the correctness of results. Finally, we carry out some experiments to show that our proposed protocol is efficient.
引用
收藏
页码:556 / 564
页数:9
相关论文
共 50 条
  • [21] PVOPM: Verifiable Privacy-Preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting
    Zhou, Jun
    Choo, Kim-Kwang Raymond
    Cao, Zhenfu
    Dong, Xiaolei
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (05) : 2253 - 2270
  • [22] SPRITE: A Scalable Privacy-Preserving and Verifiable Collaborative Learning for Industrial IoT
    Sengupta, Jayasree
    Ruj, Sushmita
    Das Bit, Sipra
    [J]. 2022 22ND IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2022), 2022, : 249 - 258
  • [23] Privacy-Preserving Universal Authentication Protocol for Wireless Communications
    He, Daojing
    Bu, Jiajun
    Chan, Sammy
    Chen, Chun
    Yin, Mingjian
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (02) : 431 - 436
  • [24] A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles
    Aman, Muhammad Naveed
    Javaid, Uzair
    Sikdar, Biplab
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (02) : 1123 - 1139
  • [25] Security of a Privacy-Preserving Biometric Authentication Protocol Revisited
    Abidin, Aysajan
    Matsuura, Kanta
    Mitrokotsa, Aikaterini
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 290 - +
  • [26] A Robust Conditional Privacy-Preserving Authentication Protocol in VANET
    Jung, Chae Duk
    Sur, Chul
    Park, Youngho
    Rhee, Kyung-Hyune
    [J]. SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 35 - +
  • [27] An IoT-Oriented Privacy-Preserving Fingerprint Authentication System
    Yin, Xuefei
    Wang, Song
    Shahzad, Muhammad
    Hu, Jiankun
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 9 (14): : 11760 - 11771
  • [28] A Privacy-Preserving Authentication Model Based on Anonymous Certificates in IoT
    Hamouid, Khaled
    Omar, Mawloud
    Adi, Kamel
    [J]. 12TH WIRELESS DAYS CONFERENCE (WD 2021), 2020,
  • [29] PRIVACY-PRESERVING AUTHENTICATION IN WIRELESS IOT: APPLICATIONS, APPROACHES, AND CHALLENGES
    Wang, Shujuan
    Wang, Jian
    Yu, Zhengtao
    [J]. IEEE WIRELESS COMMUNICATIONS, 2018, 25 (06) : 60 - 67
  • [30] Privacy-preserving authentication for general directed graphs in industrial IoT
    Zhu, Fei
    Wu, Wei
    Zhang, Yuexin
    Chen, Xiaofeng
    [J]. INFORMATION SCIENCES, 2019, 502 : 218 - 228