Efficient Authentication and Key Agreement Protocol with Anonymity for Delay Tolerant Networks

被引:0
|
作者
Yan Ding
Xian-wei Zhou
Zhi-mi Cheng
Wen-lu Zeng
机构
[1] University of Science and Technology Beijing,Department of Communication Engineering, School of Computer and Communication Engineering
来源
关键词
DTNs; Authentication; Key agreement; Anonymity;
D O I
暂无
中图分类号
学科分类号
摘要
Most of the existing authentication and key agreement protocols for delay tolerant networks are not designed for protecting privacy. In this paper, an authentication and key agreement protocol with anonymity based on combined public key is proposed. The proposed protocol eliminates the need of public key digital certificate on-line retrieval, so that any on-line trusted third party is no longer required, only needs an off-line public information repository and key generation center; and realizes mutual authentication and key agreement with anonymity between two entities. We show that the proposed protocol is secure for all probabilistic polynomial-time attackers, and achieves good security properties, including authentication, anonymity, and confidentiality and so on.
引用
收藏
页码:1473 / 1485
页数:12
相关论文
共 50 条
  • [1] Efficient Authentication and Key Agreement Protocol with Anonymity for Delay Tolerant Networks
    Ding, Yan
    Zhou, Xian-wei
    Cheng, Zhi-mi
    Zeng, Wen-lu
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2013, 70 (04) : 1473 - 1485
  • [2] An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
    Xu, Jing
    Zhu, Wen-Tao
    Feng, Deng-Guo
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 319 - 325
  • [3] A lightweight authentication and key agreement protocol preserving user anonymity
    Morteza Nikooghadam
    Reza Jahantigh
    Hamed Arshad
    [J]. Multimedia Tools and Applications, 2017, 76 : 13401 - 13423
  • [4] A lightweight authentication and key agreement protocol preserving user anonymity
    Nikooghadam, Morteza
    Jahantigh, Reza
    Arshad, Hamed
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (11) : 13401 - 13423
  • [5] An efficient key agreement protocol for secure authentication
    Kim, YS
    Huh, EN
    Hwang, J
    Lee, BW
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 746 - 754
  • [6] A Robust User Authentication Protocol with Anonymity, Deniability, Key Agreement and Efficiency
    Hsu, Chien-Lung
    Chuang, Yu-Hao
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (01): : 127 - 132
  • [7] Identity-based Remote Authentication and Key Agreement Protocol with Anonymity
    Zhang Jianjun
    Wu Qiwu
    [J]. PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 14 - 17
  • [8] An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    [J]. SENSORS, 2016, 16 (06)
  • [9] EFFICIENT MUTUAL AUTHENTICATION AND KEY AGREEMENT WITH USER ANONYMITY FOR ROAMING SERVICES IN GLOBAL MOBILITY NETWORKS
    Chuang, Yun-Hsin
    Tseng, Yuh-Min
    Lei, Chin-Laung
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (09): : 6415 - 6427
  • [10] An Efficient Authentication Protocol with User Anonymity for Mobile Networks
    Li, Huixian
    Yang, Yafang
    Pang, Liaojun
    [J]. 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1842 - 1847