Efficient Authentication and Key Agreement Protocol with Anonymity for Delay Tolerant Networks

被引:0
|
作者
Yan Ding
Xian-wei Zhou
Zhi-mi Cheng
Wen-lu Zeng
机构
[1] University of Science and Technology Beijing,Department of Communication Engineering, School of Computer and Communication Engineering
来源
关键词
DTNs; Authentication; Key agreement; Anonymity;
D O I
暂无
中图分类号
学科分类号
摘要
Most of the existing authentication and key agreement protocols for delay tolerant networks are not designed for protecting privacy. In this paper, an authentication and key agreement protocol with anonymity based on combined public key is proposed. The proposed protocol eliminates the need of public key digital certificate on-line retrieval, so that any on-line trusted third party is no longer required, only needs an off-line public information repository and key generation center; and realizes mutual authentication and key agreement with anonymity between two entities. We show that the proposed protocol is secure for all probabilistic polynomial-time attackers, and achieves good security properties, including authentication, anonymity, and confidentiality and so on.
引用
收藏
页码:1473 / 1485
页数:12
相关论文
共 50 条
  • [21] Anonymous Authentication and Key Agreement Protocol for LTE Networks
    Fan, Chun-, I
    Tseng, Yi-Fan
    Cheng, Chen-Hsi
    Kuo, Hsin-Nan
    Huang, Jheng-Jia
    Shih, Yu-Tse
    [J]. PROCEEDINGS OF 2019 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION ENGINEERING AND TECHNOLOGY (ICCET 2019), 2019, : 68 - 71
  • [22] SAK-AKA: A Secure Anonymity Key of Authentication and Key Agreement protocol for LTE network
    Nashwan, Shadi
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2017, 14 (05) : 790 - 801
  • [23] ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks
    Neetesh Saxena
    Jaya Thomas
    Narendra S. Chaudhari
    [J]. Wireless Personal Communications, 2015, 84 : 1981 - 2012
  • [24] ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks
    Saxena, Neetesh
    Thomas, Jaya
    Chaudhari, Narendra S.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (03) : 1981 - 2012
  • [25] Efficient authentication protocol with anonymity and key protection for mobile Internet users
    Jiang, Yan
    Zhu, Youwen
    Wang, Jian
    Xiang, Yong
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 137 : 179 - 191
  • [26] Provably secure and efficient identification and key agreement protocol with user anonymity
    Wang, Ren-Chiun
    Juang, Wen-Shenq
    Lei, Chin-Laung
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2011, 77 (04) : 790 - 798
  • [27] An efficient anonymous authentication mechanism for delay tolerant networks
    Su, Renwang
    Cao, Zhenfu
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (03) : 435 - 441
  • [28] A Key Agreement Protocol Providing User Anonymity in Wireless Sensor Networks
    Choi, Gun-Wook
    Lee, Im-Yeong
    [J]. ADVANCED SCIENCE LETTERS, 2017, 23 (10) : 10431 - 10435
  • [29] An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks
    Gope, Prosanta
    Hwang, Tzonelih
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 62 : 1 - 8
  • [30] An Efficient Authentication Key Agreement Protocol with Provable Security for VANET
    Qiao, Zi-Rui
    Yang, Qi-Liang
    Zhou, Yan-Wei
    Yang, Bo
    Gu, Chun-Xiang
    Zhang, Ming-Wu
    Xia, Zhe
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (05): : 929 - 944