Secure and Efficient Biometric-Based Anonymous Authentication Scheme for Mobile-Edge Computing

被引:3
作者
Zhu, Qiang [1 ]
You, Lin [1 ]
Hu, Gengran [1 ]
Wang, Shengguo [2 ]
机构
[1] Hangzhou Dianzi Univ, Sch Cyberspace Secur, Hangzhou 310018, Peoples R China
[2] Hangzhou Hikvis Digital Technol Co Ltd, Hardware R&D Ctr, Hangzhou 310050, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 20期
基金
中国国家自然科学基金;
关键词
Biometrics (access control); Authentication; Security; Multi-access edge computing; Encryption; Regulators; Registers; Anonymity; authentication; biometric; mobile-edge computing; privacy-preserving; revocability; traceability; PROTOCOL; PUF; MECHANISM;
D O I
10.1109/JIOT.2024.3429397
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, the biometric-based authentication schemes have been widely deployed in the mobile edge computing environment to ensure the authenticity of the edge nodes' identities. While some solutions for the mobile edge computing adopting a tripartite architecture employ anonymous authentication to protect the edge nodes' sensitive biometric data and transaction information, these solutions come with their own set of challenges. Specifically, the service provider is unable to hold the edge nodes accountable for any violation committed during the transactions. Moreover, the edge nodes are unable to revoke their identity information stored in the registration center. To address these issues, in this work, we introduce a secure and efficient biometric-based anonymous authentication scheme for the mobile edge computing. Our approach utilizes noninteractive zero-knowledge (NIZK) arguments and linear encryption to achieve anonymity and traceability of the edge nodes' identities, while also using accumulators to implement the revocability of the edge nodes' identities, ensuring that the edge nodes with revoked identities cannot pass the verification of the service provider. Additionally, we design an efficient batch verification protocol to handle anonymous authentication messages for the large-scale edge nodes. The feasibility of the proposed scheme could be proven positively by both of the experimental results and the security analysis. The experimental results show that our approach requires up to 418 ms to create an anonymous identity and 16.2 ms to verify it. The time consumption for batch verification of the anonymous identities of the 1200 edge nodes is only 54.4 ms.
引用
收藏
页码:33604 / 33623
页数:20
相关论文
共 68 条
[1]  
Abduljabbar Zaid Ameen, 2022, Future Access Enablers for Ubiquitous and Intelligent Infrastructures: 6th EAI International Conference, FABULOUS 2022, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (445), P16, DOI 10.1007/978-3-031-15101-9_2
[2]   PUF-Based Privacy-Preserving Simultaneous Authentication Among Multiple Vehicles in VANET [J].
Awais, Syed Muhammad ;
Yucheng, Wu ;
Mahmood, Khalid ;
Akram, Muhammad Wahid ;
Hussain, Shafiq ;
Das, Ashok Kumar ;
Park, Youngho .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (05) :6727-6739
[3]  
Baritel-Ruet C., 2020, Formal security proofs of cryptographic standards: A necessity achieved using EasyCrypt
[4]  
Blanchet B., 2016, Found. Trends Priv. Secur., V1, P1, DOI DOI 10.1561/3300000004
[5]   Short group signatures [J].
Boneh, D ;
Boyen, X ;
Shacham, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 :41-55
[6]   Efficient Revocable Anonymous Authentication Mechanism for Edge Intelligent Controllers [J].
Cao, Zhong ;
Chen, Zhuo ;
Shang, Wenli ;
Zhu, Yongdong .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (12) :10357-10367
[7]   A Full Lifecycle Authentication Scheme for Large-Scale Smart IoT Applications [J].
Chen, Fei ;
Xiao, Zixing ;
Xiang, Tao ;
Fan, Junfeng ;
Truong, Hong-Linh .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) :2221-2237
[8]   Secure Sketch and Fuzzy Extractor with Imperfect Randomness: An Information-Theoretic Study [J].
Chen, Kaini ;
Shen, Peisong ;
Lv, Kewei ;
Chen, Chi .
INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2022, 2022, 13407 :128-147
[9]   Efficient Anonymous Authentication and Privacy-Preserving Reliability Evaluation for Mobile Crowdsensing in Vehicular Networks [J].
Cheng, Yudan ;
Ma, Jianfeng ;
Liu, Zhiquan ;
Wang, Libo ;
Ying, Zuobin ;
Chen, Xin .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (17) :14925-14939
[10]   ScPUAK: Smart card-based secure Protocol for remote User Authentication and Key agreement [J].
Cherbal, Sarra ;
Benchetioui, Rania .
COMPUTERS & ELECTRICAL ENGINEERING, 2023, 109