A Lightweight Anonymous Authentication Protocol Using k-pseudonym Set in Wireless Networks

被引:1
作者
Li Xinghua [1 ]
Liu Hai [1 ]
Wei Fushan [1 ]
Ma Jianfeng [1 ]
Yang Weidong [2 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[2] Henan Univ Technol, Coll Informat Sci & Engn, Zhengzhou 450001, Henan, Peoples R China
来源
2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2015年
关键词
anonymous authentication; the k-pseudonym set; Wireless networks; SCHEME;
D O I
10.1109/GLOCOM.2015.7417584
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, since people pay more and more attention to the protection of their privacy, anonymous authentication in wireless networks has become a hot topic. Currently, most anonymous authentication schemes are based on the asymmetric keys whose tedious computation leads to serious resource consumption, therefore, they are unsuitable for mobile devices with limited capacity. To solve this problem, by introducing the k-pseudonym set we propose an anonymous authentication protocol based on a shared secret key. In the authentication process, the user sends the k-pseudonym set which includes his real identity and other k - 1 pseudonyms. After the authentication server traversals the shared keys with each of the users in the set and verifies the authentication information, it can determine the real user and complete the authentication. In this methodology, the construction of the pseudonym set is a key issue, and we give two attack models and respectively present the construction methods of the k-pseudonym set under those two models. Compared with the existing schemes, our scheme outperforms them in the security and practicality. Especially, user untractability can be realized. A testbed is set up and extensive experiments are conducted, and the results show the authentication latency of our scheme is short and it changes a little with the increase of k.
引用
收藏
页数:6
相关论文
共 17 条
[1]  
Alwen J., 2014, International Association for Cryptologic Research Cryptology ePrint Archive, P73
[2]  
[Anonymous], J MED SYST
[3]   Constant-Size Dynamic k-Times Anonymous Authentication [J].
Au, Man Ho ;
Susilo, Willy ;
Mu, Yi ;
Chow, Sherman S. M. .
IEEE SYSTEMS JOURNAL, 2013, 7 (02) :249-261
[4]  
Chow CY, 2007, LECT NOTES COMPUT SC, V4605, P258
[5]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[6]  
Godor Gyozo, 2012, Information and Communication Technologies. Proceedings 18th EUNICE/IFIP WG 6.2, 6.6. International Conference, EUNICE 2012, P76, DOI 10.1007/978-3-642-32808-4_8
[7]   ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks [J].
Huang, Jiun-Long ;
Yeh, Lo-Yao ;
Chien, Hung-Yu .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2011, 60 (01) :248-262
[8]   Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems [J].
Jiang, Qi ;
Ma, Jianfeng ;
Lu, Xiang ;
Tian, Youliang .
JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (02)
[9]   Secure anonymous authentication scheme based on elliptic curve and zero-knowledge proof in VANET [J].
Li, Jin-Guo ;
Lin, Ya-Ping ;
Li, Rui ;
Zhou, Si-Wang .
Tongxin Xuebao/Journal on Communications, 2013, 34 (05) :52-61
[10]  
Mun H, 2010, P INT C INT TECHN SE, P1