E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT

被引:87
作者
Zeng, Xianjiao [1 ]
Xu, Guangquan [1 ]
Zheng, Xi [2 ]
Xiang, Yang [3 ]
Zhou, Wanlei [4 ]
机构
[1] Tianjin Univ, Tianjin Key Lab Adv Networking, Sch Comp Sci & Technol, Tianjin 300350, Peoples R China
[2] Macquarie Univ, Dept Comp, Sydney, NSW 2109, Australia
[3] Swinburne Univ Technol, Sch Software & Elect Engn, Hawthorn, Vic 3122, Australia
[4] Deakin Univ, Sch IT, Melbourne, Vic 3125, Australia
基金
美国国家科学基金会;
关键词
Anonymous user authentication (AUA); dual messages mechanism; innovative cryptographic scheme; mobile Internet of Things (IoT); multiserver architectures; online/offline respective-processing mechanism; KEY AGREEMENT PROTOCOL; CERTIFIED PUBLIC KEYS; SCHEME; ATTACKS;
D O I
10.1109/JIOT.2018.2847447
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of the mobile Internet of Things (IoT) has made our lives smarter, relying on its various mobile IoT devices and services provided. However, with the explosively emerging mobile IoT services, malicious attackers can access them in an unauthorized way. In this paper, we designed an Efficient Anonymous User Authentication (E-AUA) protocol between the users and servers based on multiserver architectures, which contain multiple servers to address the problem of network congestion in mobile IoT. Furthermore, the E-AUA protocol was designed with a dual messages mechanism with strong anti-attack ability, lower communication and computation costs. Comparing with the state of the art protocols, our E-AUA protocol reduced both communication and computation costs. We also provided a security analysis to demonstrate that our E-AUA protocol is secure and meets a variety of security requirements in a motivated mobile IoT scenario.
引用
收藏
页码:1506 / 1519
页数:14
相关论文
共 31 条
[1]   On the Efficiency of Revocation in RSA-Based Anonymous Systems [J].
Fueyo, Maria ;
Herranz, Javier .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) :1782-1790
[2]   Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures [J].
He, Debiao ;
Zeadally, Sherali ;
Kumar, Neeraj ;
Wu, Wei .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (09) :2052-2064
[3]   Robust Biometrics-Based Authentication Scheme for Multiserver Environment [J].
He, Debiao ;
Wang, Ding .
IEEE SYSTEMS JOURNAL, 2015, 9 (03) :816-823
[4]   An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures [J].
Hsieh, Wen-Bin ;
Leu, Jenq-Shiou .
JOURNAL OF SUPERCOMPUTING, 2014, 70 (01) :133-148
[5]   Surpass: System-initiated User-replaceable Passwords [J].
Huh, Jun Ho ;
Oh, Seongyeol ;
Kim, Hyoungshick ;
Beznosov, Konstantin ;
Mohan, Apurva ;
Rajagopalan, S. Raj .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :170-181
[6]   Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies [J].
Jiang, Jiaojiao ;
Wen, Sheng ;
Yu, Shui ;
Xiang, Yang ;
Zhou, Wanlei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (01) :465-481
[7]   An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs [J].
Jiang, Shunrong ;
Zhu, Xiaoyan ;
Wang, Liangmin .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2016, 17 (08) :2193-2204
[8]   Identity-based online/offline signcryption for low power devices [J].
Li, Fagen ;
Khan, Muhammad Khurram ;
Alghathbar, Khaled ;
Takagi, Tsuyoshi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (01) :340-347
[9]   A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients [J].
Liao, Yi-Pin ;
Hsiao, Chih-Ming .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (03) :886-900
[10]   Network Localization and Synchronization Using Full-Duplex Radios [J].
Liu, Yan ;
Shen, Yuan ;
Guo, Dongning ;
Win, Moe Z. .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2018, 66 (03) :714-728