Anonymous Authentication Scheme for Intercommunication in the Internet of Things Environments

被引:6
作者
Chung, Youngseok [1 ,2 ]
Choi, Seokjin [1 ]
Won, Dongho [2 ]
机构
[1] Elect & Telecommun Res Inst, Taejon 305390, South Korea
[2] Sungkyunkwan Univ, Suwon 440746, South Korea
来源
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | 2015年
关键词
ROAMING SERVICE; ACCESS-CONTROL;
D O I
10.1155/2015/305785
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication and privacy protection are important security mechanisms for keeping things safe in the Internet of Things environments. In particular, an anonymous authentication scheme is a privacy preserving authentication technique which provides both authentication and privacy preservation. An authentication scheme with anonymity in mobility networks was proposed recently. However, it was proven that it failed to provide anonymity against passive adversaries and malicious users and security against known session key attacks and side channel attacks. We propose an anonymous authentication scheme for intercommunication between the things in the Internet of Things environments. The proposed scheme provides not only anonymity and security, but also untraceability for the thing. Moreover, we only use low cost functions, such as hash functions and exclusive-OR operations in consideration of limited computing power of the thing.
引用
收藏
页数:13
相关论文
共 22 条
[1]   Anonymous authentication for privacy-preserving IoT target-driven applications [J].
Alcaide, Almudena ;
Palomar, Esther ;
Montero-Castillo, Jose ;
Ribagorda, Arturo .
COMPUTERS & SECURITY, 2013, 37 :111-123
[2]  
[Anonymous], 2012, Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on, DOI DOI 10.1109/ICDCSW.2012.23
[3]   Enhanced authentication scheme with anonymity for roaming service in global mobility networks [J].
Chang, Chin-Chen ;
Lee, Chia-Yin ;
Chi, Yen-Chang .
COMPUTER COMMUNICATIONS, 2009, 32 (04) :611-618
[4]   Lightweight and provably secure user authentication with anonymity for the global mobility network [J].
Chen, Chun ;
He, Daojing ;
Chan, Sammy ;
Bu, Jiajun ;
Gao, Yi ;
Fan, Rong .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (03) :347-362
[5]  
Chin-Chen Chang, 2009, Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IIH-MSP 2009, P902, DOI 10.1109/IIH-MSP.2009.172
[6]   An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments [J].
Jeon, Woongryul ;
Kim, Jeeyeon ;
Nam, Junghyun ;
Lee, Youngsook ;
Won, Dongho .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2012, E95B (07) :2505-2508
[7]   Anonymous authentication with unlinkability for wireless environments [J].
Kun, Li ;
Anna, Xiu ;
Fei, He ;
Lee, Dong Hoon .
IEICE ELECTRONICS EXPRESS, 2011, 8 (08) :536-541
[8]   Security enhancement on a new authentication scheme with anonymity for wireless environments [J].
Lee, Cheng-Chi ;
Hwang, Min-Shiang ;
Liao, I-En .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2006, 53 (05) :1683-1687
[9]   Security Flaw of Authentication Scheme with Anonymity for Wireless Communications [J].
Lee, Ji-Seon ;
Chang, Jik Hyun ;
Lee, Dong Hoon .
IEEE COMMUNICATIONS LETTERS, 2009, 13 (05) :292-293
[10]   User authentication scheme with anonymity, unlinkability and untrackability for global mobility networks [J].
Lee, Tian-Fu .
SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (11) :1404-1413