An Unlinkable Authentication Scheme for Distributed IoT Application
The Internet of Things (IoT) is an enormous ubiquitous-network, which connects the objects through various sensors. The IoT technology promotes the interconnection and fusion between the physical world and information space, and it facilitates the day-to-day life of people. However, since a lot of e...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8620304/ |
id |
doaj-aa22eb9f3e0546df887931793358fe4b |
---|---|
record_format |
Article |
spelling |
doaj-aa22eb9f3e0546df887931793358fe4b2021-03-29T22:35:38ZengIEEEIEEE Access2169-35362019-01-017147571476610.1109/ACCESS.2019.28939188620304An Unlinkable Authentication Scheme for Distributed IoT ApplicationYousheng Zhou0https://orcid.org/0000-0003-4116-6608Tong Liu1https://orcid.org/0000-0002-1746-8262Fei Tang2Magara Tinashe3College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing, ChinaCollege of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing, ChinaCollege of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing, ChinaCollege of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing, ChinaThe Internet of Things (IoT) is an enormous ubiquitous-network, which connects the objects through various sensors. The IoT technology promotes the interconnection and fusion between the physical world and information space, and it facilitates the day-to-day life of people. However, since a lot of equipped sensors are unattended and open, the IoT must face and overcome the main problems of security and privacy. Authentication is one of the paramount security concerns in the IoT environment, in which a user could directly access data from the sensors. Therefore, we propose an authentication and key agreement scheme providing unlinkability for the IoT environment based on bilinear pairings. The formal security proof demonstrates that the proposed protocol is unforgeable under the adaptively chosen message attack, and the session key exchange is semantic secure under the eCK model. In addition, the computation and communication costs of the proposed scheme are evaluated and compared with some existing similar schemes, which exhibits that it pleasantly addresses the needs of the IoT as far as security properties and computation expenses.https://ieeexplore.ieee.org/document/8620304/AuthenticationIoTprivacy-preservingsecurity |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Yousheng Zhou Tong Liu Fei Tang Magara Tinashe |
spellingShingle |
Yousheng Zhou Tong Liu Fei Tang Magara Tinashe An Unlinkable Authentication Scheme for Distributed IoT Application IEEE Access Authentication IoT privacy-preserving security |
author_facet |
Yousheng Zhou Tong Liu Fei Tang Magara Tinashe |
author_sort |
Yousheng Zhou |
title |
An Unlinkable Authentication Scheme for Distributed IoT Application |
title_short |
An Unlinkable Authentication Scheme for Distributed IoT Application |
title_full |
An Unlinkable Authentication Scheme for Distributed IoT Application |
title_fullStr |
An Unlinkable Authentication Scheme for Distributed IoT Application |
title_full_unstemmed |
An Unlinkable Authentication Scheme for Distributed IoT Application |
title_sort |
unlinkable authentication scheme for distributed iot application |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2019-01-01 |
description |
The Internet of Things (IoT) is an enormous ubiquitous-network, which connects the objects through various sensors. The IoT technology promotes the interconnection and fusion between the physical world and information space, and it facilitates the day-to-day life of people. However, since a lot of equipped sensors are unattended and open, the IoT must face and overcome the main problems of security and privacy. Authentication is one of the paramount security concerns in the IoT environment, in which a user could directly access data from the sensors. Therefore, we propose an authentication and key agreement scheme providing unlinkability for the IoT environment based on bilinear pairings. The formal security proof demonstrates that the proposed protocol is unforgeable under the adaptively chosen message attack, and the session key exchange is semantic secure under the eCK model. In addition, the computation and communication costs of the proposed scheme are evaluated and compared with some existing similar schemes, which exhibits that it pleasantly addresses the needs of the IoT as far as security properties and computation expenses. |
topic |
Authentication IoT privacy-preserving security |
url |
https://ieeexplore.ieee.org/document/8620304/ |
work_keys_str_mv |
AT youshengzhou anunlinkableauthenticationschemefordistributediotapplication AT tongliu anunlinkableauthenticationschemefordistributediotapplication AT feitang anunlinkableauthenticationschemefordistributediotapplication AT magaratinashe anunlinkableauthenticationschemefordistributediotapplication AT youshengzhou unlinkableauthenticationschemefordistributediotapplication AT tongliu unlinkableauthenticationschemefordistributediotapplication AT feitang unlinkableauthenticationschemefordistributediotapplication AT magaratinashe unlinkableauthenticationschemefordistributediotapplication |
_version_ |
1724191303413006336 |