An Anonymous Authentication Protocol Based on Blind Signature for Internet of Things

被引:0
|
作者
Zhao, Yue [1 ]
Yang, Bin [2 ]
Yang, Yarang [3 ]
机构
[1] Sci & Technol Commun Secur Lab, Chengdu 610041, Peoples R China
[2] Chuzhou Univ, Sch Comp & Informat Engn, Chuzhou 239000, Peoples R China
[3] Kashi Univ, Coll Phys & Elect Engn, Kashi 84006, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things; anonymous authentication; blind signature; security analysis; performance evaluation;
D O I
10.1145/3651671.3651724
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes an anonymous authentication protocol based on blind signature for the Internet of Things (IoTs), which is proposed to provide protection for the identity information of the node while ensuring the legitimacy of the identity verification of the node in the IoTs. The arbitration mechanism is adopted to enhance the security of anonymous authentication to meet the requirements in terms of access authentication, node anonymity, and malicious node tracking, and so on. The threshold secret sharing algorithm and hash function are introduced to achieve anonymous authentication within and between autonomic systems, and meet the needs of the IoTs for low communication and computation overheads. The security analysis shows that the authentication protocol proposed in this paper has these good features: real-time tracking & revocation and anti-theft signature under the premise of satisfying the privacy information protection. The performance evaluation results show that compared with the existing anonymous authentication protocols, the proposed anonymous authentication protocol based on blind signature guarantees security and anonymity, while reducing the anonymous authentication time by 19.8% and ensuring the size of data packages less than 350KB.
引用
收藏
页码:73 / 79
页数:7
相关论文
共 50 条
  • [1] Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things
    Gong, Xiang
    Feng, Tao
    SENSORS, 2022, 22 (19)
  • [2] PAMI-Anonymous Password Authentication Protocol for Medical Internet of Things
    Zhou, Yousheng
    Luo, Yang
    Obaidat, Mohammad S.
    Vijayakumar, P.
    Wang, Xiaojun
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [3] An anonymous wireless authentication protocol based on proxy signature
    Jiang, Chunlin
    Jia, Weijia
    Gu, Ke
    Journal of Computational Information Systems, 2012, 8 (02): : 541 - 548
  • [4] Provably secure signature-based anonymous user authentication protocol in an Internet of Things-enabled intelligent precision agricultural environment
    Vangala, Anusha
    Das, Ashok Kumar
    Lee, Jong-Hyouk
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (16):
  • [5] ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of Things
    Li, Na
    Ma, Maode
    Wang, Hui
    SENSORS, 2024, 24 (04)
  • [6] A Lightweight Anonymous Authentication Protocol for Resource-Constrained Devices in Internet of Things
    Ding, Xuyang
    Wang, Xiaoxiang
    Xie, Ying
    Li, Fagen
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (03) : 1818 - 1829
  • [7] Improved blockchain-based user authentication protocol with ring signature for internet of medical things
    Priya, J. Chandra
    Praveen, R.
    Nivitha, K.
    Sudhakar, T.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (04) : 2415 - 2434
  • [8] Provably Secure Dynamic Anonymous Authentication Protocol for Wireless Sensor Networks in Internet of Things
    Ding, Zixuan
    Xie, Qi
    SUSTAINABILITY, 2023, 15 (07)
  • [9] AN EFFICIENT RFID ANONYMOUS BATCH AUTHENTICATION PROTOCOL BASED ON GROUP SIGNATURE
    Xu, Jie
    Dang, Lanjun
    DISCRETE AND CONTINUOUS DYNAMICAL SYSTEMS-SERIES S, 2019, 12 (4-5): : 1489 - 1500
  • [10] An novel anonymous user WSN authentication for Internet of Things
    Xin Zhang
    Fengtong Wen
    Soft Computing, 2019, 23 : 5683 - 5691