Conditional privacy-preserving authentication with access likability for roaming service over internet of things

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Today the mobile subscribers can access the internet service whenever they want or wherever they are because of the roaming service. The necessity of accessing pervasively for the developing paradigm of networking such as the Internet of Things (IoT) is accomplished through this facility. In order to provide universal roaming service which is secure and privacy preserving at the multilevel, this paper proposes a privacy-preserving validation which is conditional with access likability called CPAL for roaming service. By utilizing a method of group signature it provides linking function of an anonymous user. This method has the capability to keep the identity of the users concealed and makes the authorized bodies possible to connect all the access information of the same user even without knowing the user’s real identity. In order to connect the access information from the user for enhancing the service, the foreign operators who are authorized or the service providers particularly uses the master linking key possessed by the trust linking server. In order to examine user’s likings, the individual access information is used but user’s identity is not disclosed. Subscribers can further make use of this functionality to probe the service usage without being identified. The proposed method also has the efficiency to simultaneously revoke a group of users. Comprehensive analysis of CPAL demonstrates that it can withstand many security threats and more adjustable in privacy preservation as compared to the other techniques. Assessment of its performance further proves the efficiency of CPAL with regards to communication and computation overhead. Future work would include the extension of CPAL scheme to effectively withstand internal attackers and design the lightweight secure and privacy-preserving scheme that will support IoT devices of large group.


  • Keywords


    Conditional Privacy-Preserving, Internet of Things; Wireless Networks.

  • References


      [1] IEEE 802.16 Working Group. "Part 16: Air interface for fixed broad-band wireless access systems-Amendment 2: Medium access control modifications and additional physical layer specifications for 211 GHz." IEEE Std. 802.16 a (2003).

      [2] Alberti, Antonio M., Gabriel D. Scarpioni, Vaner J. Magalhaes, S. ArismarCerqueira, Joel JPC Rodrigues, and Rodrigo da R. Righi. "Advancing NovaGenesis Architecture towards Future Internet of Things." IEEE Internet of Things Journal (2017).

      [3] Lin, X., Sun, X., Ho, P. H., & Shen, X. (2007). GSIS: A secure and privacy-preserving protocol for vehicular communications. IEEE Transactions on vehicular technology, 56(6), 3442-3456.https://doi.org/10.1109/TVT.2007.906878.

      [4] Lu, Rongxing, Xiaodong Lin, Haojin Zhu, P-H. Ho, and Xuemin Shen. "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications." In INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, pp. 1229-1237. IEEE, 2008.

      [5] Broll, Gregor, Enrico Rukzio, Massimo Paolucci, Matthias Wagner, Albrecht Schmidt, and Heinrich Hussmann. "Perci: Pervasive service interaction with the internet of things." IEEE Internet Computing 13, no. 6 (2009): 74-81.https://doi.org/10.1109/MIC.2009.120.

      [6] Zorzi, Michele, Alexander Gluhak, Sebastian Lange, and Alessandro Bassi. "From today's intranet of things to a future internet of things: a wireless-and mobility-related view." IEEE Wireless Communications 17, no. 6 (2010).https://doi.org/10.1109/MWC.2010.5675777.

      [7] He, D., Chan, S., &Guizani, M. (2016). An Accountable, Privacy-Preserving, and Efficient Authentication Framework for Wireless Access Networks. IEEE Transactions on Vehicular Technology, 65(3), 1605-1614.https://doi.org/10.1109/TVT.2015.2406671.

      [8] Odelu, V., Das, A. K., &Goswami, A. (2016). SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms. IEEE Transactions on Consumer Electronics, 62(1), 30-38.https://doi.org/10.1109/TCE.2016.7448560.

      [9] Abdallah, Asmaa, and Xuemin Sherman Shen. "Lightweight Authentication and Privacy-Preserving Scheme for V2G Connections." IEEE Transactions on Vehicular Technology 66, no. 3 (2017): 2615-2629.https://doi.org/10.1109/TVT.2016.2577018.

      [10] Wang, Ding, Haibo Cheng, Debiao He, and Ping Wang. "On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices." IEEE Systems Journal (2016).https://doi.org/10.1109/JSYST.2016.2585681.

      [11] Rajput, Ubaidullah, Fizza Abbas, and Heekuck Oh. "A Hierarchical Privacy Preserving Pseudonymous Authentication Protocol for VANET." IEEE Access 4 (2016): 7770-7784.https://doi.org/10.1109/ACCESS.2016.2620999.

      [12] Malina, Lukas, Jan Hajny, and ZdenekMartinasek. "Privacy-preserving authentication systems using smart devices." In Telecommunications and Signal Processing (TSP), 2016 39th International Conference on, pp. 11-14. IEEE, 2016.https://doi.org/10.1109/TSP.2016.7760820.

      [13] Yang, X., Zhang, Y., Liu, J. K., & Zeng, Y. (2016, August). A Trust and Privacy Preserving Handover Authentication Protocol for Wireless Networks. In Trustcom/BigDataSE/ISPA, 2016 IEEE (pp. 138-143). IEEE.

      [14] Liu, Yanbing, Yuhang Wang, and Guanghui Chang. "Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm." IEEE Transactions on Intelligent Transportation Systems (2017).https://doi.org/10.1109/TITS.2017.2657649.

      [15] Zeng, Shengke, Shuangquan Tan, Yong Chen, Mingxing He, Meichen Xia, and Xiao Li. "Privacy-preserving location-based service based on deniable authentication." In Proceedings of the 9th International Conference on Utility and Cloud Computing, pp. 276-281. ACM, 2016.https://doi.org/10.1145/2996890.3007872.

      [16] Odelu, Vanga, Ashok Kumar Das, and AdrijitGoswami. "SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms." IEEE Transactions on Consumer Electronics 62, no. 1 (2016): 30-38.https://doi.org/10.1109/TCE.2016.7448560.

      [17] Atzori, Luigi, Antonio Iera, and Giacomo Morabito. "The internet of things: A survey." Computer networks 54, no. 15 (2010): 2787-2805.https://doi.org/10.1016/j.comnet.2010.05.010.

      [18] Taddia, Chiara, F. Marcheselli, and Gianluca Mazzini. "Architecture improvements for an efficient emergency network." In Software, Telecommunications and Computer Networks (SoftCOM), 2015 23rd International Conference on, pp. 259-263. IEEE, 2015.

      [19] Sesia, S., Baker, M., &Toufik, I. (2011). LTE-the UMTS long term evolution: from theory to practice. John Wiley & Sons.https://doi.org/10.1002/9780470978504.

      [20] Xu, Sugang, Noboru Yoshikane, Masaki Shiraiwa, TakehiroTsuritani, Hiroaki Harai, Yoshinari Awaji, and Naoya Wada. "Multi-vendor interconnection-based emergency optical networks design with optimal placement of portable EDFAs in disaster recovery." In Design of Reliable Communication Networks (DRCN), 2016 12th International Conference on the, pp. 55-61. IEEE, 2016.https://doi.org/10.1109/DRCN.2016.7470835.


 

View

Download

Article ID: 9731
 
DOI: 10.14419/ijet.v7i1.9.9731




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.