Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns
by
Chen, Liangyin
, Hu, Shunfang
, Chen, Yanru
, Guo, Yanru
, Zhang, Yuanyuan
in
anonymity
/ Authentication
/ authentication and key agreement
/ Communication
/ Cryptography
/ Data security
/ desynchronization
/ Internet of Things
/ Methods
/ periodic update pattern
/ Privacy
/ Protocol
/ Remote control
/ remote control pattern
/ Sensors
/ traffic pattern
2025
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns
by
Chen, Liangyin
, Hu, Shunfang
, Chen, Yanru
, Guo, Yanru
, Zhang, Yuanyuan
in
anonymity
/ Authentication
/ authentication and key agreement
/ Communication
/ Cryptography
/ Data security
/ desynchronization
/ Internet of Things
/ Methods
/ periodic update pattern
/ Privacy
/ Protocol
/ Remote control
/ remote control pattern
/ Sensors
/ traffic pattern
2025
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns
by
Chen, Liangyin
, Hu, Shunfang
, Chen, Yanru
, Guo, Yanru
, Zhang, Yuanyuan
in
anonymity
/ Authentication
/ authentication and key agreement
/ Communication
/ Cryptography
/ Data security
/ desynchronization
/ Internet of Things
/ Methods
/ periodic update pattern
/ Privacy
/ Protocol
/ Remote control
/ remote control pattern
/ Sensors
/ traffic pattern
2025
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns
Journal Article
Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns
2025
Request Book From Autostore
and Choose the Collection Method
Overview
IoT-based applications require effective anonymous authentication and key agreement (AKA) protocols to secure data and protect user privacy due to open communication channels and sensitive data. While AKA protocols for these applications have been extensively studied, achieving anonymity remains a challenge. AKA schemes using one-time pseudonyms face resynchronization issues after desynchronization attacks, and the high computational overhead of bilinear pairing and public key encryption limits its applicability. Existing schemes also lack essential security features, causing issues such as vulnerability to ephemeral secret leakage attacks and key compromise impersonation. To address these issues, we propose two novel AKA schemes, PUAKA and RCAKA, designed for different IoT traffic patterns. PUAKA improves end device anonymity in the periodic update pattern by updating one-time pseudonyms with authenticated session keys. RCAKA, for the remote control pattern, ensures anonymity while reducing communication and computation costs using shared signatures and temporary random numbers. A key contribution of RCAKA is its ability to resynchronize end devices with incomplete data in the periodic update pattern, supporting continued authentication. Both protocols’ security is proven under the Real-or-Random model. The performance comparison results show that the proposed protocols exceed existing solutions in security features and communication costs while reducing computational overhead by 32% to 50%.
Publisher
MDPI AG,MDPI
MBRLCatalogueRelatedBooks
Related Items
Related Items
This website uses cookies to ensure you get the best experience on our website.