A novel privacy preserving authentication and access control scheme for pervasive computing environments

Cited 75 time in webofscience Cited 111 time in scopus
  • Hit : 481
  • Download : 520
DC FieldValueLanguage
dc.contributor.authorRen, Kko
dc.contributor.authorLou, WJko
dc.contributor.authorKim, Kwangjoko
dc.contributor.authorDeng, Rko
dc.date.accessioned2010-04-21T02:47:09Z-
dc.date.available2010-04-21T02:47:09Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2006-07-
dc.identifier.citationIEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.55, pp.1373 - 1384-
dc.identifier.issn0018-9545-
dc.identifier.urihttp://hdl.handle.net/10203/17856-
dc.description.abstractPrivacy and security are two important but seemingly contradictory objectives in a pervasive computing environment (PCE). On one hand, service providers want to authenticate legitimate users and make sure they are accessing their authorized services in a legal way. On the other hand, users want to maintain the necessary privacy without being tracked down for wherever they are and whatever they are doing. In this paper, a novel privacy preserving authentication and access control scheme to secure the interactions between mobile users and services in PCEs is proposed. The proposed scheme seamlessly integrates two underlying cryptographic primitives, namely blind signature and hash chain, into a highly flexible and lightweight authentication and key establishment protocol. The scheme provides explicit mutual authentication between a user and a service while allowing the user to anonymously interact with the service. Differentiated service access control is also enabled in the proposed scheme by classifying mobile users into different service groups. The correctness of the proposed authentication and key establishment protocol is formally verified based on Burrows-Abadi-Needham logic.-
dc.languageEnglish-
dc.language.isoen_USen
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleA novel privacy preserving authentication and access control scheme for pervasive computing environments-
dc.typeArticle-
dc.identifier.wosid000239264300026-
dc.identifier.scopusid2-s2.0-33746373934-
dc.type.rimsART-
dc.citation.volume55-
dc.citation.beginningpage1373-
dc.citation.endingpage1384-
dc.citation.publicationnameIEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY-
dc.identifier.doi10.1109/TVT.2006.877704-
dc.contributor.localauthorKim, Kwangjo-
dc.contributor.nonIdAuthorRen, K-
dc.contributor.nonIdAuthorLou, WJ-
dc.contributor.nonIdAuthorDeng, R-
dc.type.journalArticleArticle-
dc.subject.keywordAuthoraccess control-
dc.subject.keywordAuthorauthentication-
dc.subject.keywordAuthorpervasive computing environments (PCEs)-
dc.subject.keywordAuthorsecurity-
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 75 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0