Authentication and privacy protection are important security mechanisms for keeping things safe in the Internet of Things environments. In particular, an anonymous authentication scheme is a privacy preserving authentication technique which provides both authentication and privacy preservation. An authentication scheme with anonymity in mobility networks was proposed recently. However, it was proven that it failed to provide anonymity against passive adversaries and malicious users and security against known session key attacks and side channel attacks. We propose an anonymous authentication scheme for intercommunication between the things in the Internet of Things environments. The proposed scheme provides not only anonymity and security, but also untraceability for the thing. Moreover, we only use low cost functions, such as hash functions and exclusive-OR operations in consideration of limited computing power of the thing.
1. Introduction
As the Internet of Things (IoT) market is expanding recently, the importance of trustworthy IoT products and services is increasing. Zhang et al. [1] discussed IoT security issues just in time. To preserve IoT security, authentication and privacy preservation are some of the major mechanisms and a few authentication schemes in IoT are proposed [2, 3]. And improvements and drawbacks of those schemes are presented [4–6]. Since a lot of systems and things in IoT environments are connected to the Internet for intercommunication, apparently they can be exposed to hacker's attacks anytime and anywhere.
Systems of IoT infrastructure, such as a computer, a gateway, and a server system, have high computing power, enough memory, and wide communication bandwidth. On the contrary, things like a tag, a sensor, and a device deployed at the end of IoT environments have limited computing capacity and resource. Therefore, the convergence of symmetric and asymmetric cryptosystems and lightweight cryptographic protocols is necessary to guarantee the whole IoT security. Various things interconnected in IoT environments produce a lot of transmitting data. These data may contain user's behavior, taste, and preference as well as private information. Hence, an adversary can abuse user's information or do some damage through tapping, leaking, modifying, and destroying them. It is clear that privacy protection is one of the most important issues of IoT security. Because only human beings can have privacy, privacy preservation is not originally applied to things. However, things also need to have security measures to prevent privacy invasion in case they deal with human beings' information. For such a reason, anonymity and anonymous authentication are essential to preserve privacy and security of all objects in IoT environments.
Many anonymous authentication schemes in wireless environments, proofs of weaknesses, and countermeasures have been proposed [7–14]. Particularly, Chang et al. [15] proposed an efficient authentication scheme with anonymity for roaming service in global mobility networks. Since their scheme only uses low cost functions, such as hash functions and exclusive-OR operations, it is suitable for battery-powered mobile devices. However, Youn et al. [16] showed that Chang et al.'s scheme does not provide anonymity and security in certain situations. In other words, it fails to preserve anonymity against passive adversaries and malicious users as well as security against known session key attacks and side channel attacks. Since then, to make up the security faults proven by Youn et al., a few enhanced schemes have been proposed [17–19]. Also, anonymous authentication schemes with unlinkability that guarantee not to link one user and his/her messages have been followed [20–22].
In this paper, we suppose that IoT components are a thing, a gateway, and a registration server. The thing senses, handles, and transmits various information. All things need to be registered for the registration server before being deployed in IoT environments. The registration server keeps and manages the thing's identity. Also, it maintains a trustworthy relationship with the gateway to response to gateway's request for authenticating the thing. No one but the thing and the registration server can know the thing's identity because the thing certainly knows its identity and the registration server takes the thing's identity when the thing registers for it. The gateway authenticates the thing in relation to the registration server without knowing the thing's identity. And it makes the thing be able to communicate with other things through a secure way. The thing accomplishes mutual authentication and key agreement with the gateway through an anonymous authentication method when it connects to the gateway for the first time. At this time, the gateway which does not know the thing's identity can authenticate the thing with the aid of the registration server. Centering around one gateway, a number of things consist of their own domain. Things in the same domain can do anonymous authentication and session key sharing through the same gateway.
We propose a novel authentication scheme that guarantees anonymity, security, and untraceability in IoT environments by remedying the defects of Chang et al.'s scheme which are shown by Youn et al. The proposed scheme makes the things in IoT environments communicate with each other safely. Also, it only uses low cost functions to reduce computing loads of the thing's side as Chang et al.'s scheme does.
The remainder of this paper is organized as follows. We review the related works in Section 2 and present our scheme in Section 3. In Section 4, we analyze security of our scheme. Finally, a concluding remark is given in Section 5.
2. Related Works
In this section, we review Chang et al.'s scheme and Youn et al.'s analysis. Table 1 denotes notations in Chang et al.'s scheme.
Notations in Chang et al.'s scheme.
Notations
Descriptions
MN
Mobile user
HA
Home agent of a mobile user
FA
Foreign agent of a foreign network
Identity of an entity X
Password of an entity X
SID
Shadow identity
SK
Session key
x
Private key of HA
Common secret key shared between an entity X and an entity Y
Collision-free one-way hash function
∥
Concatenation
⊕
Exclusive-OR operation
2.1. Chang et al.'s Scheme
Chang et al.'s scheme consists of three phases: registration, authentication, and session key establishment. And three entities are involved: the mobile user , the foreign agent , and the home agent in each phase. Their assumption is that each and each share and store a long term session key using any secure method, such as the Diffie-Hellman key agreement protocol.
2.1.1. Registration Phase
In the registration phase, submits his/her identity and the selected password to . uses its private key x to compute the secret value R as follows:
Then issues a smart card containing and delivers it to in a secure way.
2.1.2. Authentication Phase
It is assumed that wants to take a roaming service from . Before providing services, tries to authenticate through . To achieve this, , , and perform the authentication phase as follows.
inserts his/her smart card into the device and enters a password .
Smart card generates a nonce randomly and computes the parameter C as shown in
sends the login message to . “” is the header of the message to establish a new secure session between and .
Upon receiving , stores and generates a random nonce to send the authentication request message to . The message header “” notifies to authenticate .
After receiving , checks to see whether a trustworthy relationship between and is built or not. If is valid, generates a nonce randomly and sends the message to .
Upon receiving , sends the message to .
After checking the identities and exchanging nonces between , , and , they accomplish the following steps for anonymous authentication.
who receives computes the shadow identity , the parameter , the session key , and the parameter sequentially such that
computes the following hashing value and sends the message to :
Upon receiving , checks and computes the following hashing value . And then it sends the message to :
After receiving , checks IDFA and firstly. And it checks the format of 's identity after computing as follows:
computes and as demonstrated in (7) to check whether is equal to . The equivalence between and implies that the selected in the registration phase is the same as the password that enters in the authentication phase:
computes the parameter after obtaining the session key from . And it computes the parameter and the hashing value to send the message to . , , , and are calculated such that
2.1.3. Session Key Establishment Phase
After completing the authentication phase, and continue the following session key establishment phase.
Upon receiving , obtains the following session key from after checking :
And it computes the parameter as follows to send the message to :
After receiving , computes the following and checks whether and are equal or not:
The fact that two values are equal means confirms as a valid foreign agent.
computes as follows: from to check the equivalence between and that computes in the authentication phase:
According to the sameness of two values, confirms that he/she shares the authenticated session key with .
Since then, and use when they want to communicate with one another through a secure channel.
Figure 1 describes the authentication and the session key establishment phases in Chang et al.'s scheme.
Authentication and session key establishment phases in Chang et al.'s scheme.
2.2. Youn et al.'s Analysis
Youn et al. proved that Chang et al.'s scheme suffers from some specific attacks. Their assumptions are as follows. Anyone can eavesdrop transmitting messages between , , and . And it is easy to perform a brute-force search of a valid identity since it is short and has a certain format. In addition, there exists an adversary who can execute side channel attacks.
2.2.1. Anonymity against Passive Adversaries
A passive adversary can obtain and by eavesdropping messages between , , and . The adversary chooses a candidate identity to compute and as follows:
If and are equal, the adversary can recognize that the candidate identity is the same as 's real identity. Therefore, the adversary can know 's identity.
2.2.2. Anonymity against Malicious Mobile User
It is supposed that is a malicious mobile user who has a valid smart card issued by . accomplishes the normal authentication phase with to get the nonce generated by . And then he/she computes using his/her identity as follows:
replaces included in the message between and with . Then who receives computes the following to send it to :
eavesdrops once again to compute using and . is calculated as follows:
Thus, a legal but malicious user can obtain other's identity.
2.2.3. Security against Known Session Key Attacks
An adversary can get a user's identity when a former session key shared between and is revealed. The adversary obtains by eavesdropping and computes the verification value using and a revealed such that
The adversary also computes another verification value after choosing a candidate identity in the following manner:
If equals , the adversary can ensure that the guessed identity and the 's real identity are consistent.
2.2.4. Security against Side Channel Attacks
Let us suppose that an adversary who can execute side channel attacks obtains a valid smart card issued by . The adversary can acquire from the smart card and take and from messages in the authentication phase. Then it is possible that the adversary discovers 's identity by computing as follows:
Hence, Chang et al.'s scheme can be totally broken by side channel attacks.
3. Proposed Scheme
To provide anonymity and security, the proposed scheme that improves Chang et al.'s scheme makes up for the weak points shown by Youn et al. Also, it guarantees untraceability for things by using different anonymized identities all the time. Since it minimizes the number of transmitting messages and computations, it is suitable for IoT environments. Figure 2 presents IoT network environments applied to our scheme. A registration server and a gateway accomplish mutual communication through the Internet while they preserve a trustworthy relationship. The registration server maintains secret information of things. The gateway forms its own domain to combine the things that existed in its permissible range. And it makes the things link up with their registration server. The things collect and produce various information and exchange data one another if necessary. Depending on the number of things in a domain, several base stations are required to provide stable communication channel. Base stations do not participate in the join phase directly. They just act as mediators between the things and the gateway. If the stability of communications channel is guaranteed, a lot of things can work in one domain. It is because the thing only computes low cost functions, while relatively high cost computations are up to the gateway. In other words, a domain can be expanded regardless of the number of things.
IoT network environments in the proposed scheme.
The proposed scheme consists of three phases: registration, join, and communication. In each phase, the thing T, the gateway G, and the registration server R are involved. We assume R and G share a common secret key using a secure method, such as the Diffie-Hellman key agreement protocol in advance. And let us suppose that a time synchronization is established between T, G, and R.
In the registration phase, T registers for R in a safe way. T registered for R normally joins G's domain in the join phase. In that phase, G can authenticate T through R. The things that successfully joined G's domain cannot trust each other yet, whereas they already build a trustworthy relationship with G through sharing of a common secret key. When the things want to communicate with each other safely, they carry out authentication and session key establishment processes through G. Table 2 indicates additional notations used in our scheme. We use notations in both Tables 1 and 2.
Additional notations in the proposed scheme.
Notations
Descriptions
T
Thing
R
Registration server
G
Gateway of a domain
Shadow identity of an entity X
Virtual identity of an entity X
Private key of an entity X
Timestamp generated by an entity X
3.1. Registration Phase
Firstly, T registers for R and R issues T's virtual identity. T receives secret information from R and stores them safely. Figure 3 shows the registration phase between T and R.
Registration phase in the proposed scheme.
T submits its identity to R.
R generates T's private key and an initial timestamp . And it computes T's virtual identity as follows:
Due to the private key, the virtual identity hides the real identity perfectly. The registration server is supposed to use the virtual identity to verify the thing's real identity. The virtual identity is essential element to make the proposed scheme provide anonymity.
R stores T's secret information in its database secretly. It computes the hashing values of T's private key and of its private key . And it sends the secret information to T.
T stores the secret information safely.
3.2. Join Phase
Let us suppose T wants to join G's domain in order to take services from G. Then G tries to authenticate T through R to provide services. We define as the common secret key shared between R and G in advance. T, G, and R perform the following authentication and key establishment steps. Figure 4 presents the join phase.
Join phase in the proposed scheme.
T generates a timestamp to compute the following shadow identity using and :
The virtual identity already concealed the thing's real identity in the registration. In this step, the shadow identity hides the virtual identity again. While the shadow identity of Chang et al.'s scheme hides the real identity directly, our shadow identity contains the virtual identity instead of the real identity. It means the proposed scheme provides anonymity, even if the shadow identity is revealed.
T sends the join request message to G, where the message header means T requests R to authenticate G and to provide a common secret key for joining G.
After receiving , G checks and generates a timestamp . And it computes the hashing value using the preshared common secret as follows:
And it sends the authentication request message to R. The message header indicates G requests R to authenticate T.
Upon receiving , R checks to determine whether it is an ally or not and checks to verify the validity of time period. And it computes the following to check whether it is equal to :
If results are all valid, R generates a timestamp .
R computes using received information and as follows:
And it retrieves the secret information [ from its database using as a keyword. If it is impossible to get same as , then R rejects G's request for authentication and stops communication with G.
R computes T's new virtual identity as shown in (25) and stores it safely to substitute the existing virtual identity :
This step makes every virtual identity supposed to be used only once. In other words, it guarantees the freshness of all virtual identities and it finally provides unlinkability of the proposed scheme.
After the renewal of the virtual identity, R computes the common secret key supposed to be shared between G and T using T's private key . Also, it computes the verification values , , and for T and the verification value for G as follows:
Since the common secret key is derived from a secret hashing value and changing timestamps, the secrecy and the freshness of the common secret key are always guaranteed.
R computes the following hashing value and sends the message to G:
After receiving , G checks and . If they are all valid, G computes the verification value after computing the common secret key . And it sends the message to T. and are as shown in the following formulas:
Upon receiving , T computes the following after checking :
The fact that is the same as implies that T recognizes the fact that R checked .
T computes and such that
to check the equivalence between and . The sameness of two values means that R trusted by T computes the common secret key which is supposed to be shared between G and T.
T computes the virtual identity and the verification value as follows:
And it checks whether is equal to . The equality indicates R computes T's new virtual identity normally. And then T stores its new virtual identity securely. As a result, the virtual identity is renewed by replacing the existing with the new .
T checks the equivalence between and after computing as shown in
The valid verification of implies that T and G share the common secret key successfully.
3.3. Communication Phase
The things located in G's domain authenticate each other and share session keys to communicate in a secure way. We assume that and already shared common secret keys called and , respectively, with G in the join phase. performs the following communication phase to share a session key with . The communication phase is presented in Figure 5.
Communication phase in the proposed scheme.
generates a timestamp and computes the new shadow identity as shown in
to substitute the existing shadow identity .
computes the verification value and the hashing value as follows:
And it sends the communication request message to . The message header stands for 's request for communicating with .
Upon receiving , generates a timestamp after checking and computes its new shadow identity , the verification value , and the hashing value such that
And it sends the authentication request message to G. The message header means that requests G to authenticate .
After receiving , G firstly checks , , and to confirm that and were authenticated by itself in the join phase. And then it checks that is equal to and is equal to after computing the following , :
If all the hashing values are verified successfully, G computes the new shadow identities of and using , , , and . The new shadow identities and are calculated from
And it replaces the existing shadow identities and with and . It stores and securely in its database. According to this step, the freshness of all shadow identities is guaranteed. As a result, it preserves unlinkability of the proposed scheme.
G generates a timestamp and computes the session key and the parameters and using and as follows:
G computes the verification and the hashing values, such as , , , and as shown in
And then it sends the messages to and to .
Upon receiving , checks and and computes the following session key shared with using the common secret key and the received :
After that, it checks the equivalence between the computed and the received , where is calculated by the following equation:
If the result is valid, recognizes the fact that G computed the session key .
Meanwhile, after receiving , also checks the validities of and at first. Then it computes the session key using and and the verification value using as follows:
confirms the sameness of and to check the session key computed by G. Finally, shares the session key with successfully.
4. Security Analysis
In this section, we prove the proposed scheme is secure against particular attacks. The assumptions are as follows: an adversary can eavesdrop any messages transmitted between T, G, and R and he/she can obtain a legitimate thing normally registered for R.
4.1. Anonymity
Our scheme provides anonymity against an adversary who acquires a valid thing.
4.1.1. Anonymity in Join Phase
An adversary can eavesdrop T's shadow identity and the timestamp from the message in the join phase. If the adversary obtains a valid thing registered for R, he/she can have a knowledge of the secret information stored in . Thus, the adversary can get T's virtual identity by computing using and from and from . To acquire T's real identity from , the adversary guesses a candidate identity firstly, and then he/she tries to check the equivalence between and . Since an identity is short and has a certain format, it is guessable. However, the adversary cannot check whether is satisfied or not without knowing T's private key and the timestamp . Therefore, it is impossible for the adversary to check whether the real identity is equal to the candidate identity or not.
4.1.2. Anonymity in Communication Phase
In the communication phase, an adversary can get 's shadow identity and its timestamp from the message or and from a legitimate thing . By using them, the adversary can gain 's virtual identity as he/she does in the join phase. Then the adversary tries to confirm whether is satisfied or not by guessing a candidate identity . Unfortunately, the adversary cannot check the equivalence between the real identity and the candidate identity without knowing and . For that reason, the adversary gets no information related to 's identity.
4.2. Untraceability
The proposed scheme provides untraceability for a thing. Because all transmitting messages always include the unique shadow and virtual identities in the join and the communication phases, an adversary cannot know the fact that all messages are originated from the same thing.
4.2.1. Untraceability in Join Phase
If a common secret key shared between T and G is renewed periodically or T tries to join many different Gs, an adversary can collect all shadow identities from T's join request messages in every session by eavesdropping. Besides, the adversary who has a valid thing can obtain T's virtual identity by computing because he/she can know , , and . Meanwhile, if the shadow identity or the virtual identity always has a same value in every session, the adversary can recognize that one thing sends the join request message repeatedly while he/she cannot know that thing's real identity. In other words, the adversary can trace the fact that a certain thing requests to join continuously. However, the whole shadow identities are all different, since they include a unique timestamp. And the registration server always issues the new virtual identity to renew the old one in every session. Therefore, the join request message sent by the thing includes the different shadow identity all the time. It means the proposed scheme guarantees untraceability for the thing.
4.2.2. Untraceability in Communication Phase
The shadow identity in the communication phase also includes a unique timestamp. And everything always computes the new shadow identity and sends it to the gateway when they request to communicate. The gateway stores this new shadow identity to use it in the next session only if it checks that the old shadow identity is valid. Thus, shadow identities in every session have a uniqueness. Due to this, an adversary cannot trace the action of the thing in the communication phase.
4.3. Replay Attacks
Although an adversary resends past transmitting messages after collecting them in a certain session, participants involved in the join and the communication phases can detect a retransmission and stop to communicate with each other.
4.3.1. Replay Attacks in Join Phase
In the join phase, an adversary can gather the messages , , , and between T, G, and R. When the adversary resends the old message to G, G checks a time interval between a current time and . And it rejects the join request if the time interval exceeds a predefined value. In addition, R can also recognize the old message sent by the adversary by checking the time period between a current time and . In this case, R absolutely breaks a connection.
4.3.2. Replay Attacks in Communication Phase
An adversary who collects the messages , , , and in the communication phase sends to and to G. After receiving the message, and G can know whether the message is resent or not by checking a timestamp and a current time. As a result, resending old messages is always detectable.
4.4. Forgery Attacks
In our scheme, an adversary cannot forge messages to perform the valid join and communication phases.
4.4.1. Forgery Attacks in Join Phase
When the message forged from by an adversary is sent to G in the join phase, G makes and sends it to R. Then R computes using that is the hashing value of its private key and tries to search T's secret information using as a keyword. Since there is no matched virtual identity in R's database, R stops to communicate with G after recognizing that is originated from the forged message.
4.4.2. Forgery Attacks in Communication Phase
An adversary sends the message to after forging 's message in the communication phase. Upon receiving , sends to G. Then G can easily know that no shadow identity equals to in its database. Finally, G rejects 's request.
4.5. Impersonation Attacks
The proposed scheme is secure against attacks that an adversary who obtains a shadow identity of the thing impersonates that thing.
4.5.1. Impersonation Attacks in Join Phase
An adversary who tries to impersonate the valid thing T easily obtains T's shadow identity from the message in the join phase. The adversary makes the message using the obtained and a timestamp generated by him/her in a new session. And he/she sends to G. After receiving , G decides is a valid request message because and are verified successfully. And then G sends the message to R. Checking , , and by R is also successful. R computes from the received by computing the equation . There is no equivalent virtual identity to in its database. Surely, R recognizes it is an abnormal case and rejects G's request.
4.5.2. Impersonation Attacks in Communication Phase
An adversary gets from in the communication phase. To impersonate , the adversary generates a new timestamp , makes the message , and sends to in a new session. Here, the adversary cannot compute the valid and because he/she does not know 's common secret key . After receiving , makes the message and sends it to G. G verifies that all , , , and are valid but it detects that and the received are not equal. As a result, G recognizes is an invalid thing and refuses 's request.
4.6. Known Session Key Attacks
Disclosure of a common secret key in the join phase or a session key in the communication phase does not affect revelations about the thing's identity, other common secret keys, and other session keys.
4.6.1. Known Session Key Attacks in Join Phase
A common secret key shared between T and G is computed using a timestamp in the join phase. Because a timestamp always has a different value, every common secret key is unique. Although an adversary knows , he/she cannot obtain the thing's identity and the common secret key in other sessions. The reasons are as follows. Firstly, the adversary still cannot get thing's identity from without knowing T's secret information . Moreover, let us suppose the adversary tries to get other common secret keys in the next session after computing using and . In that next session, the adversary eavesdrops and computes using and . Due to the difference of and , is not eliminated in the above equation and the adversary cannot get . As a result, it is impossible to calculate the new session key even though the former is revealed.
4.6.2. Known Session Key Attacks in Communication Phase
All session keys in the communication phase are independent since all of them include their own unique timestamps. If the session key shared between and is revealed to an adversary in a certain session, he/she can compute using and the revealed . In the next session, the adversary eavesdrops and tries to compute using and . Since is not equal to , and are not erased. Therefore, there is no way to obtain the new session key from the old session key .
5. Performance Analysis
This section partially compares the performance of our scheme with those of Chang et al.'s and Lee's [22] schemes. Since the environment, the component, and the composition of ours and others' are all different, we firstly select similar factors in all schemes and evaluate them. Table 3 shows the performance comparison results. In Table 3, Hash denotes a hash operation, XOR denotes an exclusive-OR operation, and rounds denote communication rounds. We evaluate the number of hash and exclusive-OR operations. We compare the join phase of our scheme and the authentication and session key establishment phases of other schemes, because each phase has similar purpose and procedure. In addition, we only focus on the operations on the part of the limited computing power devices, such as a thing and a mobile user. Since the performance of the whole scheme depends on the capability of those devices, we do not compare the whole operations.
Performance comparisons.
Scheme
Ours
Chang et al.'s
Lee's
Join phase
Hash
7
7
7
XOR
2
5
2
Rounds
4
8
7
Communication phase
Hash
5
N/A
N/A
XOR
3
N/A
N/A
Rounds
3
N/A
N/A
As Table 3 shows, our scheme requires less or the same exclusive-OR operations in the join phase. Namely, the computation complexity of ours is a little better than others'. Our communication rounds in the join phase are reduced by half in comparison with Chang et al.'s and less than that in Lee's. Considering the wireless environments, reducing the communication cost is meaningful. Meanwhile, there is no corresponding phases of Chang et al.'s and Lee's schemes to the communication phase of our scheme. So we only show the number of operations and communication rounds of our scheme in Table 3. Definitely, hash operations and communication rounds in the communication phase are less than those in the join phase. The thing accomplishes the communication phase more often than the join phase, so the less number of operations and communication rounds in the communication phase is remarkable. As a result, our scheme provides advantages of the communication complexity as well as the computation complexity.
6. Conclusions
In this paper, we propose a novel anonymous authentication scheme that ensures the things in IoT environments can communicate with one another safely. The proposed scheme uses the virtual identity of the thing to make it be anonymized and authenticated at the same time. To provide untraceability, we keep the uniqueness of all shadow and virtual identities. Namely, duplicated shadow and virtual identities are never used in every session through the renewal process. Even if the valid virtual identity issued by the registration server is revealed, an adversary cannot obtain the real identity from that virtual identity. It is impossible for an adversary to perform replay, forgery, and impersonation attacks. Moreover, he/she cannot know the valid common secret key shared between the registration server, the gateway, and the thing, even though a specific common secret key is exposed. The valid session key shared between two things is also safe when a particular session key is disclosed to an adversary. We only use low cost functions, such as hash functions and exclusive-OR operations in consideration of fast computation and low energy consumption of the thing. In conclusion, our scheme is suitable for IoT environments as a secure and efficient authentication mechanism.
Footnotes
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgment
This work was supported by Institute for Information & communications Technology Promotion (IITP) Grant funded by the Korea government (MSIP) (no. R0126-15-1111,The Development of Risk-based Authentication·Access Control Platform and Compliance Technique for Cloud Security).
References
1.
ZhangZ.-K.ChoM. C. Y.WangC.-W.HsuC.-W.ChenC.-K.ShiehS.IoT security: ongoing challenges and research opportunitiesProceedings of the 7th IEEE International Conference on Service-Oriented Computing and Applications (SOCA '14)November 2014Matsue, JapanIEEE23023410.1109/soca.2014.582-s2.0-84920514918
2.
LiuJ.XiaoY.ChenC. P.Authentication and access control in the Internet of thingsProceedings of the 32nd IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW '12)June 2012Macau, ChinaIEEE58859210.1109/icdcsw.2012.232-s2.0-84866349735
3.
AlcaideA.PalomarE.Montero-CastilloJ.RibagordaA.Anonymous authentication for privacy-preserving IoT target-driven applicationsComputers & Security20133711112310.1016/j.cose.2013.05.0072-s2.0-84879815746
4.
NdibanjeB.LeeH. J.LeeS. G.Security analysis and improvements of authentication and access control in the Internet of thingsSensors2014148147861480510.3390/s140814786
5.
YeN.ZhuY.WangR.-C.MalekianR.LinQ.-M.An efficient authentication and access control scheme for perception layer of internet of thingsApplied Mathematics and Information Sciences2014841617162410.12785/amis/0804162-s2.0-84894059526
6.
LinX.-J.SunL.QuH.Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applicationsComputers & Security20154814214910.1016/j.cose.2014.08.0022-s2.0-84915804332
7.
ZhuJ.MaJ.A new authentication scheme with anonymity for wireless environmentsIEEE Transactions on Consumer Electronics200450123123510.1109/tce.2004.12778672-s2.0-1942487780
8.
LinC. H.LeeC. Y.Cryptanalysis of a new authentication scheme with anonymity for wireless environmentsProceedings of the 2nd International Conference on Advances in Mobile Multimedia2004399402
9.
LeeC.-C.HwangM.-S.LiaoI.-E.Security enhancement on a new authentication scheme with anonymity for wireless environmentsIEEE Transactions on Industrial Electronics20065351683168710.1109/tie.2006.8819982-s2.0-33750133438
10.
WuC.-C.LeeW.-B.TsaurW.-J.A secure authentication scheme with anonymity for wireless communicationsIEEE Communications Letters2008121072272310.1109/lcomm.2008.0802832-s2.0-54949140749
11.
LeeJ.-S.ChangJ. H.LeeD. H.Security flaw of authentication scheme with anonymity for wireless communicationsIEEE Communications Letters200913529229310.1109/lcomm.2009.0900742-s2.0-67649184080
12.
ChangC.-C.LeeC.-Y.LeeW.-B.Cryptanalysis and improvement of a secure authentication scheme with anonymity for wireless communicationsProceedings of the 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP '09)September 2009Kyoto, JapanIEEE90290410.1109/iih-msp.2009.1722-s2.0-73649108883
13.
XuJ.FengD.Security flaws in authentication protocols with anonymity for wireless environmentsETRI Journal200931446046210.4218/etrij.09.0209.00262-s2.0-68949149518
14.
JeonW.KimJ.NamJ.LeeY.WonD.An enhanced secure authentication scheme with anonymity for wireless environmentsIEICE Transactions on Communications20129572505250810.1587/transcom.e95.b.25052-s2.0-84863463143
15.
ChangC.-C.LeeC.-Y.ChiuY.-C.Enhanced authentication scheme with anonymity for roaming service in global mobility networksComputer Communications200932461161810.1016/j.comcom.2008.11.0322-s2.0-59649101587
16.
YounT.-Y.ParkY.-H.LimJ.Weaknesses in an anonymous authentication scheme for roaming service in global mobility networksIEEE Communications Letters200913747147310.1109/lcomm.2009.0904882-s2.0-68349157387
17.
ZhouT.XuJ.Provable secure authentication protocol with anonymity for roaming service in global mobility networksComputer Networks201155120521310.1016/j.comnet.2010.08.0082-s2.0-78651364381
18.
ChenC.HeD.ChanS.BuJ.GaoY.FanR.Lightweight and provably secure user authentication with anonymity for the global mobility networkInternational Journal of Communication Systems201124334736210.1002/dac.11582-s2.0-79952059658
19.
MunH.HanK.LeeY. S.YeunC. Y.ChoiH. H.Enhanced secure anonymous authentication scheme for roaming service in global mobility networksMathematical and Computer Modelling2012551-221422210.1016/j.mcm.2011.04.036MR28651092-s2.0-82755161699
20.
KunL.AnnaX.FeiH.LeeD. H.Anonymous authentication with unlinkability for wireless environmentsIEICE Electronics Express20118853654110.1587/elex.8.5362-s2.0-79955450537
21.
TsaiJ.-L.LoN.-W.WuT.-C.Secure anonymous authentication protocol with unlinkability for mobile wireless environmentProceedings of the International Conference on Anti-Counterfeiting, Security and Identification (ASID '12)August 2012Taipei, TaiwanIEEE1510.1109/icasid.2012.63253342-s2.0-84870602974
22.
LeeT.-F.User authentication scheme with anonymity, unlinkability and untrackability for global mobility networksSecurity and Communication Networks20136111404141310.1002/sec.7342-s2.0-84886296019