Publication Type

Journal Article

Version

acceptedVersion

Publication Date

7-2006

Abstract

Privacy and security are two important but seemingly contradictory objectives in a pervasive computing environment (PCE). On one hand, service providers want to authenticate legitimate users and make sure they are accessing their authorized services in a legal way. On the other hand, users want to maintain the necessary privacy without being tracked down for wherever they are and whatever they are doing. In this paper, a novel privacy preserving authentication and access control scheme to secure the interactions between mobile users and services in PCEs is proposed. The proposed scheme seamlessly integrates two underlying cryptographic primitives, namely blind signature and hash chain, into a highly flexible and lightweight authentication and key establishment protocol. The scheme provides explicit mutual authentication between a user and a service while allowing the user to anonymously interact with the service. Differentiated service access control is also enabled in the proposed scheme by classifying mobile users into different service groups. The correctness of the proposed authentication and key establishment protocol is formally verified based on Burrows-Abadi-Needham logic

Keywords

access control scheme, blind signature, cryptographic primitives, differentiated service, hash chain, key establishment protocol, lightweight authentication, mobile users, pervasive computing environment, privacy preserving authentication

Discipline

Information Security

Publication

IEEE Transactions on Vehicular Technology

Volume

55

Issue

4

First Page

1373

Last Page

1384

ISSN

0018-9545

Identifier

10.1109/TVT.2006.877704

Publisher

IEEE

Additional URL

http://dx.doi.org/10.1109/TVT.2006.877704

Share

COinS