JOURNAL ARTICLE

A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments

Kui RenWenjing LouKihong KimRobert H. Deng

Year: 2006 Journal:   IEEE Transactions on Vehicular Technology Vol: 55 (4)Pages: 1373-1384   Publisher: Institute of Electrical and Electronics Engineers

Abstract

Privacy and security are two important but seemingly contradictory objectives in a pervasive computing environment (PCE). On one hand, service providers want to authenticate legitimate users and make sure they are accessing their authorized services in a legal way. On the other hand, users want to maintain the necessary privacy without being tracked down for wherever they are and whatever they are doing. In this paper, a novel privacy preserving authentication and access control scheme to secure the interactions between mobile users and services in PCEs is proposed. The proposed scheme seamlessly integrates two underlying cryptographic primitives, namely blind signature and hash chain, into a highly flexible and lightweight authentication and key establishment protocol. The scheme provides explicit mutual authentication between a user and a service while allowing the user to anonymously interact with the service. Differentiated service access control is also enabled in the proposed scheme by classifying mobile users into different service groups. The correctness of the proposed authentication and key establishment protocol is formally verified based on Burrows-Abadi-Needham logic.

Keywords:
Computer science Computer security Authentication protocol Mutual authentication Authentication (law) Access control Correctness Computer network Cryptography Service provider Protocol (science) Scheme (mathematics) Cryptographic protocol Service (business)

Metrics

124
Cited By
31.99
FWCI (Field Weighted Citation Impact)
48
Refs
1.00
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems
Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments

Zuowen Tan

Journal:   Journal of Network and Computer Applications Year: 2012 Vol: 35 (6)Pages: 1839-1846
JOURNAL ARTICLE

A privacy-preserving authentication scheme using biometrics for pervasive computing environments

Lin YaoXiangwei KongGuowei WuQingna FanChi Lin

Journal:   Journal of Electronics (China) Year: 2010 Vol: 27 (1)Pages: 68-78
BOOK-CHAPTER

Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments

Emmanouil MagkosPanayiotis Kotzanikolaou

Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Year: 2010 Pages: 53-64
© 2026 ScienceGate Book Chapters — All rights reserved.