Next Article in Journal
Evaluation of Saponin Extract from Vitex doniana and Pentaclethra macrophylla for Antibacterial Activity
Previous Article in Journal
The Feasibility of Modified Magnesia-Phosphate Cement as a Heat Resistant Adhesive for Strengthening Concrete with Carbon Sheets
Article Menu

Export Article

Open AccessArticle
Appl. Sci. 2016, 6(6), 176; doi:10.3390/app6060176

Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy

1
Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung 80424, Taiwan
2
Big Data Platform Team, CTO Office, Foxconn, Kaohsiung 80661, Taiwan
A partial result of this research was presented at International Workshop on Security, Nara, Japan, 29–31 October 2007.
These authors contributed equally to this work.
*
Author to whom correspondence should be addressed.
Academic Editor: Christos Verikoukis
Received: 9 April 2016 / Revised: 9 June 2016 / Accepted: 9 June 2016 / Published: 17 June 2016

Abstract

Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality. However, there are many security threats to mobile networks and their impact on security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property. The secret information which mobile users carry may be stolen by malicious entities. To guarantee the quality of advanced services, security and privacy would be important issues when users roam within various mobile networks. In this manuscript, an anonymous authentication scheme will be proposed to protect the security of the network system and the privacy of users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also each user’s identity is kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still generate correct bills to charge these anonymous users via a credit-based solution instead of debit-based ones. Furthermore, our protocols also achieve fair privacy which allows the judge to revoke the anonymity and trace the illegal users when they have misused the anonymity property, for example, if they have committed crimes. Finally, in this paper, we also carry out complete theoretical proofs on each claimed security property. View Full-Text
Keywords: mutual authentication; anonymity; fair privacy; mobile networks; ubiquitous computing mutual authentication; anonymity; fair privacy; mobile networks; ubiquitous computing
Figures

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Fan, C.-I.; Huang, V.S.-M. Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy. Appl. Sci. 2016, 6, 176.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Appl. Sci. EISSN 2076-3417 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top