Next Article in Journal
Multi-Channel Optoelectronic Measurement System for Soil Nutrients Analysis
Next Article in Special Issue
Intelligent Micro Energy Grid in 5G Era: Platforms, Business Cases, Testbeds, and Next Generation Applications
Previous Article in Journal
A Capacitor Voltage Balancing Approach Based on Mapping Strategy for MMC Applications
Previous Article in Special Issue
Current State of Multicast Routing Protocols for Disruption Tolerant Networks: Survey and Open Issues
Article Menu
Issue 4 (April) cover image

Export Article

Open AccessArticle

A Privacy-Preserving Authentication and Key Agreement Scheme with Deniability for IoT

College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
College of Mathematical Sciences, De Zhou University, Shandong 253023, China
Author to whom correspondence should be addressed.
Electronics 2019, 8(4), 450;
Received: 23 March 2019 / Revised: 13 April 2019 / Accepted: 15 April 2019 / Published: 19 April 2019
(This article belongs to the Special Issue IoT in 5G)
PDF [447 KB, uploaded 25 April 2019]


User authentication for the Internet of Things (IoT) is a vital measure as it consists of numerous unattended connected devices and sensors. For security, only the user authenticated by the gateway node can access the real-time data gathered by sensor nodes. In this article, an efficient privacy-preserving authentication and key agreement scheme for IoT is developed which enables the user, the gateway node and sensor nodes to authenticate with each other. Only the trusted gateway node can determine the real identity of user; however, no other entities can get information about user’ identity by just intercepting all exchanged messages during authentication phase. The gateway cannot prove the received messages from the sender to a third party, and thus preserving the privacy of the sender. The correctness of the proposed scheme is proved to be feasible by using BAN logic, and its security is proved under the random oracle model. The execution time of the proposed scheme is evaluated and compared with existing similar schemes, and the results demonstrate that our proposed scheme is more efficient and applicable for IoT applications. View Full-Text
Keywords: IoT; security; authentication; anonymity; deniability IoT; security; authentication; anonymity; deniability

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Zhou, Y.; Liu, T.; Tang, F.; Wang, F.; Tinashe, M. A Privacy-Preserving Authentication and Key Agreement Scheme with Deniability for IoT. Electronics 2019, 8, 450.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
Electronics EISSN 2079-9292 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top