Skip to main content
Log in

Practical blacklist-based anonymous authentication scheme for mobile crowd sensing

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Mobile crowd sensing (MCS) represents one of the most promising approaches for improving life quality of individuals with sensing and computing devices. MCS is playing a more and more important role in various fields of service, such as traffic monitoring and commercial advertisement. Security and privacy of communication in MCS attract increasing attention from the academia and industry since the sensing data are usually sensitive for users. Some users worry about the leakage of their private information when they share their data to the third parties. To address this issue, in this paper, we propose a practical blacklist-based anonymous authentication scheme in which users can enjoy an anonymous environment and share their information without worrying about any information leakage. Security analysis shows that our scheme can achieve anonymity, blacklistability, nonrepudiation and unlinkability. Performance evaluation demonstrates that our scheme is more efficient in terms of computation overhead compared with the existing works.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Ganti RK, Ye F, Lei H (2011) Mobile crowdsensing: current state and future challenges. IEEE Commun Mag 49(11):32–39

    Article  Google Scholar 

  2. Cheung M, Hou F, Huang J (2014) Participation and reporting in participatory sensing, the 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), pp 357–364

  3. Honicky R, Brewer E A, Paulos E, White R (2008) N-smarts: networked suite of mobile atmospheric real-time sensors. In: Proceedings of the second ACM SIGCOMM workshop on Networked systems for developing regions, pp 25–30

  4. Mohan P, Padmanabhan VN, Ramjee R (2008) Nericell: rich monitoring of road and traffic conditions using mobile smartphones. In: Proceedings of the 6th ACM conference on Embedded network sensor systems, pp 323–336

  5. Talasila M, Curtmola R, Borcea C (2013) Improving location reliability in crowd sensed data with minimal efforts. In: the 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC). IEEE, pp 1–8

  6. Liu D, Li H, Yang Y, Yang H (2014) Achieving multi-authority access control with efficient attribute revocation in smart grid. In: IEEE International Conference on Communications (ICC). IEEE, pp 634–639

  7. Froehlich J, Dillahunt T, Klasnja P, Mankoff J, Consolvo S, Harrison B, Landay JA (2009) Ubigreen: investigating a mobile tool for tracking and supporting green transportation habits. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, pp 1043–1052

  8. Mianxiong D, Kimata T, Sugiura K, Zettsu K (2014) Quality-of-experience (qoe) in emerging mobile social networks. IEICE Trans Inf Syst 97(10):2606–2612

    Google Scholar 

  9. Ota K, Dong M, Zhu H, Chang S, Shen X (2011) Traffic information prediction in urban vehicular networks: A correlation based approach IEEE Wireless Communications and Networking Conference (WCNC). IEEE, pp 1021–1025

  10. Li H, Yang Y, Wen M, Luo H, Lu R (2014) Emrq: An efficient multi-keyword range query scheme in smart grid auction market. KSII Trans Internet Inf Syst 11:8

    Google Scholar 

  11. Yang Y, Li H, Wen M, Luo H, Lu R (2014) Achieving ranked range query in smart grid auction market. In: IEEE International Conference on Communications (ICC). IEEE, pp 951–956

  12. Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2014) EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid. IEEE Trans Parallel Distrib Syst 25(8):2053–2064

    Article  Google Scholar 

  13. Li H, Lu R, Zhou L, Yang B, Shen X (2014) An Efficient Merkle Tree Based Authentication Scheme for Smart Grid. IEEE Syst J 8(2):655–663

    Article  Google Scholar 

  14. Li H, Dai Y, Tian L, Yang H (2009) Identity-based authentication for cloud computing. In: Cloud computing. Springer, pp 157–166

  15. Reddy S, Parker A, Hyman J, Burke J, Estrin D, Hansen M (2007) Image browsing, processing, and clustering for participatory sensing: lessons from a dietsense prototype. In: Proceedings of the 4th workshop on Embedded networked sensors. ACM, pp 13–17

  16. Ota K, Dong M, Chang S, Zhu H (2014) Mmcd: Max-throughput and min-delay cooperative downloading for drive-thru internet systems. In: IEEE International Conference on Communications (ICC). IEEE, pp 83–87

  17. Yang C, Ma W, Wang X (2007) Novel remote user authentication scheme using bilinear pairings. In: Autonomic and Trusted Computing. Springer, pp 306–312

  18. Yang Y, Li H, Liu W, Yang H, Wen M (2014) Secure Dynamic Searchable Symmetric Encryption with Constant Document Update Cost. In: Proceedings of GLOBECOM. to appear. Anaheim, California, USA

    Google Scholar 

  19. Yang J-H, Chang C-C (2009) An id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput Secur 28(3):138–143

    Article  Google Scholar 

  20. Tseng Y-M, Wu T-Y, Wu J-D (2007) A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices. In: The 31st Annual International Computer Software and Applications Conference. IEEE, pp 700–710

  21. Li H, Liu D, Dai Y, Luan T, Shen X Enabling Efficient Multi-keyword Ranked Search over Encrypted Cloud Data through Blind Storage. In: IEEE Transactions on Emerging Topics in Computing. doi:10.1109/TETC.2014.2371239

  22. Ren J, Harn L (2013) An efficient threshold anonymous authentication scheme for privacy-preserving communications. IEEE Trans Wirel Commun 12(3):1018–1025

    Article  Google Scholar 

  23. Lin Z, Hopper N (2010) Jack: Scalable accumulator-based nymble system. In: Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, pp 53–62

  24. Tsang PP, Kapadia A, Cornelius C, Smith SW (2011) Nymble: Blocking misbehaving users in anonymizing networks. IEEE Trans Dependable Secure Comput 8(2):256–269

    Article  Google Scholar 

  25. Tsang PP, Au MH, Kapadia A, Smith SW (2007) Blacklistable anonymous credentials: blocking misbehaving users without ttps. In: Proceedings of the 14th ACM conference on Computer and communications security, pp 72–81

  26. Tsang PP, Au MH, Smith SW, Kapadia A (2010) Blac: Revoking repeatedly misbehaving anonymous users without relying on ttps. ACM Trans Inf Syst Secur (TISSEC) 13(4):39

    Article  Google Scholar 

  27. Cao X, Zeng X, Kou W, Hu L (2009) Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Trans Veh Technol 58(7):3508–3517

    Article  Google Scholar 

  28. Liu J, Zhang Z, Chen X, Kwak K (2014) Certificateless remote anonymous authentication schemes for wireless body area networks. IEEE Trans Parallel Distrib Syst:332–342

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China under Grants 61472065, 61350110238, 61103207, U1233108, U1333127, and 61272525, the International Science and Technology Cooperation and Exchange Program of Sichuan Province, China under Grant 2014HH0029, China Postdoctoral Science Foundation funded project under Grant 2014M552336, and State Key Laboratory of Information Security Open Foundation under Grant 2015-MS-02.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongwei Li.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, H., Jia, K., Yang, H. et al. Practical blacklist-based anonymous authentication scheme for mobile crowd sensing. Peer-to-Peer Netw. Appl. 9, 762–773 (2016). https://doi.org/10.1007/s12083-015-0329-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-015-0329-z

Keywords

Navigation