An anonymous secure authentication method for tourist attraction network-based edge computing

An elliptic curve cryptography (ECC)-based anonymous authentication mechanism is designed to meet the demand for lightweight, anonymous, and trustworthy authentication for tourist attraction networks in edge computing environments. This mechanism uses pseudo-randomly generated identities to cover th...

Full description

Saved in:
Bibliographic Details
Main Authors: Xuefan Zhou, Zhaoyu Zhuang
Format: Article
Language:English
Published: Frontiers Media S.A. 2025-06-01
Series:Frontiers in Physics
Subjects:
Online Access:https://www.frontiersin.org/articles/10.3389/fphy.2025.1579521/full
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850136287053348864
author Xuefan Zhou
Zhaoyu Zhuang
author_facet Xuefan Zhou
Zhaoyu Zhuang
author_sort Xuefan Zhou
collection DOAJ
description An elliptic curve cryptography (ECC)-based anonymous authentication mechanism is designed to meet the demand for lightweight, anonymous, and trustworthy authentication for tourist attraction networks in edge computing environments. This mechanism uses pseudo-randomly generated identities to cover the real identity of the tourists, which ensures the anonymity of the scheme. The security of mutual authentication between the tourist and the edge computing server is increased with the help of smart card technology. At the same time, the mechanism also has the ability to guarantee security in case of smart card theft. The introduction of timestamps effectively enhances the scheme’s ability against a replay attack. The security of the scheme is analyzed using Burrows—Abadi—Needham (BAN) logic and non-formal analysis methods. Finally, the results of a comprehensive analysis and comparison show that the scheme has high practical value.
format Article
id doaj-art-e890eef70fec40c0b0a69675027f91c0
institution OA Journals
issn 2296-424X
language English
publishDate 2025-06-01
publisher Frontiers Media S.A.
record_format Article
series Frontiers in Physics
spelling doaj-art-e890eef70fec40c0b0a69675027f91c02025-08-20T02:31:11ZengFrontiers Media S.A.Frontiers in Physics2296-424X2025-06-011310.3389/fphy.2025.15795211579521An anonymous secure authentication method for tourist attraction network-based edge computingXuefan Zhou0Zhaoyu Zhuang1College of Tourism Management, Guizhou University of Commerce, Guiyang, ChinaShenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen, ChinaAn elliptic curve cryptography (ECC)-based anonymous authentication mechanism is designed to meet the demand for lightweight, anonymous, and trustworthy authentication for tourist attraction networks in edge computing environments. This mechanism uses pseudo-randomly generated identities to cover the real identity of the tourists, which ensures the anonymity of the scheme. The security of mutual authentication between the tourist and the edge computing server is increased with the help of smart card technology. At the same time, the mechanism also has the ability to guarantee security in case of smart card theft. The introduction of timestamps effectively enhances the scheme’s ability against a replay attack. The security of the scheme is analyzed using Burrows—Abadi—Needham (BAN) logic and non-formal analysis methods. Finally, the results of a comprehensive analysis and comparison show that the scheme has high practical value.https://www.frontiersin.org/articles/10.3389/fphy.2025.1579521/fullanonymousedge computingsecureauthenticationtourist attraction
spellingShingle Xuefan Zhou
Zhaoyu Zhuang
An anonymous secure authentication method for tourist attraction network-based edge computing
Frontiers in Physics
anonymous
edge computing
secure
authentication
tourist attraction
title An anonymous secure authentication method for tourist attraction network-based edge computing
title_full An anonymous secure authentication method for tourist attraction network-based edge computing
title_fullStr An anonymous secure authentication method for tourist attraction network-based edge computing
title_full_unstemmed An anonymous secure authentication method for tourist attraction network-based edge computing
title_short An anonymous secure authentication method for tourist attraction network-based edge computing
title_sort anonymous secure authentication method for tourist attraction network based edge computing
topic anonymous
edge computing
secure
authentication
tourist attraction
url https://www.frontiersin.org/articles/10.3389/fphy.2025.1579521/full
work_keys_str_mv AT xuefanzhou ananonymoussecureauthenticationmethodfortouristattractionnetworkbasededgecomputing
AT zhaoyuzhuang ananonymoussecureauthenticationmethodfortouristattractionnetworkbasededgecomputing
AT xuefanzhou anonymoussecureauthenticationmethodfortouristattractionnetworkbasededgecomputing
AT zhaoyuzhuang anonymoussecureauthenticationmethodfortouristattractionnetworkbasededgecomputing