An anonymous secure authentication method for tourist attraction network-based edge computing
An elliptic curve cryptography (ECC)-based anonymous authentication mechanism is designed to meet the demand for lightweight, anonymous, and trustworthy authentication for tourist attraction networks in edge computing environments. This mechanism uses pseudo-randomly generated identities to cover th...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Frontiers Media S.A.
2025-06-01
|
| Series: | Frontiers in Physics |
| Subjects: | |
| Online Access: | https://www.frontiersin.org/articles/10.3389/fphy.2025.1579521/full |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850136287053348864 |
|---|---|
| author | Xuefan Zhou Zhaoyu Zhuang |
| author_facet | Xuefan Zhou Zhaoyu Zhuang |
| author_sort | Xuefan Zhou |
| collection | DOAJ |
| description | An elliptic curve cryptography (ECC)-based anonymous authentication mechanism is designed to meet the demand for lightweight, anonymous, and trustworthy authentication for tourist attraction networks in edge computing environments. This mechanism uses pseudo-randomly generated identities to cover the real identity of the tourists, which ensures the anonymity of the scheme. The security of mutual authentication between the tourist and the edge computing server is increased with the help of smart card technology. At the same time, the mechanism also has the ability to guarantee security in case of smart card theft. The introduction of timestamps effectively enhances the scheme’s ability against a replay attack. The security of the scheme is analyzed using Burrows—Abadi—Needham (BAN) logic and non-formal analysis methods. Finally, the results of a comprehensive analysis and comparison show that the scheme has high practical value. |
| format | Article |
| id | doaj-art-e890eef70fec40c0b0a69675027f91c0 |
| institution | OA Journals |
| issn | 2296-424X |
| language | English |
| publishDate | 2025-06-01 |
| publisher | Frontiers Media S.A. |
| record_format | Article |
| series | Frontiers in Physics |
| spelling | doaj-art-e890eef70fec40c0b0a69675027f91c02025-08-20T02:31:11ZengFrontiers Media S.A.Frontiers in Physics2296-424X2025-06-011310.3389/fphy.2025.15795211579521An anonymous secure authentication method for tourist attraction network-based edge computingXuefan Zhou0Zhaoyu Zhuang1College of Tourism Management, Guizhou University of Commerce, Guiyang, ChinaShenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen, ChinaAn elliptic curve cryptography (ECC)-based anonymous authentication mechanism is designed to meet the demand for lightweight, anonymous, and trustworthy authentication for tourist attraction networks in edge computing environments. This mechanism uses pseudo-randomly generated identities to cover the real identity of the tourists, which ensures the anonymity of the scheme. The security of mutual authentication between the tourist and the edge computing server is increased with the help of smart card technology. At the same time, the mechanism also has the ability to guarantee security in case of smart card theft. The introduction of timestamps effectively enhances the scheme’s ability against a replay attack. The security of the scheme is analyzed using Burrows—Abadi—Needham (BAN) logic and non-formal analysis methods. Finally, the results of a comprehensive analysis and comparison show that the scheme has high practical value.https://www.frontiersin.org/articles/10.3389/fphy.2025.1579521/fullanonymousedge computingsecureauthenticationtourist attraction |
| spellingShingle | Xuefan Zhou Zhaoyu Zhuang An anonymous secure authentication method for tourist attraction network-based edge computing Frontiers in Physics anonymous edge computing secure authentication tourist attraction |
| title | An anonymous secure authentication method for tourist attraction network-based edge computing |
| title_full | An anonymous secure authentication method for tourist attraction network-based edge computing |
| title_fullStr | An anonymous secure authentication method for tourist attraction network-based edge computing |
| title_full_unstemmed | An anonymous secure authentication method for tourist attraction network-based edge computing |
| title_short | An anonymous secure authentication method for tourist attraction network-based edge computing |
| title_sort | anonymous secure authentication method for tourist attraction network based edge computing |
| topic | anonymous edge computing secure authentication tourist attraction |
| url | https://www.frontiersin.org/articles/10.3389/fphy.2025.1579521/full |
| work_keys_str_mv | AT xuefanzhou ananonymoussecureauthenticationmethodfortouristattractionnetworkbasededgecomputing AT zhaoyuzhuang ananonymoussecureauthenticationmethodfortouristattractionnetworkbasededgecomputing AT xuefanzhou anonymoussecureauthenticationmethodfortouristattractionnetworkbasededgecomputing AT zhaoyuzhuang anonymoussecureauthenticationmethodfortouristattractionnetworkbasededgecomputing |