Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2017, Article ID 4078521, 11 pages
https://doi.org/10.1155/2017/4078521
Research Article

An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS-WMNs

1Software College, Northeastern University, Shenyang 110819, China
2School of Software, Dalian University of Technology, Dalian 116024, China
3School of Computer Science and Engineering, Northeastern University, Shenyang 110819, China

Correspondence should be addressed to Xiaojie Wang; nc.ude.tuld.liam@8891jxgnaw and Xiaoxue Gong; nc.ude.uen.liamuts@euxoaixgnog

Received 27 January 2017; Accepted 12 April 2017; Published 4 June 2017

Academic Editor: Jun Cheng

Copyright © 2017 Tianhan Gao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Z. Ning, F. Xia, X. Kong, and Z. Chen, “Social-oriented resource management in cloud-based mobile networks,” IEEE Cloud Computing, vol. 3, no. 4, pp. 24–31, 2016. View at Publisher · View at Google Scholar
  2. Z. Ning, F. Xia, X. Hu, Z. Chen, and M. S. Obaidat, “Social-oriented adaptive transmission in opportunistic internet of smartphones,” IEEE Transactions on Industrial Informatics, vol. 13, no. 2, pp. 810–820, 2017. View at Publisher · View at Google Scholar
  3. X. Hu, X. Li, E. C.-H. Ngai, V. C. M. Leung, and P. Kruchten, “Multi-dimensional context-aware social network architecture for mobile crowdsensing,” IEEE Communications Magazine, vol. 52, no. 6, pp. 78–87, 2014. View at Publisher · View at Google Scholar · View at Scopus
  4. X. Hu, J. Zhao, B.-C. Seet, V. C. M. Leung, T. H. S. Chu, and H. Chan, “S-aframe: agent-based multilayer framework with context-aware semantic service for vehicular social networks,” IEEE Transactions on Emerging Topics in Computing, vol. 3, no. 1, pp. 44–63, 2015. View at Publisher · View at Google Scholar · View at Scopus
  5. Z. Ning, L. Liu, F. Xia, B. Jedari, I. Lee, and W. Zhang, “CAIS: a copy adjustable incentive scheme in community-based socially aware networking,” IEEE Transactions on Vehicular Technology, vol. 66, no. 4, pp. 3406–3419, 2017. View at Publisher · View at Google Scholar
  6. X. Hu, T. H. S. Chu, V. C. M. Leung, E. C.-H. Ngai, P. Kruchten, and H. C. B. Chan, “A survey on mobile social networks: applications, platforms, system architectures, and future research directions,” IEEE Communications Surveys & Tutorials, vol. 17, no. 3, pp. 1557–1581, 2015. View at Publisher · View at Google Scholar
  7. Q. Liu, X. Hu, E. C. Ngai et al., “A security patch addressing bandwidth request vulnerabilities in the IEEE 802.16 standard,” IEEE Network, vol. 30, no. 5, pp. 26–34, 2016. View at Publisher · View at Google Scholar
  8. Z. Ning, Q. Song, L. Guo, Z. Chen, and A. Jamalipour, “Integration of scheduling and network coding in multi-rate wireless mesh networks: optimization models and algorithms,” Ad Hoc Networks, vol. 36, pp. 386–397, 2016. View at Publisher · View at Google Scholar · View at Scopus
  9. X. Hu, T. H. S. Chu, H. C. B. Chan, and V. C. M. Leung, “Vita: a crowdsensing-oriented mobile cyber-physical system,” IEEE Transactions on Emerging Topics in Computing, vol. 1, no. 1, pp. 148–165, 2013. View at Publisher · View at Google Scholar
  10. C. Li, U. Nguyen, and H. Nguyen, “Efficient authentication for fast handover in wireless mesh networks,” Computers and Security, vol. 47, pp. 124–142, 2013. View at Google Scholar
  11. Y. Yu, Z. Ning, and L. Guo, “A secure routing scheme based on social network analysis in wireless mesh networks,” Science China Information Sciences, vol. 59, no. 12, article 122310, 2016. View at Publisher · View at Google Scholar
  12. D. S. Wong, “Security analysis of two anonymous authentication protocols for distributed wireless networks,” in Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom '05), pp. 532–536, Kauai Island, Hawaii, USA, 2005. View at Publisher · View at Google Scholar
  13. M. Ayyash, H. Elgala, A. Khreishah et al., “Coexistence of WiFi and LiFi toward 5G: concepts, opportunities, and challenges,” IEEE Communications Magazine, vol. 54, no. 2, pp. 64–71, 2016. View at Publisher · View at Google Scholar · View at Scopus
  14. Y. Li, F. Yao, T. Lan, and G. Venkataramani, “SARRE: semantics-aware rule recommendation and enforcement for event paths on android,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 12, pp. 2748–2762, 2016. View at Publisher · View at Google Scholar
  15. K. Ren, S. Yu, W. Lou, and Y. Zhang, “PEACE: a novel privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 2, pp. 203–215, 2010. View at Publisher · View at Google Scholar · View at Scopus
  16. V. S. Miller, “Use of elliptic curves in cryptography,” in Proceedings of the Advances in Cryptology (CRYPTO '85), Lecture Notes in Computer Science, pp. 417–426. View at Publisher · View at Google Scholar · View at MathSciNet
  17. D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing,” SIAM Journal on Computing, vol. 32, no. 3, pp. 586–615, 2003. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  18. V. Kumar and R. Kumar, “Prevention of blackhole attack using certificateless signature (CLS) scheme in MANET,” in Security Solutions for Hyperconnectivity and the Internet of Things, vol. 130, IGI Global, 2016. View at Google Scholar
  19. Y. Yu, C. Xu, and X. Huang, “An efficient anonymous proxy signature scheme with provable security,” Computer Standards and Interfaces, vol. 31, no. 2, pp. 348–353, 2009. View at Publisher · View at Google Scholar
  20. P. F. Syverson and P. C. van Oorschot, “On unifying some cryptographic protocol logics,” in Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, pp. 14–28, May 1994. View at Scopus
  21. W. Zhao, A. Zhang, J. Li et al., “Analysis and design of an authentication protocol for space information network,” in Proceedings of the IEEE Military Communications Conference (MILCOM '16), pp. 43–48, Baltimore, MD, USA, 2016. View at Publisher · View at Google Scholar
  22. S. D. Galbraith, K. Harrison, and D. Soldera, “Implementing the tate pairing,” in Proceedings of the International Algorithmic Number Theory Symposium, pp. 324–337, Sydney, Australia, 2002.