ORIGINAL RESEARCH article
Front. Phys.
Sec. Social Physics
Volume 13 - 2025 | doi: 10.3389/fphy.2025.1579521
An Anonymous Secure Authentication Method for Tourist Attraction Network Based Edge Computing
Provisionally accepted- 1College of Tourism Management, Guizhou University of Commerce, Guiyang, China
- 2Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences (CAS), Shenzhen, Guangdong Province, China
Select one of your emails
You have multiple emails registered with Frontiers:
Notify me on publication
Please enter your email address:
If you already have an account, please login
You don't have a Frontiers account ? You can register here
In order to meet the demand for lightweight, anonymous and trustworthy authentication for tourist attraction networks in edge computing environments, an ECC-based anonymous authentication mechanism is designed. This mechanism uses pseudo-randomly generated identities to cover the real identity of the tourists, which ensures the anonymity of the scheme. The security of mutual authentication between the tourist and the edge computing server is increased with the help of smart card technology. At the same time, the mechanism also has the ability to guarantee security in case of smart card theft. The introduction of timestamps effectively enhances the scheme's ability against replay attack. The security of the scheme is analyzed using BAN logic and non-formal analysis methods, respectively. Finally, after comprehensive analysis and comparison, the results show that the scheme has high practical value.
Keywords: Anonymous, Edge computing, Secure, authentication, Tourist attraction
Received: 19 Feb 2025; Accepted: 28 Apr 2025.
Copyright: © 2025 Zhou and Zhuang. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
* Correspondence: Xuefan Zhou, College of Tourism Management, Guizhou University of Commerce, Guiyang, China
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.