A privacy-enhanced OAuth 2.0 based protocol for Smart City mobile applications

Victor Sucasas, Georgios Mantas, Saud Althunibat, Leonardo Oliveira, Angelos Antonopoulos, Ifiok Otung, Jonathan Rodriguez

    Research output: Contribution to journalArticlepeer-review

    Abstract

    In the forthcoming Smart City scenario, Service Providers will require users to authenticate themselves and authorize their mobile applications to access their remote accounts. In this scenario, OAuth 2.0 has been widely adopted as a de facto authentication and authorization protocol. However, the current OAuth 2.0 protocol specification does not consider the user privacy issue and presents several vulnerabilities that can jeopardize users' privacy rights. Therefore, in this paper we propose an OAuth 2.0 based protocol for Smart City mobile applications that addresses the user privacy issue by integrating a pseudonym-based signature scheme and a signature delegation scheme into the OAuth 2.0 protocol flow. The proposed solution allows users to self-generate user-specific and app-specific pseudonyms on-demand and ensure privacy-enhanced user authentication at the Service Provider side. The proposed protocol has been validated with Proverif and its performance has been evaluated in terms of time and space complexity. Results show that the proposed protocol can provide users with efficient and effective means to authenticate towards service providers while preventing user tracking and impersonation from malicious entities located in the network side or in the users' mobile device.

    Original languageEnglish
    Pages (from-to)258-274
    JournalComputers and Security
    Volume74
    Early online date2 Feb 2018
    DOIs
    Publication statusPublished - 1 May 2018

    Keywords

    • Privacy-preserving
    • Authentication
    • Pseudonym-based signatures
    • OAuth 2.0
    • Smart City

    Fingerprint

    Dive into the research topics of 'A privacy-enhanced OAuth 2.0 based protocol for Smart City mobile applications'. Together they form a unique fingerprint.

    Cite this