A METHODOLOGICAL FRAMEWORK FOR VALIDATING ZKP AUTHENTICATION PROCESS

被引:0
|
作者
Young, Jeffrey A. [1 ]
Rasheed, Amar [2 ]
Heshemi, Ray R. [3 ]
Bagabas, Ayman [3 ]
机构
[1] Clemson Univ, Dept Comp Sci, Clemson, SC 29634 USA
[2] Shsu, Dept Comp Sci, Huntsville, TX USA
[3] Georgia Southern Univ, Dept Comp Sci, Savannah, GA USA
关键词
IoT; Zero-Knowledge Proof; Integrity; Authentication; INTERNET; SECURITY; PRIVACY; SCHEME; THINGS;
D O I
10.1109/HONET50430.2020.9322828
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things (IoT) is completely transforming the way network-connected devices are made. Manufacturers and intelligent transportation systems are using thousands of IoT devices and machine-to-machine communication to drive industrial automation. Existing access control schemes for IoT authentication fail to support user anonymity. They rely on the surrendering of the device/user authentication parameters to the trusted server, which hence can be utilized by the IoT infrastructure to track users' behavioral patterns. Furthermore, existing access control mechanisms lack the support of run-time integrity assessment capabilities that are used to verify the authenticity of an authentication process during execution. This paper presents a parametrized crypto-based privacy-preserving authentication protocol that support anonymity, it is based on Zero Knowledge Proof (ZKP). Without the loss of anonymity, a methodological framework for bootstrapping a parametrized authentication process's integrity is introduced herein. We show that run-time integrity assessment of an authentication process running on an IoT device can be achieved through the utilization of the IoT device's physical characteristics, specifically energy consumption and computation time. Behavioral patterns based on the device's power/energy consumption for the ZKP-based protocol were captured and recorded during this effort. In addition, fine-grained behavioral patterns that capture the authentication protocol's processing time were collected and analyzed. To validate the proposed scheme, it was fully implemented and deployed on an IoT testbed. We have tested the performance of the proposed scheme in terms of power consumption and computation time.
引用
收藏
页码:37 / 43
页数:7
相关论文
共 50 条
  • [1] ZMAM: A ZKP-Based Mutual Authentication Scheme for the IoMT
    Lv, Chaoyue
    Lu, Di
    Zhang, Yuanyuan
    Ma, Xindi
    Shen, Yulong
    Wang, Liping
    Ma, Jianfeng
    [J]. ARTIFICIAL INTELLIGENCE IN HEALTHCARE, PT II, AIIH 2024, 2024, 14976 : 263 - 278
  • [2] ZAMA: A ZKP-Based Anonymous Mutual Authentication Scheme for the IoV
    Xi, Ning
    Li, Weihui
    Jing, Lv
    Ma, Jianfeng
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (22): : 22903 - 22913
  • [3] A novel biometric authentication scheme with privacy protection based on SVM and ZKP
    Guo, Chunjie
    You, Lin
    Li, Xingyu
    Hu, Gengran
    Wang, Shengguo
    Cao, Chengtang
    [J]. COMPUTERS & SECURITY, 2024, 144
  • [4] Validating attacks on authentication protocols
    Hagalisletto, Anders Moen
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2007, : 362 - 369
  • [5] Chaotic ZKP Based Authentication and Key Distribution Scheme in Environmental Monitoring CPS
    Boubakri, Wided
    Abdallah, Walid
    Boudriga, Noureddine
    [J]. UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 472 - 483
  • [6] ZKP-based Lightweight Authentication protocol during handovers in Vehicular Networks
    Varma, Indukuri Mani
    Kumar, Neetesh
    [J]. IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 868 - 873
  • [7] Estimating and validating disability-adjusted life years at the global level: a methodological framework for cancer
    Soerjomataram, Isabelle
    Lortet-Tieulent, Joannie
    Ferlay, Jacques
    Forman, David
    Mathers, Colin
    Parkin, D. Maxwell
    Bray, Freddie
    [J]. BMC MEDICAL RESEARCH METHODOLOGY, 2012, 12
  • [8] Estimating and validating disability-adjusted life years at the global level: a methodological framework for cancer
    Isabelle Soerjomataram
    Joannie Lortet-Tieulent
    Jacques Ferlay
    David Forman
    Colin Mathers
    D Maxwell Parkin
    Freddie Bray
    [J]. BMC Medical Research Methodology, 12
  • [9] Airport Immigration Process: A Methodological Framework for a Generic Model of Knowledge
    Edrissi, Zineb
    Bouksour, Otmane
    Oukennou, Amina
    Beidouri, Zitouni
    [J]. 2022 14TH INTERNATIONAL COLLOQUIUM OF LOGISTICS AND SUPPLY CHAIN MANAGEMENT (LOGISTIQUA2022), 2022, : 429 - 437
  • [10] Epidemiology as a theoretical-methodological framework in the nurses' working process
    Prizybicien de Medeiros, Adeli Regina
    Larocca, Liliana Mueller
    Nolasco Chaves, Marta Maria
    Meier, Marineli Joaquim
    Wall, Marilene Loewen
    [J]. REVISTA DA ESCOLA DE ENFERMAGEM DA USP, 2012, 46 (06) : 1518 - 1522