A METHODOLOGICAL FRAMEWORK FOR VALIDATING ZKP AUTHENTICATION PROCESS

被引:0
|
作者
Young, Jeffrey A. [1 ]
Rasheed, Amar [2 ]
Heshemi, Ray R. [3 ]
Bagabas, Ayman [3 ]
机构
[1] Clemson Univ, Dept Comp Sci, Clemson, SC 29634 USA
[2] Shsu, Dept Comp Sci, Huntsville, TX USA
[3] Georgia Southern Univ, Dept Comp Sci, Savannah, GA USA
关键词
IoT; Zero-Knowledge Proof; Integrity; Authentication; INTERNET; SECURITY; PRIVACY; SCHEME; THINGS;
D O I
10.1109/HONET50430.2020.9322828
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things (IoT) is completely transforming the way network-connected devices are made. Manufacturers and intelligent transportation systems are using thousands of IoT devices and machine-to-machine communication to drive industrial automation. Existing access control schemes for IoT authentication fail to support user anonymity. They rely on the surrendering of the device/user authentication parameters to the trusted server, which hence can be utilized by the IoT infrastructure to track users' behavioral patterns. Furthermore, existing access control mechanisms lack the support of run-time integrity assessment capabilities that are used to verify the authenticity of an authentication process during execution. This paper presents a parametrized crypto-based privacy-preserving authentication protocol that support anonymity, it is based on Zero Knowledge Proof (ZKP). Without the loss of anonymity, a methodological framework for bootstrapping a parametrized authentication process's integrity is introduced herein. We show that run-time integrity assessment of an authentication process running on an IoT device can be achieved through the utilization of the IoT device's physical characteristics, specifically energy consumption and computation time. Behavioral patterns based on the device's power/energy consumption for the ZKP-based protocol were captured and recorded during this effort. In addition, fine-grained behavioral patterns that capture the authentication protocol's processing time were collected and analyzed. To validate the proposed scheme, it was fully implemented and deployed on an IoT testbed. We have tested the performance of the proposed scheme in terms of power consumption and computation time.
引用
收藏
页码:37 / 43
页数:7
相关论文
共 50 条
  • [21] BAuth-ZKP-A Blockchain-Based Multi-Factor Authentication Mechanism for Securing Smart Cities
    Ahmad, Md. Onais
    Tripathi, Gautami
    Siddiqui, Farheen
    Alam, Mohammad Afshar
    Ahad, Mohd Abdul
    Akhtar, Mohd Majid
    Casalino, Gabriella
    [J]. SENSORS, 2023, 23 (05)
  • [22] Methodological moderators in validating biographical data in personnel selection
    Bliesener, T
    [J]. JOURNAL OF OCCUPATIONAL AND ORGANIZATIONAL PSYCHOLOGY, 1996, 69 : 107 - 120
  • [23] VALIDATING HEALTH ECONOMIC MODELS: DEVELOPING A METHODOLOGICAL APPROACH
    Hart, W. M.
    Chandler, F.
    [J]. VALUE IN HEALTH, 2012, 15 (07) : A490 - A490
  • [24] A methodological framework for the hydrological model selection process in water resource management projects
    Ghonchepour, Diba
    Sadoddin, Amir
    Bahremand, Abdolreza
    Croke, Barry
    Jakeman, Anthony
    Salmanmahiny, Abdolrassoul
    [J]. NATURAL RESOURCE MODELING, 2021, 34 (03)
  • [25] A methodological framework for defining 'typological process': the transformation of the residential environment in Ankara, Turkey
    Gokce, Duygu
    Chen, Fei
    [J]. JOURNAL OF URBAN DESIGN, 2019, 24 (03) : 469 - 493
  • [26] A CONCEPTUAL-FRAMEWORK AND METHODOLOGICAL CRITERIA FOR FAMILY-THERAPY PROCESS RESEARCH
    PINSOF, WM
    [J]. JOURNAL OF CONSULTING AND CLINICAL PSYCHOLOGY, 1989, 57 (01) : 53 - 59
  • [27] Methodological Framework to Collect, Process, Analyze and Visualize Cyber Threat Intelligence Data
    Borges Amaro, Lucas Jose
    Percilio Azevedo, Bruce William
    Lopes de Mendonca, Fabio Lucio
    Giozza, William Ferreira
    Albuquerque, Robson de Oliveira
    Garcia Villalba, Luis Javier
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (03):
  • [28] The Reviewing Process: Validating Results
    Galiana, Ignacio
    Cerrada, Pablo
    [J]. IEEE ROBOTICS & AUTOMATION MAGAZINE, 2012, 19 (01) : 100 - +
  • [29] Cue utilization in the product authentication process: a framework and research agenda for product counterfeit prevention
    Fejes, Zoltan
    Wilson, Jeremy
    [J]. INTERNATIONAL JOURNAL OF COMPARATIVE AND APPLIED CRIMINAL JUSTICE, 2013, 37 (04) : 317 - 340
  • [30] Validating Tantra Framework using entropy
    Prabhu, Shreekanth M.
    Murthy, K. N. Balasubramanya
    Subramanyam, Natarajan
    [J]. SOCIAL NETWORK ANALYSIS AND MINING, 2019, 9 (01)