Smart City Gnosys

Smart city article details

Title A Methodological Framework For Validating Zkp Authentication Process
ID_Doc 2596
Authors Young J.A.; Rasheed A.; Heshemi R.R.; Bagabas A.
Year 2020
Published HONET 2020 - IEEE 17th International Conference on Smart Communities: Improving Quality of Life using ICT, IoT and AI
DOI http://dx.doi.org/10.1109/HONET50430.2020.9322828
Abstract The Internet of Things (IoT) is completely transforming the way network-connected devices are made. Manufacturers and intelligent transportation systems are using thousands of IoT devices and machine-to-machine communication to drive industrial automation. Existing access control schemes for IoT authentication fail to support user anonymity. They rely on the surrendering of the device/user authentication parameters to the trusted server, which hence can be utilized by the IoT infrastructure to track users' behavioral patterns. Furthermore, existing access control mechanisms lack the support of run-time integrity assessment capabilities that are used to verify the authenticity of an authentication process during execution. This paper presents a parametrized crypto-based privacy-preserving authentication protocol that support anonymity, it is based on Zero Knowledge Proof (ZKP). Without the loss of anonymity, a methodological framework for bootstrapping a parametrized authentication process's integrity is introduced herein. We show that run-time integrity assessment of an authentication process running on an IoT device can be achieved through the utilization of the IoT device's physical characteristics, specifically energy consumption and computation time. Behavioral patterns based on the device's power/energy consumption for the ZKP-based protocol were captured and recorded during this effort. In addition, fine-grained behavioral patterns that capture the authentication protocol's processing time were collected and analyzed. To validate the proposed scheme, it was fully implemented and deployed on an IoT testbed. We have tested the performance of the proposed scheme in terms of power consumption and computation time. © 2020 IEEE.
Author Keywords Authentication; Integrity; loT; Zero-Knowledge Proof


Similar Articles


Id Similarity Authors Title Published
62175 View0.877Ramezan G.; Meamari E.Zk-Iot: Securing The Internet Of Things With Zero-Knowledge Proofs On Blockchain Platforms2024 IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2024 (2024)
43117 View0.867Dwivedi A.D.; Singh R.; Ghosh U.; Mukkamala R.R.; Tolba A.; Said O.Privacy Preserving Authentication System Based On Non-Interactive Zero Knowledge Proof Suitable For Internet Of ThingsJournal of Ambient Intelligence and Humanized Computing, 13, 10 (2022)