Walshe, M., Epiphaniou, G., Al-Khateeb, H., Hammoudeh, M., Katos, V. and Dehghantanha, A., 2019. Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments. Ad Hoc Networks, 95, 101988.
Full text available as:
|
PDF
adhoc2019_epiphaniou_et_al.pdf - Accepted Version Available under License Creative Commons Attribution Non-commercial No Derivatives. 1MB | |
Copyright to original material in this document is with the original owner(s). Access to this content through BURO is granted on condition that you use it only for research, scholarly or other non-commercial purposes. If you wish to use it for any other purposes, you must contact BU via BURO@bournemouth.ac.uk. Any third party copyright material in this document remains the property of its respective owner(s). BU grants no licence for further use of that third party material. |
DOI: 10.1016/j.adhoc.2019.101988
Abstract
Current authentication protocols seek to establish authenticated sessions over insecure channels while maintaining a small footprint considering the energy consumption and computational overheads. Traditional authentication schemes must store a form of authentication data on the devices, putting this data at risk. Approaches based on purely public/private key infrastructure come with additional computation and maintenance costs. This work proposes a novel non-interactive zero-knowledge (NIZKP) authentication protocol that incorporates the limiting factors in IoT communication devices and sensors. Our protocol considers the inherent network instability and replaces the ZKP NP-hard problem using the Merkle tree structure for the creation of the authentication challenge. A series of simulations evaluate the performance of NIZKP against traditional ZKP approaches based on graph isomorphism. A set of performance metrics has been used, namely the channel rounds for client authentication, effects of the authentication processes, and the protocol interactions to determine areas of improvements. The simulation results indicate empirical evidence for the suitability of our NIKP approach for authentication purposes in resource-constrained IoT environments.
Item Type: | Article |
---|---|
ISSN: | 1570-8705 |
Uncontrolled Keywords: | IoT; ZKP; NIZKP; Authentication; WSN; ANOVA |
Group: | Faculty of Science & Technology |
ID Code: | 33655 |
Deposited By: | Symplectic RT2 |
Deposited On: | 06 Mar 2020 16:51 |
Last Modified: | 14 Mar 2022 14:20 |
Downloads
Downloads per month over past year
Repository Staff Only - |