验证ZKP认证过程的方法框架

Jeffrey Young, A. Rasheed, Ray R. Heshemi, Ayman Bagabas
{"title":"验证ZKP认证过程的方法框架","authors":"Jeffrey Young, A. Rasheed, Ray R. Heshemi, Ayman Bagabas","doi":"10.1109/honet50430.2020.9322828","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) is completely transforming the way network-connected devices are made. Manufacturers and intelligent transportation systems are using thousands of IoT devices and machine-to-machine communication to drive industrial automation. Existing access control schemes for IoT authentication fail to support user anonymity. They rely on the surrendering of the device/user authentication parameters to the trusted server, which hence can be utilized by the IoT infrastructure to track users' behavioral patterns. Furthermore, existing access control mechanisms lack the support of run-time integrity assessment capabilities that are used to verify the authenticity of an authentication process during execution. This paper presents a parametrized crypto-based privacy-preserving authentication protocol that support anonymity, it is based on Zero Knowledge Proof (ZKP). Without the loss of anonymity, a methodological framework for bootstrapping a parametrized authentication process's integrity is introduced herein. We show that run-time integrity assessment of an authentication process running on an IoT device can be achieved through the utilization of the IoT device's physical characteristics, specifically energy consumption and computation time. Behavioral patterns based on the device's power/energy consumption for the ZKP-based protocol were captured and recorded during this effort. In addition, fine-grained behavioral patterns that capture the authentication protocol's processing time were collected and analyzed. To validate the proposed scheme, it was fully implemented and deployed on an IoT testbed. We have tested the performance of the proposed scheme in terms of power consumption and computation time.","PeriodicalId":245321,"journal":{"name":"2020 IEEE 17th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Methodological Framework for Validating ZKP Authentication Process\",\"authors\":\"Jeffrey Young, A. Rasheed, Ray R. Heshemi, Ayman Bagabas\",\"doi\":\"10.1109/honet50430.2020.9322828\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things (IoT) is completely transforming the way network-connected devices are made. Manufacturers and intelligent transportation systems are using thousands of IoT devices and machine-to-machine communication to drive industrial automation. Existing access control schemes for IoT authentication fail to support user anonymity. They rely on the surrendering of the device/user authentication parameters to the trusted server, which hence can be utilized by the IoT infrastructure to track users' behavioral patterns. Furthermore, existing access control mechanisms lack the support of run-time integrity assessment capabilities that are used to verify the authenticity of an authentication process during execution. This paper presents a parametrized crypto-based privacy-preserving authentication protocol that support anonymity, it is based on Zero Knowledge Proof (ZKP). Without the loss of anonymity, a methodological framework for bootstrapping a parametrized authentication process's integrity is introduced herein. We show that run-time integrity assessment of an authentication process running on an IoT device can be achieved through the utilization of the IoT device's physical characteristics, specifically energy consumption and computation time. Behavioral patterns based on the device's power/energy consumption for the ZKP-based protocol were captured and recorded during this effort. In addition, fine-grained behavioral patterns that capture the authentication protocol's processing time were collected and analyzed. To validate the proposed scheme, it was fully implemented and deployed on an IoT testbed. We have tested the performance of the proposed scheme in terms of power consumption and computation time.\",\"PeriodicalId\":245321,\"journal\":{\"name\":\"2020 IEEE 17th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET)\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE 17th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/honet50430.2020.9322828\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 17th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/honet50430.2020.9322828","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

物联网(IoT)正在彻底改变网络连接设备的制造方式。制造商和智能交通系统正在使用成千上万的物联网设备和机器对机器通信来推动工业自动化。现有的物联网认证访问控制方案不支持用户匿名。它们依赖于将设备/用户身份验证参数提交给可信服务器,因此物联网基础设施可以利用这些参数来跟踪用户的行为模式。此外,现有的访问控制机制缺乏运行时完整性评估功能的支持,而运行时完整性评估功能用于在执行期间验证身份验证过程的真实性。提出了一种基于零知识证明(Zero Knowledge Proof, ZKP)的支持匿名的参数化加密隐私保护认证协议。在不丧失匿名性的前提下,提出了一种引导参数化认证过程完整性的方法框架。我们表明,通过利用物联网设备的物理特性,特别是能耗和计算时间,可以实现在物联网设备上运行的认证过程的运行时完整性评估。在此过程中,捕获并记录了基于zkp协议的设备功率/能量消耗的行为模式。此外,还收集和分析了捕获身份验证协议处理时间的细粒度行为模式。为了验证所提出的方案,它被完全实施并部署在物联网测试平台上。我们从功耗和计算时间方面测试了所提出方案的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Methodological Framework for Validating ZKP Authentication Process
The Internet of Things (IoT) is completely transforming the way network-connected devices are made. Manufacturers and intelligent transportation systems are using thousands of IoT devices and machine-to-machine communication to drive industrial automation. Existing access control schemes for IoT authentication fail to support user anonymity. They rely on the surrendering of the device/user authentication parameters to the trusted server, which hence can be utilized by the IoT infrastructure to track users' behavioral patterns. Furthermore, existing access control mechanisms lack the support of run-time integrity assessment capabilities that are used to verify the authenticity of an authentication process during execution. This paper presents a parametrized crypto-based privacy-preserving authentication protocol that support anonymity, it is based on Zero Knowledge Proof (ZKP). Without the loss of anonymity, a methodological framework for bootstrapping a parametrized authentication process's integrity is introduced herein. We show that run-time integrity assessment of an authentication process running on an IoT device can be achieved through the utilization of the IoT device's physical characteristics, specifically energy consumption and computation time. Behavioral patterns based on the device's power/energy consumption for the ZKP-based protocol were captured and recorded during this effort. In addition, fine-grained behavioral patterns that capture the authentication protocol's processing time were collected and analyzed. To validate the proposed scheme, it was fully implemented and deployed on an IoT testbed. We have tested the performance of the proposed scheme in terms of power consumption and computation time.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信