ECAUT:基于零知识证明的 ECC 注入式物联网系统高效身份验证

M. Prakash, K. Ramesh
{"title":"ECAUT:基于零知识证明的 ECC 注入式物联网系统高效身份验证","authors":"M. Prakash, K. Ramesh","doi":"10.1007/s11227-024-06427-9","DOIUrl":null,"url":null,"abstract":"<p>The Internet of Things (IoT) has seen significant growth, enabling connectivity and intelligence in various domains which use RFID communication most. However, this growth has also brought forth significant security challenges, particularly concerning replay attacks, which have troubled previous works. In our study, we introduce an innovative security solution that uses elliptic curve cryptography (ECC) with zero-knowledge proof (ZKP) specifically tailored for RFID-communicated applications. By leveraging ECC with ZKP, we not only improve the security of IoT systems but also reduce the persistent threat of replay attacks. Unlike traditional methods, our approach ensures that sensitive data is securely transmitted and authenticated without the risk of unauthorized duplication. We validated our approach using Scyther and BAN logic, well-known tools for assessing security protocols. These validations confirm the robustness of our solution in addressing security challenges and provide further assurance of its effectiveness in protecting IoT systems against various threats, including replay attacks. Our comprehensive analysis revealed that our approach outperforms existing solutions in terms of communication costs and computation costs. The improved efficiency in these key areas underscores the practicality and viability of our solution, further solidifying its position as a leading option for safeguarding IoT ecosystems against emerging threats.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"ECAUT: ECC-infused efficient authentication for internet of things systems based on zero-knowledge proof\",\"authors\":\"M. Prakash, K. Ramesh\",\"doi\":\"10.1007/s11227-024-06427-9\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>The Internet of Things (IoT) has seen significant growth, enabling connectivity and intelligence in various domains which use RFID communication most. However, this growth has also brought forth significant security challenges, particularly concerning replay attacks, which have troubled previous works. In our study, we introduce an innovative security solution that uses elliptic curve cryptography (ECC) with zero-knowledge proof (ZKP) specifically tailored for RFID-communicated applications. By leveraging ECC with ZKP, we not only improve the security of IoT systems but also reduce the persistent threat of replay attacks. Unlike traditional methods, our approach ensures that sensitive data is securely transmitted and authenticated without the risk of unauthorized duplication. We validated our approach using Scyther and BAN logic, well-known tools for assessing security protocols. These validations confirm the robustness of our solution in addressing security challenges and provide further assurance of its effectiveness in protecting IoT systems against various threats, including replay attacks. Our comprehensive analysis revealed that our approach outperforms existing solutions in terms of communication costs and computation costs. The improved efficiency in these key areas underscores the practicality and viability of our solution, further solidifying its position as a leading option for safeguarding IoT ecosystems against emerging threats.</p>\",\"PeriodicalId\":501596,\"journal\":{\"name\":\"The Journal of Supercomputing\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-08-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The Journal of Supercomputing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1007/s11227-024-06427-9\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Journal of Supercomputing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1007/s11227-024-06427-9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

物联网(IoT)取得了长足的发展,在使用 RFID 通信最多的各个领域实现了连接和智能。然而,这种增长也带来了巨大的安全挑战,尤其是重放攻击,这困扰着以往的研究。在我们的研究中,我们介绍了一种创新的安全解决方案,该方案使用椭圆曲线加密算法(ECC)和零知识证明(ZKP),专为 RFID 通信应用量身定制。通过利用带有 ZKP 的 ECC,我们不仅提高了物联网系统的安全性,还降低了重放攻击的持续威胁。与传统方法不同,我们的方法可确保敏感数据的安全传输和验证,而不会出现未经授权的复制风险。我们使用著名的安全协议评估工具 Scyther 和 BAN 逻辑验证了我们的方法。这些验证证实了我们的解决方案在应对安全挑战方面的稳健性,并进一步保证了它在保护物联网系统免受包括重放攻击在内的各种威胁方面的有效性。我们的综合分析表明,我们的方法在通信成本和计算成本方面优于现有解决方案。在这些关键领域效率的提高凸显了我们解决方案的实用性和可行性,进一步巩固了其作为保护物联网生态系统免受新兴威胁的领先选择的地位。
本文章由计算机程序翻译,如有差异,请以英文原文为准。

摘要图片

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
ECAUT: ECC-infused efficient authentication for internet of things systems based on zero-knowledge proof

The Internet of Things (IoT) has seen significant growth, enabling connectivity and intelligence in various domains which use RFID communication most. However, this growth has also brought forth significant security challenges, particularly concerning replay attacks, which have troubled previous works. In our study, we introduce an innovative security solution that uses elliptic curve cryptography (ECC) with zero-knowledge proof (ZKP) specifically tailored for RFID-communicated applications. By leveraging ECC with ZKP, we not only improve the security of IoT systems but also reduce the persistent threat of replay attacks. Unlike traditional methods, our approach ensures that sensitive data is securely transmitted and authenticated without the risk of unauthorized duplication. We validated our approach using Scyther and BAN logic, well-known tools for assessing security protocols. These validations confirm the robustness of our solution in addressing security challenges and provide further assurance of its effectiveness in protecting IoT systems against various threats, including replay attacks. Our comprehensive analysis revealed that our approach outperforms existing solutions in terms of communication costs and computation costs. The improved efficiency in these key areas underscores the practicality and viability of our solution, further solidifying its position as a leading option for safeguarding IoT ecosystems against emerging threats.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A quadratic regression model to quantify certain latest corona treatment drug molecules based on coindices of M-polynomial Data integration from traditional to big data: main features and comparisons of ETL approaches End-to-end probability analysis method for multi-core distributed systems A cloud computing approach to superscale colored traveling salesman problems Approximating neural distinguishers using differential-linear imbalance
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1