Effectiveness of the NIZKP Protocol for Authentication in IoT Environment

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Elliptic Curves when compared to other encryptions scheme such as RSA etc., provides an equivalent security, smaller key sizes, less power consumption, faster calculations, less bandwidth used and is more suitable for Internet of Things devices. In addition of encrypting the data, the devices in the network should also be able to authenticate themselves, which can be achieved with the implementation of “Non-Interactive Zero Knowledge protocol” (NIZKP). This protocol involves two parties: The prover and the Verifier. Prover party should prove to the Verifier that they have the knowledge of something, without revealing what is it. In this paper, a study of Schnorr protocol or ∑- protocol over Elliptic Curves is done and the protocol is implemented in Python using the Python Cryptography Toolkit PyCrypto which is a collection of cryptographic modules implementing various algorithms and protocols. Finally, the results were compared with Elliptic Curve Diffie-Hellmann(ECDH) and present a performance evaluation of the protocols on the Raspberry Pi 3B model, a credit-card sized computer used for the development of IoT devices hence the perfect platforms to test the protocol.



  • Keywords

    NIZKP, ECC, Internet of Things, Raspberry Pi, Elliptic Curve Diffie-Hellman.

  • References

      [1] Isha and A. Luhach, "Analysis of Lightweight Cryptographic Solutions for Internet of Things", Indian Journal of Science and Technology, vol. 9, no. 28, p. 7, 2016.

      [2] Chatzigiannakis, A. Pyrgelis, P. G. Spirakis, and Y. C. Stamatiou, “Elliptic Curve Based Zero Knowledge Proofs and their Applicability on Resource Constrained Devices,” 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, pp. 715–720, Jul. 2011.

      [3] F. Martín-Fernández, P. Caballero-Gil, and C. Caballero-Gil, “Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things,” Sensors, vol. 16, no. 1, p. 75, Jul. 2016.

      [4] I.-H. Chuang, B.-J. Guo, J.-S. Tsai, and Y.-H. Kuo, “Multi-graph Zero-knowledge-based authentication system in Internet of Things,” 2017 IEEE International Conference on Communications (ICC), May 2017.

      [5] A. P. Haripriya and K. Kulothungan, "ECC based self-certified key management scheme for mutual authentication in Internet of Things," 2016 International Conference on Emerging Technological Trends (ICETT), Kollam, 2016, pp. 1-6.

      [6] T. Yalçin, "Compact ECDSA engine for IoT applications," in Electronics Letters, vol. 52, no. 15, pp. 1310-1312, 7 21 2016.

      [7] P. Flood and M. Schukat, "Peer to peer authentication for small embedded systems: A zero-knowledge-based approach to security for the Internet of Things," The 10th International Conference on Digital Technologies 2014, Zilina, 2014, pp. 68-72.

      [8] M. Nawir, A. Amir, N. Yaakob and O. B. Lynn, "Internet of Things (IoT): Taxonomy of security attacks" 2016 3rd International Conference on Electronic Design (ICED), Phuket, 2016, pp. 321-326.

      [9] Schnorr, C.P., “Efficient signature generation by smart cards”, Journal of cryptology, vol. 4, no. 3,1991, pp.161-174.

      [10] Raspberry Pi. (2017). Raspberry Pi FAQs – Frequently Asked Questions.[online] Available at: https://www.raspberrypi.org/help/faqs/




Article ID: 10775
DOI: 10.14419/ijet.v7i2.6.10775

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.