IoT security system with modified Zero Knowledge Proof algorithm for authentication

It has been predicted that more devices will be connected to the internet network along with the development of IoT, and that will increase the complexity in the security system. The most important thing in security systems is the process of encryption and authentication. Various encryption techniqu...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Egyptian informatics journal 2021-09, Vol.22 (3), p.269-276
Hauptverfasser: Soewito, Benfano, Marcellinus, Yonathan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:It has been predicted that more devices will be connected to the internet network along with the development of IoT, and that will increase the complexity in the security system. The most important thing in security systems is the process of encryption and authentication. Various encryption techniques are developed to overcome security problems of the data. One of the methods used for authentication of data is Zero Knowledge Proof. This method works to identify the authenticity of someones statement to proof without showing any knowledge of the statement mentioned. This research will mainly discuss about the security of data transmission system by combining data encryption and data authentication. The proposed data encryption is using Advanced Encryption System and method for authentication of data using the Zero Knowledge Proof. This research will conduct the development methods of authentication Zero Knowledge Proof from previous research and the result was compared with the proposed method based on the simulation results transmission system client and server. Experiments will be conducted using thirty-text data, each of data will be measured on the performance of both encryption and authentication process between the previous method and proposed method. Experimental results show the performance of the proposed method has better speed to process application for security of data transmission systems, with performance to authenticate approximately 5 ms from the client side and server side.
ISSN:1110-8665
2090-4754
DOI:10.1016/j.eij.2020.10.001