Journal
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING
Volume -, Issue -, Pages -Publisher
SPRINGER HEIDELBERG
DOI: 10.1007/s12652-021-03459-4
Keywords
Internet of Things; Smart cities; Healthcare; Authentication; Zero knowledge proof; Security; Privacy
Categories
Funding
- Independent Research Fund Denmark for Technology and Production [8022-00348A]
- Danish Ministry of Education and Science
- Digital Pilot Hub
- Skylab Digital
- Taif University, Taif, Saudi Arabia [TURSP-2020/60]
Ask authors/readers for more resources
With the advancement of smart technologies, the Internet of Things (IoT) has emerged as a key technology in smart cities, but user privacy remains a concern. This paper proposes a Zero Knowledge-based authentication scheme and a data encryption algorithm ZKNimble suitable for lightweight devices.
Nowadays, with the advancement of smart technologies, the Internet of Things (IoT) emerged as a booming technology that can provide better quality and facilities for the residents of smart cities. Smart cities can offer several services and have several applications in healthcare, transportation, education etc. Despite such a potential vision, the privacy of users on these IoT devices is a major concern. Most authentication schemes do not provide privacy and anonymity to legitimate users. to tackle this problem, we propose an efficient Zero Knowledge-based authentication scheme in the paper that authenticates devices on the network without knowing the information about user identity or revealing any other data entered by users. To explain our system framework at the micro-level, we apply our privacy-preserving scheme to IoT based healthcare applications, but it can easily be extended to the more general use cases where privacy-preserving authentication is required. This paper's second major contribution is designing the data encryption algorithm ZKNimble that is mainly suitable for lightweight devices. Once the user is authenticated using Zero Knowledge Proof, the ZKNimble cipher can be used for legitimate users' encryption and decryption processes.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available