ZKP protected Wi-Fi authentication & communication
Material type:
TextDescription: MSC CS 2016-2018Subject(s): Dissertation note: MSC CS 2016-2018 INT
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|
Project Reports
|
Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre | Non Fiction | Not for loan | R-1382 |
There has been an increase in the number of wireless devices being opted to carry out illicit
cybercriminal activities such as system hacking, data forging, financial information threat,
malicious attacks etc. Undoubtedly it causes a large amount of loss and therefore it is of paramount
importance to improve the wireless communication security in order to fight back and secure the
use of wireless networks. Our System provides an alternative login system that utilizes a challenge-
response model based on zero knowledge proofs. Zero knowledge authentication schemes explore
the use of zero knowledge interactive proofs as an alternative model for user authentication. There
are several potential weaknesses of the current canonical model of wifi authentication, and zero
knowledge authentication schemes solve some of these problems . The Zero-Knowledge Proof is
a concept used in many cryptography systems. It allows a party to prove that he/she knows
something (i.e. credential), without having to send over the value of the credential. ”ZKP Protected
Wi-Fi Authentication and Communication” will be used to prove the password of the user without
sending actual password.. The purpose of the implementation is to make confidential and secure
authentication. The system also allows for no password hashes to be stored on the server. This
system aims to implement this Zero knowledge proof features in a Wi-Fi to increase its security
level. The importance of Cryptography in protecting the confidentiality of data transmission does
improves the achievable communication security level along with the incorporation of multiple
authentication approaches but still it needs to be enhanced. Thus, for user authentication, validation
and data transfer Zero Knowledge Proof acts as a self-authenticated interactive protocol. ZKP
eliminates the use of secure service infrastructures such as symmetric or asymmetric key
encryption mechanisms also the central authority based authentication protocols. It proves to help
mitigate the possible attacks while re-authentication and network service sharing.
MSC CS 2016-2018 INT Dr. Elizabeth Sherly
There are no comments on this title.