000 02682nam a22002057a 4500
003 OSt
005 20220107122839.0
008 180529b xxu||||| |||| 00| 0 eng d
040 _cIIITMK
100 _aAthira M O (93616008)
_914189
245 _aZKP protected Wi-Fi authentication & communication
300 _aMSC CS 2016-2018
500 _aThere has been an increase in the number of wireless devices being opted to carry out illicit cybercriminal activities such as system hacking, data forging, financial information threat, malicious attacks etc. Undoubtedly it causes a large amount of loss and therefore it is of paramount importance to improve the wireless communication security in order to fight back and secure the use of wireless networks. Our System provides an alternative login system that utilizes a challenge- response model based on zero knowledge proofs. Zero knowledge authentication schemes explore the use of zero knowledge interactive proofs as an alternative model for user authentication. There are several potential weaknesses of the current canonical model of wifi authentication, and zero knowledge authentication schemes solve some of these problems . The Zero-Knowledge Proof is a concept used in many cryptography systems. It allows a party to prove that he/she knows something (i.e. credential), without having to send over the value of the credential. ”ZKP Protected Wi-Fi Authentication and Communication” will be used to prove the password of the user without sending actual password.. The purpose of the implementation is to make confidential and secure authentication. The system also allows for no password hashes to be stored on the server. This system aims to implement this Zero knowledge proof features in a Wi-Fi to increase its security level. The importance of Cryptography in protecting the confidentiality of data transmission does improves the achievable communication security level along with the incorporation of multiple authentication approaches but still it needs to be enhanced. Thus, for user authentication, validation and data transfer Zero Knowledge Proof acts as a self-authenticated interactive protocol. ZKP eliminates the use of secure service infrastructures such as symmetric or asymmetric key encryption mechanisms also the central authority based authentication protocols. It proves to help mitigate the possible attacks while re-authentication and network service sharing.
502 _bMSC CS
_c2016-2018
_dINT
_eDr. Elizabeth Sherly
650 _aZKP
_914190
650 _aWIRELESS COMMUNICATION
_914191
650 _aWI-FI AUTHENTICATION
_914192
650 _aDATA TRANSMISSION
_914193
942 _2ddc
_cPR
999 _c6086
_d6086