A resilient group session key authentication methodology for secured peer to peer networks using zero knowledge protocol

Thivaharan, S (2023) A resilient group session key authentication methodology for secured peer to peer networks using zero knowledge protocol. Optik, 273. p. 170345. ISSN 00304026

[thumbnail of A resilient group session key authentication methodology for secured peer to peer networks using zero knowledge protocol.pdf] Text
A resilient group session key authentication methodology for secured peer to peer networks using zero knowledge protocol.pdf - Published Version

Download (246kB)

Abstract

This novel methodology develops a Pseudo Trust in Peer-to-Peer networks using Lagrange Interpolation and Zero-Knowledge Protocol and creates a non-forgeable pseudonym. Authentication of a peer can be done without disclosing any sensitive information by using Zero-Knowledge Protocol. Each node in a peer maintains a unique I.D. It is not necessary to reveal the credential information at the time of verification. The implementation of distributed trust model is done incrementally in P2P networks. This proposed methodology generates different polynomials at the source and destination, respectively. After creating polynomials, authentication is performed using a challenge-based system (Zero-Knowledge Protocol) by exchanging pseudo-random numbers. Source and destination generate the same polynomial without exchanging any secret information. This polynomial can be used for encryption and decryption. The proposed algorithm is analysed by considering three parameters of network Throughput, the number of packets dropped and the number of packets delivered. These results measure the performance of the proposed algorithm applied in Peer-to-Peer networks over public networks.

Item Type: Article
Uncontrolled Keywords: Confidentiality; Key authentication; Lagrange interpolations; Novel methodology; NS-2; Peer-to-peer networks; Pseudo trust; Session key; Sources and destinations; Zero-knowledge protocols
Subjects: C Computer Science and Engineering > Computer Networks
C Computer Science and Engineering > Network Security
C Computer Science and Engineering > Cryptography
Divisions: Computer Science and Engineering
Depositing User: Users 5 not found.
Date Deposited: 16 Jul 2024 08:49
Last Modified: 16 Aug 2024 09:48
URI: https://ir.psgitech.ac.in/id/eprint/804

Actions (login required)

View Item
View Item