TY - GEN
T1 - A Keyless Authentication Based on Zero-Knowledge Proof with SDN Link Information to Secure Permissionless P2P Networking
AU - Fan, Wenjun
AU - Wu, Siyuan
AU - Zou, Yuwen
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024/8
Y1 - 2024/8
N2 - Most trust models are identity based, which how-ever are not appropriate to the permissionless peer-to-peer (P2P) networking since anonymity is a built-in property in the cryptocurrency system (e.g., Bitcoin). Hence, there exists an inherent trade-off between anonymity and trust in the context of permissionless P2P networking system. This paper is motivated to propose a keyless authentication based on zero-knowledge proof. With this, peers can authenticate each other without disclosing any sensitive information. To this end, this approach leverages the software-defined networking (SDN) technique to facilitate the zero-knowledge proof so that the peer's link information can be identified while the proving process will never reveal any identity information. Therefore, the challenge-response exchange can prevent Man-in-the-Middle (MITM) attacks with minimal communication overhead. The experimental results built on the prototype show that this approach is efficient.
AB - Most trust models are identity based, which how-ever are not appropriate to the permissionless peer-to-peer (P2P) networking since anonymity is a built-in property in the cryptocurrency system (e.g., Bitcoin). Hence, there exists an inherent trade-off between anonymity and trust in the context of permissionless P2P networking system. This paper is motivated to propose a keyless authentication based on zero-knowledge proof. With this, peers can authenticate each other without disclosing any sensitive information. To this end, this approach leverages the software-defined networking (SDN) technique to facilitate the zero-knowledge proof so that the peer's link information can be identified while the proving process will never reveal any identity information. Therefore, the challenge-response exchange can prevent Man-in-the-Middle (MITM) attacks with minimal communication overhead. The experimental results built on the prototype show that this approach is efficient.
KW - Keyless Authentication
KW - Permissionless P2P Networking
KW - SDN
KW - Zero-Knowledge Proof
UR - http://www.scopus.com/inward/record.url?scp=85202795406&partnerID=8YFLogxK
U2 - 10.1109/ICC51166.2024.10622724
DO - 10.1109/ICC51166.2024.10622724
M3 - Conference Proceeding
AN - SCOPUS:85202795406
T3 - IEEE International Conference on Communications
SP - 133
EP - 139
BT - ICC 2024 - IEEE International Conference on Communications
A2 - Valenti, Matthew
A2 - Reed, David
A2 - Torres, Melissa
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 59th Annual IEEE International Conference on Communications, ICC 2024
Y2 - 9 June 2024 through 13 June 2024
ER -