NFC TECHNOLOGY AS A MEANS OF PROTECTED EXCHANGE OF IDENTIFICATION DATA BETWEEN PEER-TO-PEER NETWORK NODES
DOI:
https://doi.org/10.28925/2663-4023.2024.25.7988Keywords:
peer-to-peer network, NFC, encryption, verification, zero knowledge proof, identifier, GUID, RSAAbstract
The last decade has changed the trends of using peering networks. One of the areas of use of P2P networks is communication between people. Today, it is very important that communication is as protected as possible, especially if it is carried out between employees of the enterprise, because the number of cyber threats is constantly increasing. Modern approaches to the security of peering networks consist of data encryption, node authentication, detection and prevention of malicious nodes, access restriction, traffic monitoring, etc. However, one of the very first steps is the exchange of identification data itself, and this process must be as secure and secure as possible. The article proposes a method of secure exchange of identification data between peering network nodes, based on the use of NFC technology in combination with proof of zero knowledge. NFC is used for direct data exchange over the radio interface, which, thanks to its short range, makes it impossible to intercept data. To establish a connection, nodes must exchange identifiers, public encryption keys, and network addresses. In order to find out whether a node is not malicious, mutual verification of nodes using zero-knowledge proof is assumed. A unique identifier of the GUID type generated by each of the nodes acts as a secret that is not disclosed. Nodes first exchange public keys that encrypt and exchange identifiers. After decryption with their private keys, the nodes check whether the received value is equal to the initial one. In case of equality of values, the nodes are mutually verified and exchange identification data. The method proposed in the article is aimed at ensuring fault tolerance and confidentiality. It also provides protection against traffic interception attacks and the reliability of the verification process.
Downloads
References
Kupershtein, L. M., Krentsin, M. D., Dudatyev, A. V., & Kaplun, V. A. (2022). Analysis of Security Problems of Peer-To-Peer Networks. Information technology and computer engineering, 54(2), 5–14. https://doi.org/10.31649/1999-9941-2022-54-2-5-14
Ismail, A., & Kastner, W. (2016). Co-operative peer-to-peer systems for industrial middleware. 2016 IEEE World Conference on Factory Communication Systems (WFCS). https://doi.org/10.1109/wfcs.2016.7496497
Qureshi, H. (2019). P2P Networking. NAKAMOTO. https://nakamoto.com/p2p-networking
Suryono, R. R., Purwandari, B., & Budi, I. (2019). Peer to Peer (P2P) Lending Problems and Potential Solutions: A Systematic Literature Review. Procedia Computer Science, 161, 204–214. https://doi.org/10.1016/j.procs.2019.11.116
Tennakoon, P., Karunathilaka, S., Lavakumar, R., Alawatugoda, J., & Alawatugoda, J. (2023). Anonymous and Distributed Authentication for Peer-to-Peer Networks. Journal of Computer Science, 19(1), 1–10. https://doi.org/10.3844/jcssp.2023.1.10
Jain, G., & Dahiya, S. (2015). NFC: Advantages, Limits and Future Scope. International Journal on Cybernetics & Informatics, 4(4), 1–12. https://doi.org/10.5121/ijci.2015.4401
ISO/IEC 18092:2023. ISO. https://www.iso.org/standard/82095.html
% of Ukrainians replace live communication with virtual @ Transcarpathia online. Zakarpattia news online, Uzhgorod news, Zakarpattia news online. https://zakarpattya.net.ua/News/111470-64-ukraintsiv-zaminiuiut-zhyve-spilkuvannia-na-virtualne
Chen, C. H., Lin, I. C., & Yang, C. C. (2014). NFC Attacks Analysis and Survey. 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). https://doi.org/10.1109/imis.2014.66
Jawad, M., Serrano-Alvarado, P., & Valduriez, P. (2009). Protecting Data Privacy in Structured P2P Networks. Lecture Notes in Computer Science, 85–98. https://doi.org/10.1007/978-3-642-03715-3_8
Wang, E. K., Ye, Y., Yiu, S. M., & Hui, L. C. K. (2013). Privacy-Preserving P2P Information Sharing Protocol for Mobile Social Networks. International Journal of Computer and Communication Engineering, 338–342. https://doi.org/10.7763/ijcce.2013.v2.200
Wang, X., Yang, L., Sun, X., Han, J., Liang, W., & Huang, L. (2010). Survey of Anonymity and Authentication in P2P Networks. Information Technology Journal, 9(6), 1165–1171. https://doi.org/10.3923/itj.2010.1165.1171
Jagdale, B. N., & Bakal, J. W. (2020). A novel authentication and authorization scheme in P2P networking using location-based privacy. Evolutionary Intelligence. https://doi.org/10.1007/s12065-020-00375-y
Xu, X., Lu, H., & Chen, L. (2014). Defending Against sybil-attacks in Peer-to-Peer Networks. International Journal of Security and Its Applications, 8(4), 329–340. https://doi.org/10.14257/ijsia.2014.8.4.30
Folino, F., Folino, G., Pontieri, L., & Sabatino, P. (2017). A Peer-to-Peer Architecture for Detecting Attacks from Network Traffic and Log Data. 2017 International Conference on High Performance Computing & Simulation (HPCS). https://doi.org/10.1109/hpcs.2017.116
Kupershtein, L. M, Krentsin, M. D. (2021). Analysis of peer-to-peer networks trends. Herald of Khmelnytskyi national university, 299(4), 26–29. https://doi.org/10.31891/2307-5732-2021-299-4-26-29
Yin, K., Huang, H., Cohen-Or, D., & Zhang, H. (2018). P2P-NET. ACM Transactions on Graphics, 37(4), 1–13. https://doi.org/10.1145/3197517.3201288
Monteiro, D. M., Rodrigues, J. J. P. C., Lloret, J., & Sendra, S. (2013). A hybrid NFC-Bluetooth secure protocol for Credit Transfer among mobile phones. Security and Communication Networks, 7(2), 325–337. https://doi.org/10.1002/sec.732
Abouhogail, R. A. (2022). A New Secure Lightweight Authentication Protocol for NFC mobile Payment. International Journal of Communication Networks and Information Security (IJCNIS), 11(2). https://doi.org/10.17762/ijcnis.v11i2.4142
Seewoonauth, K., Rukzio, E., Hardy, R., & Holleis, P. (2009). Two NFC interaction techniques for quickly exchanging pictures between a mobile phone and a computer. 11th International Conference. ACM Press. https://doi.org/10.1145/1613858.1613909
Zhang, H., & Li, J. (2011). NFC in medical applications with wireless sensors. У 2011 International Conference on Electrical and Control Engineering (ICECE). https://doi.org/10.1109/iceceng.2011.6057534
Kumari, P. L. S., devi, C. H. S., Thivaharan, S., Srinivas, K., & Damodaram, A. (2022). A Resilient Group Session Key Authentication Methodology for Secured Peer to Peer Networks using Zero Knowledge Protocol. Optik, 170345. https://doi.org/10.1016/j.ijleo.2022.170345
Nemec, M., Sys, M., Svenda, P., Klinec, D., & Matyas, V. (2017). The Return of Coppersmith’s Attack. CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. https://doi.org/10.1145/3133956.3133969
Barker, E. B., & Dang, Q. H. (2015). Recommendation for Key Management Part 3: Application-Specific Key Management Guidance. National Institute of Standards and Technology. https://doi.org/10.6028/nist.sp.800-57pt3r1
RFC 4122: A Universally Unique IDentifier (UUID) URN Namespace. IETF Datatracker. https://datatracker.ietf.org/doc/html/rfc4122
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Михайло Кренцін, Леонід Куперштейн

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.