{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:19:20Z","timestamp":1773155960743,"version":"3.50.1"},"reference-count":46,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2022,1,30]],"date-time":"2022-01-30T00:00:00Z","timestamp":1643500800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002261","name":"Russian Foundation for Basic Research","doi-asserted-by":"publisher","award":["20-37-90009"],"award-info":[{"award-number":["20-37-90009"]}],"id":[{"id":"10.13039\/501100002261","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"<jats:p>Authentication protocols are expanding their application scope in wireless information systems, among which are low-orbit satellite communication systems (LOSCS) for the OneWeb space Internet, automatic object identification systems using RFID, the Internet of Things, intelligent transportation systems (ITS), Vehicular Ad Hoc Network (VANET). This is due to the fact that authentication protocols effectively resist a number of attacks on wireless data transmission channels in these systems. The main disadvantage of most authentication protocols is the use of symmetric and asymmetric encryption systems to ensure high cryptographic strength. As a result, there is a problem in delivering keys to the sides of the prover and the verifier. At the same time, compromising of keys will lead to a decrease in the level of protection of the transmitted data. Zero-knowledge authentication protocols (ZKAP) are able to eliminate this disadvantage. However, most of these protocols use multiple rounds to authenticate the prover. Therefore, ZKAP, which has minimal time costs, is developed in the article. A scheme for adapting protocol parameters has been developed in this protocol to increase its efficiency. Reductions in the level of confidentiality allow us to reduce the time spent on the execution of the authentication protocol. This increases the volume of information traffic. At the same time, an increase in the confidentiality of the protocol entails an increase in the time needed for authentication of the prover, which reduces the volume of information traffic. The FPGA Artix-7 xc7a12ticsg325-1L was used to estimate the time spent implementing the adaptive ZKAP protocol. Testing was performed for 32- and 64-bit adaptive authentication protocols.<\/jats:p>","DOI":"10.3390\/a15020050","type":"journal-article","created":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T01:46:08Z","timestamp":1643593568000},"page":"50","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Adaptive Authentication Protocol Based on Zero-Knowledge Proof"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0286-7391","authenticated-orcid":false,"given":"Nikita Konstantinovich","family":"Chistousov","sequence":"first","affiliation":[{"name":"Department of Information Security of Automated Systems, North-Caucasus Federal University Stavropol, 1 Pushkina Str., 355017 Stavropol, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9854-5310","authenticated-orcid":false,"given":"Igor Anatolyevich","family":"Kalmykov","sequence":"additional","affiliation":[{"name":"Department of Information Security of Automated Systems, North-Caucasus Federal University Stavropol, 1 Pushkina Str., 355017 Stavropol, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5764-6000","authenticated-orcid":false,"given":"Daniil Vyacheslavovich","family":"Dukhovnyj","sequence":"additional","affiliation":[{"name":"Department of Information Security of Automated Systems, North-Caucasus Federal University Stavropol, 1 Pushkina Str., 355017 Stavropol, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1583-6316","authenticated-orcid":false,"given":"Maksim Igorevich","family":"Kalmykov","sequence":"additional","affiliation":[{"name":"Department of Information Security of Automated Systems, North-Caucasus Federal University Stavropol, 1 Pushkina Str., 355017 Stavropol, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2719-6624","authenticated-orcid":false,"given":"Aleksandr Anatolyevich","family":"Olenev","sequence":"additional","affiliation":[{"name":"Stavropol State Pedagogical Institute, 417 Lenina Str., 355009 Stavropol, Russia"}]}],"member":"1968","published-online":{"date-parts":[[2022,1,30]]},"reference":[{"key":"ref_1","unstructured":"(2021, October 25). OneWeb. Available online: https:\/\/oneweb.net\/."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Henri, Y. (2020). The OneWeb Satellite System. Handbook of Small Satellites, Springer.","DOI":"10.1007\/978-3-030-36308-6_67"},{"key":"ref_3","first-page":"72","article-title":"An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography","volume":"2","author":"Debiao","year":"2014","journal-title":"IEEE Internet Things J."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Liu, Z., Zhang, W., and Wu, C. (2015, January 4\u20136). A Lightweight Code-Based Authentication Protocol for RFID Systems. Proceedings of the International Conference Applications and Techniques Information Security, Beijing, China.","DOI":"10.1007\/978-3-662-48683-2_11"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"7081","DOI":"10.1109\/TII.2019.2942389","article-title":"Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment","volume":"16","author":"Srinivas","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"7273","DOI":"10.1109\/ACCESS.2018.2890389","article-title":"Ultralightweight Mutual Authentication RFID Protocol for Blockchain Enabled Supply Chains","volume":"7","author":"Michail","year":"2019","journal-title":"IEEE Access."},{"key":"ref_7","unstructured":"Xiong, C. (2020). Secured System Architecture for the Internet of Things Using a Two Factor Authentication Protocol, University of Ottawa."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"4319","DOI":"10.1007\/s11227-016-1856-y","article-title":"Design of secure authentication scheme between devices based on zero-knowledge proofs in home automation service environments","volume":"72","author":"Kang","year":"2016","journal-title":"J. Supercomput."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/j.eij.2020.10.001","article-title":"IoT security system with modified Zero Knowledge Proof algorithm for authentication","volume":"22","author":"Soewito","year":"2021","journal-title":"Egypt. Inform. J."},{"key":"ref_10","first-page":"1","article-title":"Energy Efficient Optimal Routing for Communication in VANETs via Clustering Model","volume":"242","author":"Elhoseny","year":"2019","journal-title":"Emerg. Technol. Connect. Internet Veh. Intell. Transp. Syst. Netw."},{"key":"ref_11","unstructured":"Hamdi, M.M., Audah, L., Abduljabbar, S., and Hamid, A. (2020, January 26\u201328). A Review of Applications, Characteristics and Challenges in Vehicular Ad Hoc Networks (VANETs). Proceedings of the 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Ankara, Turkey."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/s11235-010-9400-5","article-title":"Vehicular ad hoc networks (VANETS): Status, results, and challenges","volume":"50","author":"Zeadally","year":"2012","journal-title":"Telecommun. Syst."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1155\/2019\/2423915","article-title":"A Comprehensive Survey on VANET Security Services in Traffic Management System","volume":"2019","author":"Sheikh","year":"2019","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Arif, M., Wang, G., Geman, O., Balas, V.E., Tao, P., Brezulianu, A., and Chen, J. (2020). SDN-based VANETs, Security Attacks, Applications, and Challenges. Appl. Sci., 10.","DOI":"10.3390\/app10093217"},{"key":"ref_15","first-page":"2042","article-title":"A Secured Data Transmission in VANET using Dual Group Keys and Frequent Data Identification","volume":"14","author":"Sundareswaran","year":"2017","journal-title":"Taga J."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Kang, J., Elmehdwi, Y., and Lin, D. (2018, January 8\u201310). SLIM: Secure and Lightweight Identity Management in VANETs with Minimum Infrastructure Reliance. Proceedings of the International Conference on Security and Privacy in Communication Systems, Singapore.","DOI":"10.1007\/978-3-319-78813-5_45"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/s11042-011-0789-y","article-title":"Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks","volume":"66","author":"Daeinabi","year":"2013","journal-title":"Multimed. Tools Appl."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Hegde, N., and Manvi, S.S. (2019, January 25\u201328). MFZKAP: Multi Factor Zero Knowledge Proof Authentication for Secure Service in Vehicular Cloud Computing. Proceedings of the 2019 Second International Conference on Advanced Computational and Communication Paradigms (ICACCP), Gangtok, India.","DOI":"10.1109\/ICACCP.2019.8882961"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1016\/j.jnca.2013.08.004","article-title":"A survey on vehicular cloud computing","volume":"40","author":"Whaiduzzaman","year":"2014","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Chen, Y., and Sion, R. (2010, January 4). On securing untrusted clouds with cryptography. Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society, New York, NY, USA.","DOI":"10.1145\/1866919.1866935"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.jnca.2015.10.005","article-title":"Authentication in mobile cloud computing: A survey","volume":"61","author":"Alizadeh","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Li, H., Dai, Y., Tian, L., and Yang, H. (2009, January 21\u201325). Identity-Based Authentication for Cloud Computing. Proceedings of the IEEE International Conference on Cloud Computing, Bangalore, India.","DOI":"10.1007\/978-3-642-10665-1_14"},{"key":"ref_23","unstructured":"Lipton, B. (2016, January 10\u201315). Zero-Knowledge Proof and Authentication Protocols. Proceedings of the IEEE Conference on Computer Communications, Phoenix, AZ, USA."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Liu, X., Yang, Y., Xu, E., and Jia, Z. (2019, January 15\u201316). An Authentication Scheme in VANETs Based on Group Signature. Proceedings of the International Conference on Intelligent Computing, Mukalla, Yemen.","DOI":"10.1007\/978-3-030-26763-6_34"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"62584","DOI":"10.1109\/ACCESS.2018.2876126","article-title":"An Efficient and Secure Anonymous Authentication Scheme for VANETs Based on the Framework of Group Signatures","volume":"6","author":"Yue","year":"2018","journal-title":"IEEE Access"},{"key":"ref_26","unstructured":"Hao, Y., Cheng, Y., and Ren, K. (December, January 30). Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs. Proceedings of the IEEE Conference and Exhibition on Global Telecommunications (GLOBECOM), New Orleans, LA, USA."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"867","DOI":"10.1109\/TITS.2019.2899321","article-title":"Adaptive Group-Based Zero Knowledge Proof-Authentication Protocol in Vehicular Ad Hoc Networks","volume":"21","author":"Rasheed","year":"2019","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_28","first-page":"248","article-title":"Improving vehicular authentication in VANET using cryptography","volume":"10","author":"Tian","year":"2018","journal-title":"Int. J. Commun. Netw. Inf. Secur."},{"key":"ref_29","first-page":"102779","article-title":"Clustering method and symmetric\/asymmetric cryptography scheme adapted to securing urban VANET networks","volume":"58","author":"Alaya","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"2439","DOI":"10.1007\/s10586-017-0848-x","article-title":"Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks","volume":"20","author":"Pandi","year":"2017","journal-title":"Clust. Comput."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"575","DOI":"10.26599\/TST.2018.9010131","article-title":"Lattice-based double-authentication-preventing ring signature for security and privacy in vehicular Ad-Hoc networks","volume":"24","author":"Jinhui","year":"2019","journal-title":"Tsinghua Sci. Technol."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"5463","DOI":"10.1109\/JSYST.2020.2980297","article-title":"Efficient Lattice-Based Ring Signature for Message Authentication in VANETs","volume":"14","author":"Pravin","year":"2020","journal-title":"IEEE Syst. J."},{"key":"ref_33","first-page":"867","article-title":"V-LDAA: A New Lattice-Based Direct Anonymous Attestation Scheme for VANETs System","volume":"2021","author":"Liquan","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"ref_34","unstructured":"Stallings, W. (2013). Cryptography and Network Security: Principles and Practice, Pearson. [6th ed.]."},{"key":"ref_35","unstructured":"Schneier, B. (1996). Applied Cryptography\u2014Protocols, Algorithms, and Source Code in C, John Wiley & Sons. [2nd ed.]."},{"key":"ref_36","unstructured":"Kahate, A. (2013). Cryptography and Network Security, Tata McGraw-Hill Education."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1080\/00207160.2015.1011629","article-title":"An efficient statistical zero-knowledge authentication protocol for smart cards","volume":"93","author":"Dousti","year":"2015","journal-title":"Int. J. Comput. Math."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/s12083-015-0409-0","article-title":"An improved smart card based authentication scheme for session initiation protocol","volume":"10","author":"Kumari","year":"2017","journal-title":"Peer-Peer Netw. Appl."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"101988","DOI":"10.1016\/j.adhoc.2019.101988","article-title":"Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments","volume":"95","author":"Walshe","year":"2019","journal-title":"Ad Hoc Netw."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Assidi, H., Ayebie, E.B., and Souidi, E.M. (2018, January 28\u201330). Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs for RFID Systems. Proceedings of the International Conference on Information Security and Cryptology, Seoul, Korea.","DOI":"10.1007\/978-3-319-78556-1_15"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"113270","DOI":"10.1016\/j.dss.2020.113270","article-title":"Secure attribute-based search in RFID-based inventory control systems","volume":"132","author":"Doss","year":"2020","journal-title":"Decis. Support Syst."},{"key":"ref_42","first-page":"24","article-title":"A Secure Way of Cloud Supported user Identification for Internet of Things using Feige\u2013Fiat\u2013Shamir Identification Scheme","volume":"6","author":"Dixit","year":"2021","journal-title":"J. Web Dev. Web Des."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Al-Adhami, A.H., Ambroze, M., Stengel, I., and Tomlinson, M. (2019, January 27\u201328). An Effencient Improvement of RFID Authentication Protocol Using Hash Function ZKP. Proceedings of the 2019 2nd Scientific Conference of Computer Sciences (SCCS), Baghdad, Iraq.","DOI":"10.1109\/SCCS.2019.8852614"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Zhang, C., Lin, X., Lu, R., and Ho, P.-H. (2008, January 19\u201323). RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks. Proceedings of the 2008 IEEE International Conference on Communications, Beijing, China.","DOI":"10.1109\/ICC.2008.281"},{"key":"ref_45","first-page":"416","article-title":"A Verifiable Random Function with Short Proofs and Keys","volume":"3386","author":"Dodis","year":"2005","journal-title":"Int. Workshop Public Key Cryptogr."},{"key":"ref_46","unstructured":"(2021, October 17). Secure Password Check. Available online: https:\/\/password.kaspersky.com."}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/15\/2\/50\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:11:24Z","timestamp":1760134284000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/15\/2\/50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,30]]},"references-count":46,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2022,2]]}},"alternative-id":["a15020050"],"URL":"https:\/\/doi.org\/10.3390\/a15020050","relation":{},"ISSN":["1999-4893"],"issn-type":[{"value":"1999-4893","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,30]]}}}