CFP last date
20 January 2025
Reseach Article

Enhancing Captive Portal Authentication with Zero-Knowledge Proofs (ZKP)

by Gogulakrishnan Thiyagarajan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 48
Year of Publication: 2024
Authors: Gogulakrishnan Thiyagarajan
10.5120/ijca2024924144

Gogulakrishnan Thiyagarajan . Enhancing Captive Portal Authentication with Zero-Knowledge Proofs (ZKP). International Journal of Computer Applications. 186, 48 ( Nov 2024), 43-51. DOI=10.5120/ijca2024924144

@article{ 10.5120/ijca2024924144,
author = { Gogulakrishnan Thiyagarajan },
title = { Enhancing Captive Portal Authentication with Zero-Knowledge Proofs (ZKP) },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2024 },
volume = { 186 },
number = { 48 },
month = { Nov },
year = { 2024 },
issn = { 0975-8887 },
pages = { 43-51 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number48/enhancing-captive-portal-authentication-with-zero-knowledge-proofs-zkp/ },
doi = { 10.5120/ijca2024924144 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-11-27T00:39:23.328855+05:30
%A Gogulakrishnan Thiyagarajan
%T Enhancing Captive Portal Authentication with Zero-Knowledge Proofs (ZKP)
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 48
%P 43-51
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Captive portals are widely used to authenticate users in public and semi-public networks; still, they face significant issues regarding user privacy and security. Traditional authentication schemes, such as combinations of usernames and passwords or social logins, often violate users' privacy and are exposed to various attacks. This paper promotes the adoption of Zero-Knowledge Proofs (ZKP) to enhance the security and confidentiality of captive portal authentication systems. Zero-Knowledge Proof (ZKP) allows users to prove authentication without exposing any information in a secure and privacy-preserving way. This paper gives a conceptual framework for integrating ZKP into captive portal systems, identifies significant advantages like better security and user anonymity, and constrains the dominant challenges during implementation. These findings propose that ZKP significantly strengthens the process of captive portal authentication, mainly by removing concerns connected with privacy and reducing risks related to attacks on user credentials. In addition, the concrete applications of Zero-Knowledge Proofs in this setting are discussed, and suggestions for future research toward further generalizing and optimizing the proposed solution are given.

References
  1. Wikipedia Contributors, "Captive Portal," Wikipedia, 2023.
  2. A. Pathak, T. Patil, S. Pawar, P. Raut, and S. Khairnar, "Secure Authentication using Zero Knowledge Proof," in 2021 Asian Conference on Innovation in Technology (ASIANCON), Pune, India, Aug. 27-29, 2021, DOI: 10.1109/ASIANCON51346.2021.9544807.
  3. C. Garcia, D. Kumar, and M. Brown, "Non-Interactive Zero-Knowledge Proofs for Privacy-Preserving Authentication in Public Networks," IEEE Access, vol. 11, pp. 1503-1515, 2023.
  4. Halimatussa’diyah, "Access Point Implementation to Unifi Device with RADIUS and Captive Portal Authentication Method in PT XYZ," 2019.
  5. J. D. Siregar and A. Chusyairi, "Implementasi Authentication Captive Portal Pada Wireless Local Area Network di PT. St. Morita Industries," Jikom: Jurnal Informatika Dan Komputer, 2024.
  6. F. L. Aryeh, M. Asante, and A. Danso, "Securing Wireless Network Using pfSense Captive Portal with Radius Authentication – A Case Study at UMaT," 2016.
  7. M. Rivera-Dourado, M. Gestal, A. Pazos, and J. Vázquez-Naya, "A Novel Protocol Using Captive Portals for FIDO2 Network Authentication," ArXiv, 2024.
  8. M. Zhang, Q. Liu, and D. Wang, "Understanding User Privacy Risks in Public Networks," arXiv preprint arXiv:1907.02142, 2019.
  9. N. Sombatruang, Y. Kadobayashi, M. A. Sasse, M. Baddeley, and D. Miyamoto, "The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan," in 2018 16th Annual Conference on Privacy, Security and Trust (PST), Belfast, UK, Aug. 28-30, 2018, DOI: 10.1109/PST.2018.8514208.
  10. N. Cheng, X. O. Wang, W. Cheng, P. Mohapatra, and A. Seneviratne, "Characterizing privacy leakage of public WiFi networks for users on travel," in 2013 Proceedings IEEE INFOCOM, Turin, Italy, Apr. 14-19, 2013, DOI: 10.1109/INFCOM.2013.6567086.
  11. Y. Ang, "Zero-knowledge protocol network authentication and monitoring," 2024.
  12. M. Ahmad, G. Tripathi, F. Siddiqui, M. Alam, and M. Ahad, "BAuth-ZKP—A blockchain-based multi-factor authentication mechanism for securing smart cities," Sensors, 2023.
  13. A. Albuali, "A Zero-Trust-Based Identity Management Model for Volunteer Cloud Computing," 2021.
  14. D. Gabay, "A privacy framework for decentralized applications using blockchains and zero-knowledge proofs," 2019.
  15. A. Berentsen, J. Lenzi, and R. Nyffenegger, "An Introduction to Zero-Knowledge Proofs in Blockchains and Economics," Review, 2023.
  16. R. Lavin, X. Liu, H. Mohanty, L. Norman, G. Zaarour, and B. Krishnamachari, "A Survey on the Applications of Zero-Knowledge Proofs," ArXiv, 2024.
  17. M. A. Cabot-Nadal, B. Playford, M. Payeras-Capellà, S. Gerske, M. Mut-Puigserver, and R. Pericàs-Gornals, "Private Identity-Related Attribute Verification Protocol Using SoulBound Tokens and Zero-Knowledge Proofs," in 2023 7th Cyber Security in Networking Conference (CSNet), 2023.
  18. R. Ma, K. Hwang, M. Li, and Y. Miao, "Trusted Model Aggregation With Zero-Knowledge Proofs in Federated Learning," IEEE Transactions on Parallel and Distributed Systems, 2024.
  19. W. Shalannanda, "Using Zero-Knowledge Proof in Privacy-Preserving Networks," in 2023 17th International Conference on Telecommunication Systems, Services, and Applications (TSSA), Lombok, Indonesia, Oct. 12-13, 2023, DOI: 10.1109/TSSA59948.2023.10367041.
  20. R. Singh, A. Dwivedi, and R. Mukkamala, "Privacy-preserving ledger for blockchain and Internet of Things-enabled cyber-physical systems," 2022.
Index Terms

Computer Science
Information Sciences
Security

Keywords

Captive Portal Zero-Knowledge Proofs Authentication Privacy Security