Further Improvements to the Kerberos Timed Authentication Protocol

被引:0
|
作者
Kirsal, Y. [1 ]
Gemikonakli, O. [1 ]
机构
[1] Middlesex Univ, London NW4 4BT, England
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication mechanisms coupled with strong encryption techniques are used for security purposes; however, at times, well-equipped intruders succeed in breaking encryption and compromising data integrity, confidentiality and trust. Kerberos is a widely used computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. This paper presents an approach that involves temporary interruption to link/server access with a new authentication protocol that delays the decryption with timed authentication. The analysis and verification of authentication properties and results of the designed protocol arc presented.
引用
收藏
页码:549 / 554
页数:6
相关论文
共 50 条
  • [31] Security analysis and implementation of JUIT-Image Based Authentication system using Kerberos protocol
    Nitin, Del
    Chauhan, Durg Singh
    Sehgal, Vivek Kumar
    Mahanot, Ankit
    Singh, Pallavi
    Ahuja, Sohit
    Shrivastava, Utkarsh
    Rana, Manisha
    Punjabi, Vineet
    Vinay, Shivam
    Sharma, Nakul
    7TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE IN CONJUNCTION WITH 2ND IEEE/ACIS INTERNATIONAL WORKSHOP ON E-ACTIVITY, PROCEEDINGS, 2008, : 575 - +
  • [32] Secure Authentication Using Biometric Templates in Kerberos
    Maheshwari, Radhika
    Gupta, Apoorva
    Chandra, Nidhi
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1247 - 1250
  • [33] A lightweight authentication and authorization solution based on Kerberos
    Zhang, Nan
    Wu, Xiaoyu
    Yang, Cheng
    Shen, Yinghua
    Cheng, Yingye
    PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 742 - 746
  • [34] KERBEROS - AN AUTHENTICATION SERVICE FOR COMPUTER-NETWORKS
    NEUMAN, BC
    TSO, T
    IEEE COMMUNICATIONS MAGAZINE, 1994, 32 (09) : 33 - 38
  • [35] An Anonymous Authentication Mechanism Based on Kerberos and HIBC
    Fan Linna
    Song Xiaofeng
    Zhao Weiwei
    Ran Haodan
    Li Jingzhi
    Shi Deyang
    Mu Suining
    Qi Tao
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON EDUCATION TECHNOLOGY AND COMPUTERS (ICETC 2018), 2018, : 392 - 396
  • [36] A Browser-Based Kerberos Authentication Scheme
    Gajek, Sebastian
    Jager, Tibor
    Manulis, Mark
    Schwenk, Joeg
    COMPUTER SECURITY - ESORIC 2008, PROCEEDINGS, 2008, 5283 : 115 - +
  • [37] Protecting Biometrics Using Fuzzy Extractor and Non-invertible Transformation Methods in Kerberos Authentication Protocol
    Thi Ai Thao Nguyen
    Tran Khanh Dang
    TRANSACTIONS ON LARGE-SCALE DATA- AND KNOWLEDGE-CENTERED SYSTEMS XXXI: SPECIAL ISSUE ON DATA AND SECURITY ENGINEERING, 2017, 10140 : 47 - 66
  • [38] A distributed expansible authentication model based on Kerberos
    Liu, Hongjun
    Luo, Ping
    Wang, Daoshun
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2008, 31 (04) : 472 - 486
  • [39] A Kerberos-based authentication architecture for WLANS
    Kaafar, MA
    Ben Azzouz, L
    Kamoun, F
    NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY, III, 2005, 165 : 43 - 55
  • [40] A Token Authentication Solution for Hadoop Based on Kerberos Pre-Authentication
    Zheng, Kai
    Jiang, Weihua
    2014 INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ADVANCED ANALYTICS (DSAA), 2014, : 354 - 360