Further Improvements to the Kerberos Timed Authentication Protocol

被引:0
|
作者
Kirsal, Y. [1 ]
Gemikonakli, O. [1 ]
机构
[1] Middlesex Univ, London NW4 4BT, England
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication mechanisms coupled with strong encryption techniques are used for security purposes; however, at times, well-equipped intruders succeed in breaking encryption and compromising data integrity, confidentiality and trust. Kerberos is a widely used computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. This paper presents an approach that involves temporary interruption to link/server access with a new authentication protocol that delays the decryption with timed authentication. The analysis and verification of authentication properties and results of the designed protocol arc presented.
引用
收藏
页码:549 / 554
页数:6
相关论文
共 50 条
  • [41] Attacks and improvements to chaotic map-based RFID authentication protocol
    Akgun, Mete
    Bayrak, Ali Osman
    Caglayan, Mehmet Ufuk
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4028 - 4040
  • [42] Practical attacks and improvements to an efficient radio frequency identification authentication protocol
    Erguler, Imran
    Anarim, Emin
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (17): : 2069 - 2080
  • [43] USING KERBEROS TO SECURE TLS PROTOCOL
    Raluca, Catargiu
    Monica, Borda
    2010 9TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS (ISETC), 2010, : 237 - 240
  • [44] A study on the peer-to-peer using Kerberos authentication
    Kim, DH
    Proceedings of the Third International Symposium on Magnetic Industry (ISMI'04) & First International Symposium on Physics and IT Industry (ISITI'04), 2005, : 252 - 254
  • [45] Securing Offline Delivery Services by Using Kerberos Authentication
    Li, Hui
    Niu, Yi
    Yi, Junkai
    Li, Hongyu
    IEEE ACCESS, 2018, 6 : 40735 - 40746
  • [46] An Improved Kerberos Intra-domain Authentication Protocol Based-On Certificateless Public-Key Cryptography
    Wang Juan
    Cao Man-cheng
    Fang Yuan-kang
    ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 2, 2011, 129 : 489 - 496
  • [47] Research on Unified Authentication Model based on the Kerberos and SAML
    Ding Linhua
    Wang Jiuru
    Wang Xiaojie
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 1053 - 1058
  • [48] Research and realization of authentication technique based on OTP and Kerberos
    Cheng Xiao-rong
    Feng Qi-yuan
    Dong Chao
    Zhang Ming-quan
    Eighth International Conference on High-Performance Computing in Asia-Pacific Region, Proceedings, 2005, : 409 - 413
  • [49] Electrocardiogram-Kerberos Authentication Scheme for Secure Services
    Prakasha, Krishna
    Muniyal, Balachandra
    Kavyashree
    Deeksha
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 91 - 94
  • [50] Distributed authentication in Kerberos using public key cryptography
    Sirbu, MA
    Chuang, JCI
    1997 SYMPOSIUM ON NETWORK AND DISTRIBUTED SYSTEM SECURITY, PROCEEDINGS, 1997, : 134 - 141