A Novel Identity Authentication Scheme of Wireless Mesh Network Based on Improved Kerberos Protocol

被引:1
|
作者
Li, Min [1 ]
Lv, Xin
Song, Wei [1 ,2 ]
Zhou, Wenhuan
Qi, Rongzhi [1 ]
Su, Huaizhi [3 ]
机构
[1] Hohai Univ, HHU, Coll Comp & Informat, Nanjing, Jiangsu, Peoples R China
[2] Off Jiangsu Prov Flood Control & Drought Relief H, Nanjing, Jiangsu, Peoples R China
[3] Hohai Univ, HHU, Coll Water Conservancy & Hydropower Engn, Nanjing, Jiangsu, Peoples R China
来源
PROCEEDINGS OF THIRTEENTH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING AND SCIENCE, (DCABES 2014) | 2014年
基金
中国国家自然科学基金;
关键词
Kerberos protocol; public key encryption; Wireless Mesh network; identity Authentication;
D O I
10.1109/DCABES.2014.41
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The traditional Kerberos protocol exists some limitations in achieving clock synchronization and storing key, meanwhile, it is vulnerable from password guessing attack and attacks caused by malicious software. In this paper, a new authentication scheme is proposed for wireless mesh network. By utilizing public key encryption techniques, the security of the proposed scheme is enhanced. Besides, timestamp in the traditional protocol is replaced by random numbers to implementation cost. The analysis shows that the improved authentication protocol is fit for wireless Mesh network, which can make identity authentication more secure and efficient.
引用
收藏
页码:190 / 194
页数:5
相关论文
共 50 条
  • [1] Research on Hadoop Identity Authentication Based on Improved Kerberos Protocol
    Hu, Daming
    Chen, Deyun
    Zhang, Yuanxu
    Pei, Shujun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (11): : 429 - 438
  • [2] Kerberos Based Authentication Protocol With Improved Identity Protection in 3G Network
    Shrestha, Anish Prasad
    Park, Kyu Jin
    Park, Jae Sung
    Choi, Dong-You
    Han, Seung-Jo
    PROCEEDINGS OF THE 2009 PACIFIC-ASIA CONFERENCE ON CIRCUITS, COMMUNICATIONS AND SYSTEM, 2009, : 771 - 774
  • [3] A Network Authentication Protocol Based on Kerberos
    El-Emam, Eman
    Koutb, Magdy
    Kelash, Hamdy
    Allah, Osama Farag
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (08): : 17 - 26
  • [4] Improved Authentication Model Based on Kerberos Protocol
    You, Xine
    Zhang, Lingfeng
    ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 593 - 599
  • [5] Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network
    Tianhan Gao
    Fangting Peng
    Nan Guo
    EURASIP Journal on Wireless Communications and Networking, 2016
  • [6] Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network
    Gao, Tianhan
    Peng, Fangting
    Guo, Nan
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
  • [7] A Wireless Mesh Network Authentication Method based on Identity Based Signature
    Liu Wenju
    Shang Yuzhen
    Wang Ze
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3026 - 3029
  • [8] An Improved User Authentication Scheme for Wireless Mesh Networks
    Cui Xinchun
    Wang Xinheng
    2009 IEEE INTERNATIONAL SYMPOSIUM ON IT IN MEDICINE & EDUCATION, VOLS 1 AND 2, PROCEEDINGS, 2009, : 915 - 918
  • [9] A New Wireless Mesh Network Authentication Scheme Based on Threshold Method
    Yang, Yatao
    Gu, Yonghao
    Tan, Xi
    Ma, Lina
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2260 - 2265
  • [10] Scalable Authentication Protocol for Wireless Mesh Network Access
    Wang Ze
    Wang Qi
    Liu Wenju
    Ke Yongzhen
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3051 - 3054