A Novel Identity Authentication Scheme of Wireless Mesh Network Based on Improved Kerberos Protocol
Title | A Novel Identity Authentication Scheme of Wireless Mesh Network Based on Improved Kerberos Protocol |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Min Li, Xin Lv, Wei Song, Wenhuan Zhou, Rongzhi Qi, Huaizhi Su |
Conference Name | Distributed Computing and Applications to Business, Engineering and Science (DCABES), 2014 13th International Symposium on |
Date Published | Nov |
ISBN Number | 978-1-4799-4169-8 |
Keywords | authentication, authentication protocol, Authorization, clock synchronization, cryptographic protocols, identity authentication, identity authentication scheme, improved Kerberos protocol, Kerberos protocol, malicious software, password guessing attack, Protocols, Public key, public key cryptography, public key encryption, random numbers, Servers, storing key, synchronisation, wireless mesh network, wireless mesh networks |
Abstract | The traditional Kerberos protocol exists some limitations in achieving clock synchronization and storing key, meanwhile, it is vulnerable from password guessing attack and attacks caused by malicious software. In this paper, a new authentication scheme is proposed for wireless mesh network. By utilizing public key encryption techniques, the security of the proposed scheme is enhanced. Besides, timestamp in the traditional protocol is replaced by random numbers to implementation cost. The analysis shows that the improved authentication protocol is fit for wireless Mesh network, which can make identity authentication more secure and efficient. |
URL | ieeexplore.ieee.org/document/6999085/ |
DOI | 10.1109/DCABES.2014.41 |
Citation Key | 6999085 |
- password guessing attack
- wireless mesh networks
- wireless mesh network
- synchronisation
- storing key
- Servers
- random numbers
- public key encryption
- public key cryptography
- Public key
- Protocols
- authentication
- malicious software
- Kerberos protocol
- improved Kerberos protocol
- identity authentication scheme
- identity authentication
- Cryptographic Protocols
- clock synchronization
- authorization
- authentication protocol