2010 IEEE Second International Conference on Social Computing 2010
DOI: 10.1109/socialcom.2010.163
|View full text |Cite
|
Sign up to set email alerts
|

Location-Based Kerberos Authentication Protocol

Abstract: Online communication offers organizations greater efficiency. However, online processes increase the threat level during message transfer. This necessitates researchers to develop and improve security protocols in order to enhance the security of communication lines. Despite the evaluation and acceptance of many authentication protocols, online communications remain insecure. we propose to add the user's physical location as a new authentication factor into Kerberos protocol and call it N-Kerberos protocol, an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…Other authentication such as Kerberos will give a ticket for accessing certain application or service. When receive a ticket user will represent a ticket to the application before be granted [7]. This method although look strong but it still can be sniff through technology hacking which been up to date as per today.…”
Section: Discussionmentioning
confidence: 99%
“…Other authentication such as Kerberos will give a ticket for accessing certain application or service. When receive a ticket user will represent a ticket to the application before be granted [7]. This method although look strong but it still can be sniff through technology hacking which been up to date as per today.…”
Section: Discussionmentioning
confidence: 99%
“…It interacts with the user by using a textual interface and it needs to implement or input the properties of finite state systems by using computational tree logic (CTL) or logic temporal language (LTL) formulas to help with the verification procedure. Some researchers used this tool as a formal verification tool to verify the properties of security protocol as in Panti et al [28] who used the NuSMV model checker to verify the security properties of the Kerberos protocol [29]. The authors built a transition states diagram model to represent the Kerberos protocol flow in an understandable method.…”
Section: Verification Toolsmentioning
confidence: 99%
“…A user cannot login if the Kerberos server is down. The problem has been addressed by using N-Kerberos (multiple Kerberos) [7]. In this project work, it has shown how single point of failure could be removed to solve or to minimize the first drawback of Kerberos stated in the section of Major hindrance of Kerberos.…”
Section: Problem Formulation Of the Researchmentioning
confidence: 99%