A DISTRIBUTED AUTHENTICATION ARCHITECTURE AND PROTOCOL

被引:0
|
作者
Skracic, Kristian [1 ]
Pale, Predrag [1 ]
Jeren, Branko [1 ]
机构
[1] Sveuciliste Zagrebu, Fak Elektrotehnike & Racunarstva, Unska 3, Zagreb 10000, Croatia
来源
关键词
authentication factors; digital identity; distributed authentication architecture; distributed authentication protocol; distributed user authentication; PASSWORDS;
D O I
10.17559/TV-20151114105745
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Most user authentication methods rely on a single verifier being stored at a central location within the information system. Such information storage presents a single point of compromise from a security perspective. If this system is compromised it poses a direct threat to users' digital identities if the verifier can be extracted from the system. This paper proposes a distributed authentication environment in which there is no such single point of compromise. We propose an architecture that does not rely on a single verifier to authenticate users, but rather a distributed authentication architecture where several authentication servers are used to authenticate a user. We consider an authentication environment in which the user authentication process is distributed among independent servers. Each server independently performs its own authentication of the user, for example by asking the user to complete a challenge in order to prove his claim to a digital identity. The proposed architecture allows each server to use any authentication factor. We provide a security analysis of the proposed architecture and protocol, which shows they are secure against the attacks chosen in the analysis.
引用
收藏
页码:303 / 311
页数:9
相关论文
共 50 条
  • [1] A novel architecture of a strong and mutual authentication protocol for distributed systems
    Tbatou, Zakariae
    Asimi, Ahmed
    El Balmany, Chawki
    Asimi, Younes
    Guezzaz, Azidine
    Engineering Letters, 2020, 28 (02): : 268 - 279
  • [2] A Novel Architecture of a Strong and Mutual Authentication Protocol for Distributed Systems
    Tbatou, Zakariae
    Asimi, Ahmed
    El Balmany, Chawki
    Asimi, Younes
    Guezzaz, Azidine
    ENGINEERING LETTERS, 2020, 28 (02) : 268 - 279
  • [3] Maille authentication - A novel protocol for distributed authentication
    Fritz, A
    Paris, JF
    SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 309 - 322
  • [4] A distributed authentication protocol for VANET
    Liu, Hui
    Li, Hui
    Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2013, 47 (02): : 58 - 62
  • [5] Efficient Hierarchical Authentication Protocol for Multiserver Architecture
    Kou, Jiangheng
    He, Mingxing
    Xiong, Ling
    Lv, Zeqiong
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [6] An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture
    Huang, Huihui
    Lu, Siqi
    Wu, Zehui
    Wei, Qiang
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
  • [7] An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture
    Huihui Huang
    Siqi Lu
    Zehui Wu
    Qiang Wei
    EURASIP Journal on Wireless Communications and Networking, 2021
  • [8] A Software Integrity Authentication Protocol for Zero Trust Architecture
    Liu, Wenyi
    Zhang, Zheng
    Qiao, Xu
    Li, Yuanzhang
    Tan, Yu-an
    Meng, Weizhi
    PROCEEDINGS OF THE2024 SIGCOMM WORKSHOP ON ZERO TRUST ARCHITECTURE FOR NEXT GENERATION COMMUNICATIONS, ZTA-NEXTGEN 2024, 2024, : 1 - 6
  • [9] Active Authentication Protocol for IoV Environment with Distributed Servers
    Manikandan, Saravanan
    Rahaman, Mosiur
    Song, Yu-Lin
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (03): : 5789 - 5808
  • [10] Authentication protocol for loosely coupled distributed information system
    Xu, Ke
    Liu, Weidong
    Liu, Yaxiao
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (08): : 795 - 798