A DISTRIBUTED AUTHENTICATION ARCHITECTURE AND PROTOCOL

被引:0
|
作者
Skracic, Kristian [1 ]
Pale, Predrag [1 ]
Jeren, Branko [1 ]
机构
[1] Sveuciliste Zagrebu, Fak Elektrotehnike & Racunarstva, Unska 3, Zagreb 10000, Croatia
来源
关键词
authentication factors; digital identity; distributed authentication architecture; distributed authentication protocol; distributed user authentication; PASSWORDS;
D O I
10.17559/TV-20151114105745
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Most user authentication methods rely on a single verifier being stored at a central location within the information system. Such information storage presents a single point of compromise from a security perspective. If this system is compromised it poses a direct threat to users' digital identities if the verifier can be extracted from the system. This paper proposes a distributed authentication environment in which there is no such single point of compromise. We propose an architecture that does not rely on a single verifier to authenticate users, but rather a distributed authentication architecture where several authentication servers are used to authenticate a user. We consider an authentication environment in which the user authentication process is distributed among independent servers. Each server independently performs its own authentication of the user, for example by asking the user to complete a challenge in order to prove his claim to a digital identity. The proposed architecture allows each server to use any authentication factor. We provide a security analysis of the proposed architecture and protocol, which shows they are secure against the attacks chosen in the analysis.
引用
收藏
页码:303 / 311
页数:9
相关论文
共 50 条
  • [21] Distributed Security Architecture for Authentication in 4G Networks
    Niranjani, D.
    Durga, M. Ganaga
    2016 IEEE INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER APPLICATIONS (ICACA), 2016, : 286 - 291
  • [22] A Distributed User Authentication Mechanism for 6TiSCH Protocol
    Aydin, Hakan
    Gormus, Sedat
    2018 2ND INTERNATIONAL SYMPOSIUM ON MULTIDISCIPLINARY STUDIES AND INNOVATIVE TECHNOLOGIES (ISMSIT), 2018, : 470 - 474
  • [23] Cognitive Based Authentication Protocol for Distributed Data and Web Technologies
    Krzyworzeka, Natalia
    Ogiela, Lidia
    Ogiela, Marek R.
    SENSORS, 2021, 21 (21)
  • [24] An improved authentication protocol for distributed mobile cloud computing services
    Jannati, Hoda
    Bahrak, Behnam
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2017, 19 : 59 - 67
  • [25] Distributed authentication and key agreement protocol for ad hoc network
    Mo, Yijun
    Wang, Fei
    Huang, BenXiong
    Xu, Shuhua
    9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 2047 - +
  • [26] A multi-server architecture authentication protocol using smart card
    Yu, Jie
    Pei, Qingqi
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 511 - 515
  • [27] A Continuous Authentication Protocol Without Trust Authority for Zero Trust Architecture
    Lei Meng
    Daochao Huang
    Jiahang An
    Xianwei Zhou
    Fuhong Lin
    China Communications, 2022, 19 (08) : 198 - 213
  • [28] Secure and distributed certification system architecture for safety message authentication in VANET
    Oulhaci, Tiziri
    Omar, Mawloud
    Harzine, Fatiha
    Harfi, Ines
    TELECOMMUNICATION SYSTEMS, 2017, 64 (04) : 679 - 694
  • [29] A Continuous Authentication Protocol Without Trust Authority for Zero Trust Architecture
    Meng, Lei
    Huang, Daochao
    An, Jiahang
    Zhou, Xianwei
    Lin, Fuhong
    CHINA COMMUNICATIONS, 2022, 19 (08) : 198 - 213
  • [30] A Distributed User Authentication Mechanism for IETF 6TiSCH Protocol
    Aydin, Hakan
    Gormus, Sedat
    Jin, Yichao
    2018 IEEE 87TH VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2018,