A DISTRIBUTED AUTHENTICATION ARCHITECTURE AND PROTOCOL

被引:0
|
作者
Skracic, Kristian [1 ]
Pale, Predrag [1 ]
Jeren, Branko [1 ]
机构
[1] Sveuciliste Zagrebu, Fak Elektrotehnike & Racunarstva, Unska 3, Zagreb 10000, Croatia
来源
关键词
authentication factors; digital identity; distributed authentication architecture; distributed authentication protocol; distributed user authentication; PASSWORDS;
D O I
10.17559/TV-20151114105745
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Most user authentication methods rely on a single verifier being stored at a central location within the information system. Such information storage presents a single point of compromise from a security perspective. If this system is compromised it poses a direct threat to users' digital identities if the verifier can be extracted from the system. This paper proposes a distributed authentication environment in which there is no such single point of compromise. We propose an architecture that does not rely on a single verifier to authenticate users, but rather a distributed authentication architecture where several authentication servers are used to authenticate a user. We consider an authentication environment in which the user authentication process is distributed among independent servers. Each server independently performs its own authentication of the user, for example by asking the user to complete a challenge in order to prove his claim to a digital identity. The proposed architecture allows each server to use any authentication factor. We provide a security analysis of the proposed architecture and protocol, which shows they are secure against the attacks chosen in the analysis.
引用
收藏
页码:303 / 311
页数:9
相关论文
共 50 条
  • [31] Security of Grouping-Proof Authentication Protocol for Distributed RFID Systems
    Sun, Da-Zhi
    Mu, Yi
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2018, 7 (02) : 254 - 257
  • [32] A Distributed Lightweight PUF-Based Mutual Authentication Protocol for IoV
    Alkanhal, Mona
    Alali, Abdulaziz
    Younis, Mohamed
    IOT, 2024, 5 (01): : 1 - 19
  • [33] Security analysis of extensible authentication protocol methods based on AAA architecture
    Lee, Jong-Hyouk
    Jung, Su-Jin
    Han, Young-Ju
    Chung, Tai-Myoung
    RECENT PROGRESS IN COMPUTATIONAL SCIENCES AND ENGINEERING, VOLS 7A AND 7B, 2006, 7A-B : 1311 - 1314
  • [34] A Lightweight ID Based Authentication and Key Agreement Protocol for Multiserver Architecture
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Xing
    Yang, Yixian
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [35] A distributed architecture and negotiation protocol for scheduling in manufacturing systems
    Sousa, P
    Ramos, C
    COMPUTERS IN INDUSTRY, 1999, 38 (02) : 103 - 113
  • [36] Chaotic Map-Based Authentication Protocol for Multiple Servers Architecture
    Wang, Huawei
    Guo, Dianli
    Wen, Qiaoyan
    Hua, Zhang
    IEEE ACCESS, 2019, 7 : 161340 - 161349
  • [37] Secure and distributed certification system architecture for safety message authentication in VANET
    Tiziri Oulhaci
    Mawloud Omar
    Fatiha Harzine
    Ines Harfi
    Telecommunication Systems, 2017, 64 : 679 - 694
  • [38] Distributed Blockchain-Based Authentication and Authorization Protocol for Smart Grid
    Zhong, Yuxin
    Zhou, Mi
    Li, Jiangnan
    Chen, Jiahui
    Liu, Yan
    Zhao, Yun
    Hu, Muchuang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [39] Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems
    Liu, Hong
    Ning, Huansheng
    Zhang, Yan
    He, Daojing
    Xiong, Qingxu
    Yang, Laurence T.
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (07) : 1321 - 1330
  • [40] Efficient Distributed Group Authentication Protocol for Vehicular Ad Hoc Network
    Karunanithi, Priya
    Karuppanan, Komathy
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT III, 2011, 192 : 624 - 633