High-speed ECC based kerberos authentication protocol for wireless applications

被引:4
|
作者
Erdem, OM [1 ]
机构
[1] Oregon State Univ, Sch Elect Engn & Comp Sci, Corvallis, OR 97331 USA
关键词
D O I
10.1109/GLOCOM.2003.1258476
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We improved Kerberos authentication protocol for wireless communication using elliptic curve cryptographic operations. Proposed protocol offers the strength of public key cryptography and costs only 68.7 ms extra load to standard Kerberos without using pre-computation tables for 160-bit curve and scalable architecture, whereas with customized curve library it costs 57.3 ms extra load for the same key length. Using pre-computation tables reduces these timings to 55.8 ms and 51.6 ms respectively. Proposed protocol requires less bandwidth than other public key cryptography enabled Kerberos solutions. Results were obtained using 32-bit StrongARM1 processor runs 206 MHz. Due to its bandwidth efficiency and fast execution performance ECC supported Kerberos protocol can be an important option among other user authentication protocols for wireless networks.
引用
收藏
页码:1440 / 1444
页数:5
相关论文
共 50 条
  • [1] An high-speed ECC-based wireless authentication protocol on an ARM microprocessor
    Aydos, M
    Yanik, T
    Koç, CK
    16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 401 - 409
  • [2] High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor
    Aydos, M
    Yanik, T
    Koç, ÇK
    IEE PROCEEDINGS-COMMUNICATIONS, 2001, 148 (05): : 273 - 279
  • [3] A Network Authentication Protocol Based on Kerberos
    El-Emam, Eman
    Koutb, Magdy
    Kelash, Hamdy
    Allah, Osama Farag
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (08): : 17 - 26
  • [4] Kerberos based public key authentication protocol
    Sheng, Huanye
    Wang, Jue
    Jisuanji Gongcheng/Computer Engineering, 24 (09): : 39 - 42
  • [5] A new ECC-based wireless authentication and key agreement protocol
    Zhang, Juan
    Chen, Guanghui
    Deng, Fangmin
    FIFTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1219 - 1225
  • [6] Improved Authentication Model Based on Kerberos Protocol
    You, Xine
    Zhang, Lingfeng
    ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 593 - 599
  • [7] On IP based access protocol for high-speed wireless LAN
    Hata, M
    Kawasima, M
    Hamasuna, Y
    Usami, S
    Takumi, I
    ITCC 2003: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2003, : 356 - 361
  • [8] A New Version of Kerberos Authentication Protocol Using ECC and Threshold Cryptography for Cloud Security
    Sutradhar, Mukti Rani
    Sultana, Nigar
    Dey, Himel
    Arif, Hossain
    2018 JOINT 7TH INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV) AND 2018 2ND INTERNATIONAL CONFERENCE ON IMAGING, VISION & PATTERN RECOGNITION (ICIVPR), 2018, : 239 - 244
  • [9] A Novel Identity Authentication Scheme of Wireless Mesh Network Based on Improved Kerberos Protocol
    Li, Min
    Lv, Xin
    Song, Wei
    Zhou, Wenhuan
    Qi, Rongzhi
    Su, Huaizhi
    PROCEEDINGS OF THIRTEENTH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING AND SCIENCE, (DCABES 2014), 2014, : 190 - 194
  • [10] An LMDS access protocol for advanced high-speed and bandwidth intensive wireless applications
    De Obaldia-Lee, G
    Tozer, TC
    Grace, D
    Pearce, DAJ
    IEEE VTC 53RD VEHICULAR TECHNOLOGY CONFERENCE, SPRING 2001, VOLS 1-4, PROCEEDINGS, 2001, : 846 - 850