Abstract
Practical secure communication of mobile systems with low communication cost has become one of the major research directions. An established public key infrastructure (PKI) provides key management and key distribution mechanisms, which can lead to authentication and secure communication. Adding public key cryptography to Kerberos provides a nice congruence to public key protocols, which can obviate the human users’ burden to manage strong passwords. This paper emphasizes on authentication as a considerable issue related to security. Additionally, an efficient and secure hybrid authentication protocol for large mobile network is proposed. Its infrastructure accommodates explosive growth of the large mobile network. It reduces the communication cost for providing secure network access in inter-domain communication. This method is based on symmetric cryptosystem, PKI, challenge–response and hash chaining.
Similar content being viewed by others
References
Chien HY, Jan JK (2003) A hybrid authentication protocol for large mobile network. J Syst Softw 67(2003):123–130
Cervesato I, Jaggard AD, Scedrov A, Tsay J-K, Walstad C (2008) Breaking and fixing public-key Kerberos. Inf Comput 206:402–424
Ganesan R (1995) Yaksha: augmenting Kerberos with public key cryptography. In: SNDSS_95: Proceedings of the 1995 symposium on network and distributed system security. IEEE Computer Society, pp 132–143
Hartman S, Zhu L (2010) A Generalized framework for Kerberos pre-authentication. IETF internet draft, draft-ietf-krb-wgpreauthframework-17
IETF (1996–2006) Public Key cryptography for initial authentication in Kerberos, RFC 4556, Preliminary versions available as a sequence of Internet Drafts at http://tools.ietf.org/wg/krb-wg/draft-ietf-cat-kerberos-pk-init/
Kohl J, Neuman C (1993) The Kerberos Network Authentication Service (V5), IETF RFC 1510
Kao IL, Chow R (1995) An efficient and secure authentication protocol using uncertified keys. ACM Oper Syst Rev 29(3):14–21
Lopez DR et al (2011) Providing EAP-based Kerberos pre-authentication and advanced authorization for network federations. Comput Stand Interfaces 33:494–504
Minkyu K (2009) A survey of Kerberos V and public-key Kerberos security, http://www1.cse.wustl.edu/jain/cse571%E2%80%9309/ftp/kerb5/index.html
Perkins CE (2002) IP mobility support for IPv4. RFC 3344
Sirbu MA, Chuang JCI (1997) Distributed authentication in Kerberos using public key cryptography. In: Proceedings of the 1997 symposium on network and distributed system security. IEEE Computer Society, pp 134–141
Tang Q, Mitchell CJ (2006) Cryptanalysis of a hybrid authentication protocol for large mobile networks. J Syst Softw 79:496–501
The MIT Kerberos Consortium. http://www.kerberos.org. MIT Kerberos Distribution. http://web.mit.edu/Kerberos/
Tardo J, Alagappan K. (1991) SPX: Global authentication using public key certificates. In: Proceedings of the 1991 IEEE symposium on research in security and privacy
Zao J, Kent S, Gahm J, Troxel G, Condell M, Helinek P, Yuan N, Castineyra I (1999) A public-key based secure mobile IP. Wirel Netw 5(5):373–390
Zhu L, Tung B (2006) Public key cryptography for initial authentication in Kerberos (PKINIT). IETF RFC 4556
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Mahshid, MK., Eslamipoor, R. An optimized authentication protocol for mobile networks. Neural Comput & Applic 25, 379–385 (2014). https://doi.org/10.1007/s00521-013-1496-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-013-1496-6