Using Counter Variable of Sent Message in the Tree Structure to Tackle the Disrupting Attack to Timestamp at Kerberos Cryptographic Network
Publish place: Conference on Computer Engineering and Sustainable Development with a focus on computer networking, modeling and systems security
Publish Year: 1392
نوع سند: مقاله کنفرانسی
زبان: English
View: 1,042
This Paper With 8 Page And PDF Format Ready To Download
- Certificate
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
CESD01_020
تاریخ نمایه سازی: 25 اسفند 1392
Abstract:
Authentication is a mechanism by which any entity can check whether its partner is one who claims to be in a relationship or is a disrupting that has been replaced by real party. One of the authentication protocols is Kerberos where timestamp is used to avoid sending repeated and unfeigned messages by Trudy. In this article a counter variable is considered for each client that represents number of sent messages from the client to servers. Advantage of this variable that host at ticket granting server is aware of repeated message during send it. Also, at servers we used a binary tree structure to store the messages and searching between them. Simulation results show significant improvement in the face of replay attacks by Trudy and response time to service at Kerberos Cryptographic Network.
Keywords:
Authors
Ali Akbar Tajari Siahmarzkooh
PhD student in Computer Sciences at University of Tabriz
Jaber Karimpour
Assistant Professor, Department of Computer Sciences at University of Tabriz
مراجع و منابع این Paper:
لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :