KERBEROS IMPLEMENTATION IN MANETS

Atta- ur-Rahman, Mureed Hussain, Kahina Kabri, Dominique Seret

Abstract

In this paper implementation of Kerberos is proposed for Mobile Ad-hoc Networks (MANETS) for user authentication and authorization. Kerberos uses symmetric cryptography with a trusted server to enable secure authentication and key exchange between client nodes. Kerberos protocol is designed to provide reliable authentication over open and insecure networks where communications between the hosts belonging to it may be intercepted. So simply Kerberos is an authentication protocol for trusted hosts on untrusted networks. There are two approaches used in MANETS: proactive approach & reactive approach. In proactive approach protocols are also known as traditional distributed shortest-path protocols which are used to maintain the routes at all times based on periodic updates with high routing overhead. We have implemented Kerberos concept with proactive approach using Optimized Link State Routing Protocol (OLSR).

References

  1. Tom Karygiannis, Les Owens “CSD, NISTE Gaithersburg”, MD 2098, 8930 (2002).
  2. 2-Level Authentication Mechanisms in an Internet Connected MANET 6th Scandinarian Workshop on Wireless Adhoc Networks (2006).
  3. Yanchoa Zhang, New Jersey Institute of Technology. www.indengines.com Sunnyvale, California 94089 USA. J. Broch, D. Johnson,
  4. Jennifer G. Steiner, Project Athena, Massachusetts Institute of Technology, Cambridge, MA 02139
  5. www.cisco.com/warp/public/106/1.html#intro
  6. Z. J. Haas, M. R. Pearlman, P. Samar, “The Zone Routing Protocol (ZRP) for Ad Hoc Networks,” draft-ietfmanetzone-zrp-02.txt, IETF, (2000).
  7. P. Jacquet, P. Muhletaler, A. Qayyum, A. Laouiti, T. Clausen, L. Viennot, “Optimized Link Stat e Routing Protocol”, in IEEE INMIC, Pakistan ( 2001).
  8. A. Qayyum, L. Viennot, A. Laouiti, “Multipoint Relaying: An Efficient Technique for flooding in Mobile Wireless Networks” Tech. Rep. 3898, INRIA, http:// www.inria.fr, (2000).
  9. Maltz, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks”, draft-ietfmanet-dsr-01.txt, IETF 1998.
  10. J. Broch, D. A. Maltz, D. B. Johnson, “Supporting Hieararchy and Heterogeneous Interfaces in Multi-hop Wireless Ad Hoc Networks”, Workshop on Mobile Computing, IEEE International Symposium on Parallel Architectures, algorithms and Networks, Australia pp. 75-85, (1999).
  11. T. Y. C. Woo and S. S. Lam. Authentication for distributed Systems Computer, 25(1):39-52, January 1992.
Download


Paper Citation


in Harvard Style

ur-Rahman A., Hussain M., Kabri K. and Seret D. (2008). KERBEROS IMPLEMENTATION IN MANETS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 161-166. DOI: 10.5220/0001930401610166


in Bibtex Style

@conference{secrypt08,
author={Atta- ur-Rahman and Mureed Hussain and Kahina Kabri and Dominique Seret},
title={KERBEROS IMPLEMENTATION IN MANETS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={161-166},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001930401610166},
isbn={978-989-8111-59-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - KERBEROS IMPLEMENTATION IN MANETS
SN - 978-989-8111-59-3
AU - ur-Rahman A.
AU - Hussain M.
AU - Kabri K.
AU - Seret D.
PY - 2008
SP - 161
EP - 166
DO - 10.5220/0001930401610166