A Secure Network Access Protocol (SNAP)

نویسندگان

  • A. F. Al Shahri
  • D. G. Smith
  • J. M. Irvine
چکیده

Both the size, and the interconnectivity of computer networks are increasing tremendously. However, the possibility of an attack compromising the network is also increasing, making network security critical. Strong authentication protocols are needed to restrict network access to only authorised users. Most existing protocols for authentication and network access are based on centralised authentication using one authentication server or certificate authority that is unconditionally trusted. Despite the use of strong authentication mechanisms, the process is between the user and a single authentication entity. In these protocols, the decision to authenticate or grant service to users is controlled by this single entity. Centralised authentication protocols suffer certain drawbacks. In this paper, a new protocol Secure Network Access Protocol (SNAP) is proposed. SNAP increases network security and availability by distributing the trust between several authentication entities.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

An Extensible Authentication Protocol with Transport Layer Security and One Time Password in the Multi Hop Mesh Network

The multi hop mesh networkan extension of wireless mesh network by ad hoc networkis one promising wireless network architecture in the near future. Securing access network is the first protection against attacker access to network services. Authentication is an essential for securing the access to the network. TLS/SSL (Transport Layer Security/Secure Socket Layer) protocol is one famous secure ...

متن کامل

Reducing Communication Channels in MPC

In both information-theoretic and computationally-secure MultiParty Computation (MPC) protocols the parties are usually assumed to be connected by a complete network of secure or authenticated channels, respectively. Taking inspiration from a recent, highly efficient, threeparty honest-majority computationally-secure MPC protocol of Araki et al., we show how to perform the most costly part of a...

متن کامل

Novel Secure Communication Protocol for Conditional Access System

A protocol for secure communication between set-top box and smart card in conditional access system is proposed. The proposed protocol uses the Schnorr identification scheme to achieve the authentication of smart card to settop box and uses an asymmetric cryptosystem to achieve the authentication of set-top box to smart card. Both security and performance of the proposed protocol are analyzed a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003