A Lightweight Mutual Authentication Based on Proxy Certificate Trust List
نویسندگان
چکیده
We propose Proxy Certificate Trust List (PCTL) to efficiently record delegation traces for grid computing. Our security solution based on PCTL provides functions as follows: (1) On-demand inquiries about real time delegation information of grid computing underway; (2) Lightweight mutual authentication that is beneficial for proxy nodes with limited computation power as wireless devices in mobile computing; (3) A kind of revocation mechanism for proxy certificates to improve the security and availability of grid computing.
منابع مشابه
A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication
Password-based authentication is still the most widelyused authentication mechanism, largely because of the ease with which it can be understood by end users and implemented. In this paper, we propose a security infrastructure for grid applications, in which users are authenticated using passwords. Our infrastructure allows users to perform single sign-on based only on passwords, without requir...
متن کاملSecure Ad-Hoc mBusiness: EnhancingWindowsCE Security
Nowadays we can perform business transactions with remote servers interconnected to Internet using our personal devices. These transactions can also be possible without any infrastructure in pure adhoc networks. In both cases, interacting parts are often unknown, therefore, they require some mechanism to establish ad-hoc trust relationships and perform secure transactions. Operating systems for...
متن کاملA Bilateral Authentication Protocol Based on Lightweight CA and Proof with BAN Logic for Wireless Mesh Networks
In a Wireless Mesh Network (WMN), we cannot assume the existence of a trusted certificate authority that is used in regular Public-Key Infrastructure (PKI). Hence a cooperative approach in which a cluster of some nodes can issue certificates to other nodes in a self-organizing manner is considered to be more suitable to the Ad-hoc nature of WMNs. In this paper, we propose a new trust establishm...
متن کاملIntrusion Tolerant-based Lightweight CA Model for Wireless Mesh Networks
In a Wireless Mesh Network (WMN), we cannot assume the existence of a trusted certificate authority that is used in regular Public-Key Infrastructure (PKI). Hence a cooperative approach in which a cluster of some nodes can issue certificates to other nodes in a self-organizing manner is considered to be more suitable to the Ad-hoc nature of WMNs. In this paper, we propose a new trust establishm...
متن کاملA Context Authentication Proxy for IPSec using Spatial Reference
Spontaneous interaction in ad-hoc networks is often desirable not only between users or devices in direct contact, but also with devices that are accessible only via a wireless network. Secure communication with such devices is difficult because of the required authentication, which is often either passwordor certificate-based. An intuitive alternative is context-based authentication, where dev...
متن کامل