Improved Kerberos security protocol evaluation using modified BAN logic

Nabih Abdelmajid, Alamgir Hossain, Simon Shepherd, Khaled Mahmoud

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    4 Citations (Scopus)

    Abstract

    Online communication offers organizations greater efficiency. However, online processes increase the threat level during message transfer. This necessitates researchers to develop and improve security protocols in order to enhance the security of communication lines. There are many evaluation tools such as BAN Logic to evaluate how secure authentication protocols' messages are. Despite the evaluation and acceptance of many authentication protocols, online communications remain insecure. We propose three approaches in order to increase the authenticity level; firstly, we propose to add the user's physical location as a new authentication factor into Kerberos protocol and call it N-Kerberos protocol. Secondly, we propose a new BAN logic based evaluation tool (N-BAN) to evaluate the N-Kerberos protocol. Finally, we validate the new form of Kerberos (N-Kerberos) using the new form of BAN (N-BAN) logic.
    Original languageEnglish
    Title of host publicationProceedings of the 10th IEEE International Conference on Computer and Information Technology : CIT 2010
    Place of PublicationPiscataway, NJ
    PublisherIEEE
    Pages1610-1615
    ISBN (Print)978-1424475476
    DOIs
    Publication statusPublished - 2010
    Event10th IEEE International Conference on Computer and Information Technology (CIT2010) - University of Bradford, Bradford
    Duration: 1 Jan 2010 → …

    Conference

    Conference10th IEEE International Conference on Computer and Information Technology (CIT2010)
    Period1/01/10 → …

    Keywords

    • N-Kerberos protocol
    • authentication protocols
    • message transfer
    • online communication
    • security protocols

    Fingerprint

    Dive into the research topics of 'Improved Kerberos security protocol evaluation using modified BAN logic'. Together they form a unique fingerprint.

    Cite this