Location based Kerberos Authentication Protocol

Nabih Abdelmajid, Alamgir Hossain, Simon Shepherd, Khaled Mahmoud

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    14 Citations (Scopus)

    Abstract

    Online communication offers organizations greater efficiency. However, online processes increase the threat level during message transfer. This necessitates researchers to develop and improve security protocols in order to enhance the security of communication lines. Despite the evaluation and acceptance of many authentication protocols, online communications remain insecure, we propose to add the user's physical location as a new authentication factor into Kerberos protocol and call it N-Kerberos protocol, and we validate the new form of Kerberos (N-Kerberos).
    Original languageEnglish
    Title of host publicationSocialCom 2010 : proceedings, the second IEEE International Conference on Social Computing : PASSAT 2010, the second IEEE International Conference on Privacy, Security, Risk, and Trust
    Place of PublicationPiscataway, NJ
    PublisherIEEE
    Pages1099-1104
    ISBN (Print)978-1424484393
    DOIs
    Publication statusPublished - 30 Sept 2010
    EventIEEE 2nd International Conference on Social Computing (SocialCom) - Minneapolis, Minnesota, USA
    Duration: 30 Sept 2010 → …

    Conference

    ConferenceIEEE 2nd International Conference on Social Computing (SocialCom)
    Period30/09/10 → …

    Keywords

    • N-Kerberos protocol
    • location-based Kerberos authentication protocol
    • message transfer
    • online communications

    Fingerprint

    Dive into the research topics of 'Location based Kerberos Authentication Protocol'. Together they form a unique fingerprint.

    Cite this