TY - JOUR
T1 - Towards port-knocking authentication methods for mobile cloud computing
AU - Khan, Suleman
AU - Shiraz, Muhammad
AU - Boroumand, Laleh
AU - Gani, Abdullah
AU - Khan, Muhammad Khurram
PY - 2017/11/1
Y1 - 2017/11/1
N2 - Mobile cloud computing (MCC) is an increasingly popular research topic, partly due to the widespread adoption of mobile devices and cloud services among individual and organizational users. Security and privacy of data-at-rest and data-in-transit are two of several key issues that need to be addressed. Traditional authentication models employ third-party security monitoring mechanisms, which generally require complicated and resource-intensive mechanisms for ensuring security measures. These mechanisms are not adaptive for MCC deployment; thus, it requires lightweight authentication methods. This paper reviews existing port-knocking authentication methods by analyzing the mechanism and classifying the methods into a thematic taxonomy. Current port-knocking authentication methods are compared based on static or dynamic knocked sequences, which tend to solve the Network Address Translation (NAT) knock and Denial of Service (DoS) knock attacks. Finally, we discuss the issues and challenges in implementing port-knocking for MCC.
AB - Mobile cloud computing (MCC) is an increasingly popular research topic, partly due to the widespread adoption of mobile devices and cloud services among individual and organizational users. Security and privacy of data-at-rest and data-in-transit are two of several key issues that need to be addressed. Traditional authentication models employ third-party security monitoring mechanisms, which generally require complicated and resource-intensive mechanisms for ensuring security measures. These mechanisms are not adaptive for MCC deployment; thus, it requires lightweight authentication methods. This paper reviews existing port-knocking authentication methods by analyzing the mechanism and classifying the methods into a thematic taxonomy. Current port-knocking authentication methods are compared based on static or dynamic knocked sequences, which tend to solve the Network Address Translation (NAT) knock and Denial of Service (DoS) knock attacks. Finally, we discuss the issues and challenges in implementing port-knocking for MCC.
KW - Mobile cloud computing
KW - Port-knocking
KW - Authentication
KW - Denial-of-services
UR - https://www.scopus.com/pages/publications/85029003950
U2 - 10.1016/j.jnca.2017.08.018
DO - 10.1016/j.jnca.2017.08.018
M3 - Review article
SN - 1084-8045
VL - 97
SP - 66
EP - 78
JO - Journal of Network and Computer Applications
JF - Journal of Network and Computer Applications
ER -