CFP last date
20 June 2024
Reseach Article

Black Hole Attack in Kerberos Assisted Authentication Protocol

by Navjot Singh, Rupinder Kaur Cheema
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 66 - Number 20
Year of Publication: 2013
Authors: Navjot Singh, Rupinder Kaur Cheema
10.5120/11201-6394

Navjot Singh, Rupinder Kaur Cheema . Black Hole Attack in Kerberos Assisted Authentication Protocol. International Journal of Computer Applications. 66, 20 ( March 2013), 24-27. DOI=10.5120/11201-6394

@article{ 10.5120/11201-6394,
author = { Navjot Singh, Rupinder Kaur Cheema },
title = { Black Hole Attack in Kerberos Assisted Authentication Protocol },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 66 },
number = { 20 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 24-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume66/number20/11201-6394/ },
doi = { 10.5120/11201-6394 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:22:57.700037+05:30
%A Navjot Singh
%A Rupinder Kaur Cheema
%T Black Hole Attack in Kerberos Assisted Authentication Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 66
%N 20
%P 24-27
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Kaman is the extension of Kerberos protocol; with the use of Kaman nodes in the ad hoc network are authenticated by the secure server. This posed the remedial venture to large number of attacks like replay attack, fabrication, eavesdropping etc Kaman provides secure solution to the problem of secure channel establishment, secure exchange of session keys and prevention of nodes identity forgery. In this paper, we reviewed the Kaman; Kerberos assisted Authentication in Mobile Ad hoc Network. We have also emphasized the problem of black hole that aroused when Kaman protocol is embedded into large network. AODV, on-demand routing protocol had been used to select secure shortest path, when node interacts with an authenticated server for mutual authentication.

References
  1. Kamarularifin Abd. Jalil, Zaid Ahmad, Jamalul-Lail Ab Manan : Mitigation of Black Hole Attacks for AODV Routing Protocol
  2. Celia Li and Uyen Trang Nguyen: FAST AUTHENTICATION FOR MOBILE CLIENTS IN WIRELESS MESH NETWORKS
  3. Kimaya Sanzgiri,Bridget Dahill,Brian Neil Levine,Clay Shields,Elizabeth M. Belding-Royer: A Secure Routing Protocol for Ad Hoc Networks
  4. . Lidong Zhou, Zygmunt J. Haas: Securing Ad Hoc Networks
  5. . Asad Amir Pirzada and Chris McDonald: Kerberos Assisted Authentication in Mobile Ad-hoc Networks [6. ] Sang-Gon Lee: Cryptanalysis of Multiple-Server Password-Authenticated Key Agreement Schemes Using Smart Cards
  6. Yixin Jiang, Chuang Lin,Senior Member, IEEE,Xuemin (Sherman) Shen,Senior Member, IEEE,and Minghui Shi: Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks
Index Terms

Computer Science
Information Sciences

Keywords

Black hole Mutual Authentication Secure server Ad-hoc networks