Fundamentals of queueing theory (2nd ed.).
Fundamentals of queueing theory (2nd ed.).
ACM Transactions on Computer Systems (TOCS)
Capacity planning and performance modeling: from mainframes to client-server systems
Capacity planning and performance modeling: from mainframes to client-server systems
Network security: private communication in a public world
Network security: private communication in a public world
Security on the move: indirect authentication using Kerberos
MobiCom '96 Proceedings of the 2nd annual international conference on Mobile computing and networking
Capacity Planning for Web Services: metrics, models, and methods
Capacity Planning for Web Services: metrics, models, and methods
Performance of Public-Key-Enabled Kerberos Authentication in Large Networks
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Simple analytic modeling of software contention
ACM SIGMETRICS Performance Evaluation Review
A methodology for analyzing the performance of authentication protocols
ACM Transactions on Information and System Security (TISSEC)
J2ME application-layer end-to-end security for m-commerce
Journal of Network and Computer Applications
Kerberos assisted Authentication in Mobile Ad-hoc Networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Security requirements in service oriented architectures for ubiquitous computing
MPAC '04 Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing
Performance evaluation of public key-based authentication in future mobile communication systems
EURASIP Journal on Wireless Communications and Networking - Special issue on innovative signal transmission and detection techniques for next generation cellular CDMA systems
PKI-based secure mobile access to electronic health services and data
Technology and Health Care
Scheduling Security-Critical Real-Time Applications on Clusters
IEEE Transactions on Computers
Secure storage and communication in J2ME based lightweight multi-agent systems
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
A biometric-based authentication system for web services mobile user
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
Application-binding protocol in the user centric smart card ownership model
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
A secure energy-efficient m-banking application for mobile devices
Journal of Systems and Software
Enhancing security of real-time applications on grids through dynamic scheduling
JSSPP'05 Proceedings of the 11th international conference on Job Scheduling Strategies for Parallel Processing
Mutual authentication and group key agreement for low-power mobile devices
Computer Communications
Coopetitive architecture to support a dynamic and scalable NFC based mobile services architecture
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Hi-index | 0.00 |
Authenticating mobile computing users can require a significant amount of processing and communications resources-particularly when protocols based on public key encryption are invoked. These resource requirements can result in unacceptable response times for the user. In this paper, we analyze adaptations of the public key-enabled Kerberos network authentication protocol to a mobile platform by measuring the service time of a "skeleton" implementation and constructing a closed queuing network model. Our adaptation of Kerberos introduces a proxy server between the client and the server to mitigate potential performance deficiencies and add functional benefits. Our analysis indicates that assistance from the proxy makes public key Kerberos a viable authentication protocol from a performance perspective. However, as wireless network speeds increase from current 2G levels to the 3G targets, the proxy can become a response time liability. The proxy's role in the protocol, while warranted in current applications, will have to be re-modeled and re-considered as both wireless transmission speeds and proxy processing speeds increase.