The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objectives: To provide an authentication framework between military data centres pertaining to different levels of operations within the private cloud and a simple authentication schema for authenticating users at the wing-commander level in the special sinks deployed in our territory closer to line of control. Methods: In order to achieve the above mentioned objectives, we designed a conceptual defense structure that will highlight the various hierarchical levels of military operations. Military WSNs and data centres will utilize the designed simple authentication schema to improve the lifetime of the WSNs. The methodology adopted primarily consists of modifications to the existing Kerberos setup, so that it could fit the conceptual defense structure by utilizing Heimdal Kerberos distribution. Heimdal's modified Kerberos distribution is utilized in the cloud gateway system to create Kerberos Distribution Center. The modified Kerberos equations are provided in this paper. Findings: Based on the simulations carried out, it is identified that number of messages required for various dialogs for modified Kerberos is relatively less compared to the original version of Kerberos. The response time for modified Kerberos in single realm and cross realm based on different number of requests showed that modified Kerberos is performing better and efficient with respect to the response time metric. Minimum number of messages required for Kerberos Authentication using v4 (Simple dialog), v4 (Secure dialog), v4 (Authentication dialog), v5 (Request for service in another realm using Inter realm authentication) are 3, 5, 6 and 7 respectively. Response times range for single realm lie in the range of 3ms to 20ms approximately for 10 to 100 requests per minute. Response times range for cross realm lie in the range of 7 ms to 47 ms approximately for 10 to 100 requests per minute. The authentication time to authenticate instructions received at special sinks from level 1 resource via cloud gateway ranges from 4.5 ms to 6 ms for message sizes ranging from 100 bytes to 1000 bytes. The response times obtained from single realm authentication indicates lesser values as compared against cross realm authentication which is in consensus with the theory of Kerberos. Applications: The proposed scheme finds its application in all mission critical tasks where the time taken for successful authentication of users should be drastically reduced to improve the system performance.

Keywords

Authentication, Cloud, Defense, Kerberos, Wireless Sensor Networks.
User