Modeling and verification of Inter Realm Authentication in Kerberos using symbolic model verifier

Punit Mundra, Madhavi Sharma, Shobhit Shukla, Sanjay Singh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In open distributed environment several users accesses the network resources on server, server will allow only authenticated users to access these resources. So it has become of prime importance for nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Various authentication protocols is used for the this purpose, Kerberos protocol is one of them. Several versions of the protocol exist. The aim of this paper is modeling and verification of the Inter Realm Authentication and User to User Authentication in Kerberos protocol through NuSMV model checker. It also demonstrate that when presence of intruder in the system, and make use of service, it will generate the counter example.

Original languageEnglish
Title of host publicationTrends in Computer Science, Engineering and Information Technology - First International Conference on Computer Science, Engineering and Information Technology, CCSEIT 2011, Proceedings
Pages496-506
Number of pages11
DOIs
Publication statusPublished - 28-10-2011
Event1st International Conference on Computer Science, Engineering and Information Technology, CCSEIT 2011 - Tirunelveli, Tamil Nadu, India
Duration: 23-09-201125-09-2011

Publication series

NameCommunications in Computer and Information Science
Volume204 CCIS
ISSN (Print)1865-0929

Conference

Conference1st International Conference on Computer Science, Engineering and Information Technology, CCSEIT 2011
Country/TerritoryIndia
CityTirunelveli, Tamil Nadu
Period23-09-1125-09-11

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Mathematics(all)

Fingerprint

Dive into the research topics of 'Modeling and verification of Inter Realm Authentication in Kerberos using symbolic model verifier'. Together they form a unique fingerprint.

Cite this