http://iet.metastore.ingenta.com
1887

Ladon: end-to-end authorisation support for resource-deprived environments

Ladon: end-to-end authorisation support for resource-deprived environments

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The authors present Ladon, an enhanced version of Kerberos which extends the original protocol with authorisation capacity and relaxes the necessity of clock synchronisation by adding to the protocol special limited-lifetime nonces. This way, although all entities need timers, only the clocks of the two servers that constitute the key distribution centre must be synchronised with each other. The design of this protocol is motivated by the emergence of a new trend of applications in which sensors and low-capacity devices become tiny information or application servers directly addressable by any Internet-connected entity. Despite the huge potential of these environments, security is probably the greatest barrier to their long-term success. To address this issue, Ladon allows for end-to-end pair-wise key establishment in an authenticated and authorised manner, while keeping the introduced storage, computational and communication overhead very low. The security analysis with the AVISPA formal validation tool shows that the protocol meets the stated security goals, whereas the performance analysis shows that the overhead of the protocol is bounded and comparable to that of other security protocols which provide even less functionalities.

References

    1. 1)
      • Abadi, D.J., Lindner, W., Madden, S., Schuler, J.: `An integration framework for sensor networks and data stream management systems', Proc. 13th Int. Conf. Very Large Data Bases, August 2004, Toronto, Canada, p. 1361–1364.
    2. 2)
      • IPv6 over Low power WPAN (6lowpan) Working Group, http://datatracker.ietf.org/wg/6lowpan/charter/, accessed September 2011.
    3. 3)
      • Montenegro, G., Kushalnagar, N., Hui, J., Culler, D.: `Transmission of IPv6 packets over IEEE 802.15.4 networks', RFC 4944, 2007.
    4. 4)
      • Neuman, C., Hartman, S., Raeburn, K.: `The Kerberos network authentication service (v5)', RFC 4120, 2005.
    5. 5)
      • Zhu, S., Setia, S., Jajodia, S.: `LEAP: efficient security mechanisms for large-scale distributed sensor networks', Proc. Tenth ACM Conf. Computer and Communications Security (CCS' 03), October 2003, Washington D.C., USA, p. 62–72.
    6. 6)
    7. 7)
      • Karlof, C., Sastry, N., Wagner, D.: `TinySec: a link layer security architecture for wireless sensor networks', Proc. Second Int. Conf. Embedded Networked Sensor Systems (SenSys 2004), November 2004, Baltimore, MD, USA, p. 162–175.
    8. 8)
    9. 9)
    10. 10)
    11. 11)
      • Wettstein, G.H., Grosen, J., Rodriguez, E.: `IDfusion, an open-architecture for Kerberos based authorization', Proc. AFS and Kerberos Best Practices Workshop, June 2006, Michigan, USA.
    12. 12)
      • Neuman, C.: `Proxy-based authorization and accounting for distributed systems', Proc. 13th Int. Conf. Distributed Computing Systems, May 1993, Pittsburgh, USA, p. 283–291.
    13. 13)
      • M. Walla . (2000) Kerberos explained.
    14. 14)
      • IEEE 802.15.4 Standard: ‘Wireless medium access (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (WPANs)’, 2006.
    15. 15)
      • Shnayder, V., Hempstead, M., Chen, B.-r., Allen, G.W., Welsh, M.: `Simulating the power consumption of large-scale sensor network applications', Proc. Second Int. Conf. Embedded Networked Sensor Systems, (SenSys 2004), November 2004, Baltimore, MD, USA, p. 188–200.
    16. 16)
    17. 17)
      • Wang, L., Wijesekera, D., Jajodia, S.: `A logic-based framework for attribute based access control', Proc. ACM Workshop on Formal Methods in Security Engineering (FMSE’04), October 2004, Washington DC., USA, p. 45–55.
    18. 18)
    19. 19)
      • AVISPA: Automated Validation of Internet Security Protocols and Applications. FET Open Project IST-2001-39252, http://www.avispa-project.org, accessed September 2011.
    20. 20)
      • AVISPA Project IST-2001-39252, ‘Deliverable 2.1: the high-level protocol specification language’, August 2003.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2010.0259
Loading

Related content

content/journals/10.1049/iet-ifs.2010.0259
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address