Pre-emptive Authentication Protocol Design and Analysis: Hope forSecure Communication in Societies with Economic Deprivation

By:
Mr. Agozie Eneh,
Gemikonakli
To add a paper, Login.

Research work on the analysis and the development of authentication protocols frequently adopt the linear software development approach and are based on certain non-extensible assumptions (Tobler and Hutchison 2004), (Grob 2003), (Harbitter and Menasce 2002). This paper is part of an ongoing work regarding the development of pre-emptive security mechanism for networks and distributed systems. We present in this paper a cyclic analytical method of protocol development for authentication solutions, which can be used by both designers and security administrators. Our analytical approach can be extended to a variety of protocols for either closed or open networks. The method lends itself to the analysis and therefore the development and/or adoption of authentication standards that can render computing resources unassailable to attackers. The motivation for this approach stems from the fact that despite the multiplicity of highly published protocols for authentication, an amazing number of attacks (Lowe 1997) continue to evolve against authentication solutions, and thereby continue to hinder the placement of trust on networked computing resources.


Keywords: Authentication, Authentication Protocols, Authentication Standards, Distributed Systems, Protocol Analysis, Kerberos, SAML, System development
Stream: Knowledge and Technology
Presentation Type: Paper Presentation in English
Paper: Pre-emptive Authentication Protocol Design and Analysis, The


Mr. Agozie Eneh

Research Student, School of Computing Science, Middlesex University London
UK

Having a computing science background, worked with Computer Systems Associates, Apapa, Lagos for 2 years before proceeding to obtain an MBA in management from the University of Nigeria. Also obtained an MSc with distinction (First class honours) from Middlesex University London. Currently doing a doctoral research in the area of network and distributed systems security with particular emphasis on the design of authentication protocols. Have worked extensively as an executive systems analyst with Softscience Technologies Limited where I also carried several network design and support tasks.


Gemikonakli

Middlesex University London


Ref: T05P0288