Title :
Ladon1 : end-to-end authorisation support for resource-deprived environments
Author :
Astorga, J. ; Jacob, Eduardo ; Huarte, Maider ; Higuero, M.
Author_Institution :
Fac. of Eng., Univ. of the Basque Country (UPV/EHU), Bilbao, Spain
fDate :
6/1/2012 12:00:00 AM
Abstract :
The authors present Ladon, an enhanced version of Kerberos which extends the original protocol with authorisation capacity and relaxes the necessity of clock synchronisation by adding to the protocol special limited-lifetime nonces. This way, although all entities need timers, only the clocks of the two servers that constitute the key distribution centre must be synchronised with each other. The design of this protocol is motivated by the emergence of a new trend of applications in which sensors and low-capacity devices become tiny information or application servers directly addressable by any Internet-connected entity. Despite the huge potential of these environments, security is probably the greatest barrier to their long-term success. To address this issue, Ladon allows for end-to-end pair-wise key establishment in an authenticated and authorised manner, while keeping the introduced storage, computational and communication overhead very low. The security analysis with the AVISPA formal validation tool shows that the protocol meets the stated security goals, whereas the performance analysis shows that the overhead of the protocol is bounded and comparable to that of other security protocols which provide even less functionalities.
Keywords :
Internet; authorisation; cryptographic protocols; formal verification; performance evaluation; synchronisation; AVISPA formal validation tool; Internet-connected entity; Kerberos; Ladon; application servers; authorisation capacity; clock synchronisation; end-to-end authorisation support; end-to-end pair-wise key establishment; low-capacity devices; performance analysis; resource-deprived environments; security analysis; security protocols; timers; tiny information server;
Journal_Title :
Information Security, IET
DOI :
10.1049/iet-ifs.2010.0259