Sciweavers

CCS
2001
ACM

The performance of public key-enabled kerberos authentication in mobile computing applications

14 years 5 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are invoked. These resource requirements can result in unacceptable response times for the user. In this paper, we analyze adaptations of the public key-enabled Kerberos network authentication protocol to a mobile platform by measuring the service time of a “skeleton” implementation and constructing a closed queuing network model. Our adaptation of Kerberos introduces a proxy server between the client and the server to mitigate potential performance deficiencies and add functional benefits. Our analysis indicates that assistance from the proxy makes public key Kerberos a viable authentication protocol from a performance perspective. However, as wireless network speeds increase from current 2G levels to the 3G targets, the proxy can become a response time liability. The proxy’s role in the protocol, while w...
Alan Harbitter, Daniel A. Menascé
Added 28 Jul 2010
Updated 28 Jul 2010
Type Conference
Year 2001
Where CCS
Authors Alan Harbitter, Daniel A. Menascé
Comments (0)