All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

The Basics of Kerberos, Research Paper Example

Pages: 6

Words: 1562

Research Paper

Understanding the Basics of Kerberos and its Compatibility with the WiMax Network Setup (Question and Response Paper)

What is Kerberos authentication protocol?

The institutionalization of computer technology has created several options of connection between users. It could be analyzed that somehow, the transformation of modern technology if communication has provided an open source of support and benefit for its million users around the globe. Nevertheless, it should not be forgotten that the same aspect of connection has subjected the system of modern communication into several dangers and disadvantages especially related to creating centralized systems that are made open to several users.

The establishment of communication networks between related users has become a common source of connection. Nevertheless, such connections ought to be secured. This is the reason why it is very important that such connections are secured only for the utilization of the authorized individuals. This means that only those who are authorized are supposed to have a direct access on the information and connection that a particular network provides.

The Kerberos authentication protocol, created by Steve Miller and Clifford Neuman, specifically gave an answer to this particular need (Neuman, et al, 1994). Dependent on the built-up of symmetric cryptography, the system protects a particular network from third party intruders into the system. Through the use of encrypted codes that are specifically utilized as access points for those who are allowed to access information from the network [or at some point exchange files using the system of the network] the entire operation of the network is completely protected.

The fourth version of Kerberos which is considered to be the latest had its specific sources of operational competence especially when it comes to its application on Project Athena. Nevertheless, vendors such as Oracle, Google, Microsoft and even Apple have funded for further research so as to improve the system of operation that Kerberos provides especially in relation to establishing protection for existing networks between users across the internet (Walla, 2000, Worldwide Web). At present, the system is being protected by the US consortium specifically pointing out that it is an auxiliary military program that should not be reproduced nor exported. However, the system that was created by the Swedish programmers was considered to be a copy or at least a sourced out system from that of Kerberos which is now used widely by several networks [although the one submitted for military use has its exclusive functions].

Explain how it works (give examples)?

Currently, the release of the fifth version of Kerberos protocol has been considered to be the most updated aspect of the system. Basically, the operation exists in line with the utilization of exchange of tickets between users and the servers.

As seen from the diagram (Zhu , 2006, Worldwide Web) presented herein, the Kerberos operation of protection and security in networks is based upon the existence of a Key Distribution Centre or KDC. Before a user is able to access a particular network, the server asks for authentication code which serves as an access ticket.

ticket exchange

The TGT [Ticket Granting Ticket] system then processes an access code for both the server and the client for them to be able to access both workstations within a specific time allowance. Through this system, the access code provided is to be utilized only during a specific span of time. The verification of identity between the server and the client is impacted by the Kerberos system through the use of codes that serve as access tickets to the system. There are instances when network operators would require the non-re-entry of ticket access from one client. The idea behind this is to protect the network from possible intruders to the system through constantly revised codes hence making it easier to identify the clients who are given the authority to access the network’s operation and exchange information within its system.

In this aspect of accessing a particular network, there are instances when a user name and password entry would not suffice for an access ticket. The server operators are then to ask particular information to assure that the incoming user is an authenticated client of the network (Kohl, et al, 1994). Only after entering the correct response to particular questions that only the user would know would access be granted to the client. Nevertheless, such access should be noted to have a limited point of utilization hence insisting that the client be able to re-enter information and reconfirm authentication after several hours of logging into the system.

What is the current status of the security for WiMAX (based on IEEE 802.16 Standard)?

As a model of the 4G communication system, WiMAX or the Worldwide Interoperability for Microwave Access is considered to be the latest form of wireless connectivity known to the human society at present. Surpassing a 30-meter wireless range for internet access, this system of connection is widely used worldwide.

Relatively though, because of its wide-ranged manner of reaching its users, there are instances when unauthorized clients are able to access signal and some are even able to hack through the system and further create possibilities of accessing and utilizing the services provided through the said wireless connection. As a result, those who have actually paid for the service begin to suffer the consequences of overloaded users of the system. This is the reason why the need to establish a system of security in relation to the establishment of WiMAX central signal stations have been considered.

In relation to the currently established security system of WiMAX, it has been noted to be based on two quality encryption operations. One is that of the DES3 and another is that of the AES. Noted to be within the leading edge of protection programs for the operation, the security processor that functions as the protector of the system under the DES3 and the AES operation are specifically related under the data over cable service interface specification or the DOCSIS security protocol.

This means that the encryption of information and message passed on through the wireless communication system is handled within the data cables connecting the source of signal towards its users. This then allows the users to access information with much protection from possible third-party intruders from non-authorized public users.

Certification of users’ access code is another system that WiMAX uses at present for establishing system protection. However, given the encryption system used for WiMAX, it could be realized how relatively weak it has been tested when it comes to the needed management of frames as information is released within each dedicated data cable. It has been reported that the 802.11 version of the encryption system is weak when it comes to allowing third party attackers in collecting information about subscribers around the area and likely hacking through the system using the said collected data from authorized users (Weinschenk, 2010). Through manipulating the information they have collected, they are often able to intrude within the system and get legitimate service utilizing legitimate access points and access codes.

Can Kerberos authentication protocol be used in WiMAX network? explain why?

Considering that WiMax operates in larger forms of network, specific adjustments on the system of authentication protocol that Kerberos provides could make it a viable source of security for the system (Fazel. et al, 2008). Relatively, Kerberos could address the weakness of WiMAX’s current system of protection through imposing the utilization of the ticket granting ticket operation. This way, the information code that is given to users becomes constantly dynamic which means it shall be changed every time a user tends to access the network service that WiMAX provides (Ergen. 2009) .

This could at some point be tedious especially when it comes to actual application. Nevertheless, its establishment within the system of operation that WiMAX embraces would likely protect it from intruders who are relying on repetitive information used for access by legitimate users of the service. With such protection, third party hackers or intruders would not be able to immediately “guess” the access codes that the users use as they are expected to change every time that the authorized clients log into the system. The uniformity of log in details along with the code used to access the service that WiMax gadgets provide often make the system vulnerable to those who are able to gather such information from original users. The dynamic system of changing codes would simply allow the users to secure the services they receive more and become more capable of protecting their position in receiving the services that WiMAX operation should be able to provide them with.

References

Fazel, K. and Kaiser, S. (2008). Multi-Carrier and Spread Spectrum Systems: From OFDM and MC-CDMA to LTE and WiMAX, 2nd Edition, John Wiley & Sons.

Ergen, M. (2009). Mobile Broadband – Including WiMAX and LTE. Springer, NY.

Weinschenk, . (April 16, 2010). “Speeding Up WiMax“. IT Business Edge.

Neuman, C.  and Ts’o, T.  (September 1994). “Kerberos: An Authentication Service for Computer Networks”. IEEE Communications 32 (9): 33–8.

Kohl , J.T., Neuman, C, and Ts’o, T (1994). “The Evolution of the Kerberos Authentication System”. In Johansen, D.; Brazier, F. M. T. (Postscript). Distributed open systems. Washington: IEEE Computer Society Press. pp. 78–94.

Walla, M. (2000). Kerberos Explained. Windows 2000 Advantage magazine. http://technet.microsoft.com/library/Bb742516#EEAA. (Retrieved on July 22, 2012).

Zhu, L and Tung, B. (2006). Public Key Cryptography for Initial Authentication in Kerberos (PKINIT). http://tools.ietf.org/html/rfc4556. (Retrieved on July 22, 2012).

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Paper Samples & Examples

The Risk of Teenagers Smoking, Research Paper Example

Introduction Smoking is a significant public health concern in the United States, with millions of people affected by the harmful effects of tobacco use. Although, [...]

Pages: 11

Words: 3102

Research Paper

Impacts on Patients and Healthcare Workers in Canada, Research Paper Example

Introduction SDOH refers to an individual’s health and finances. These include social and economic status, schooling, career prospects, housing, health care, and the physical and [...]

Pages: 7

Words: 1839

Research Paper

Death by Neurological Criteria, Research Paper Example

Ethical Dilemmas in Brain Death Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in [...]

Pages: 7

Words: 2028

Research Paper

Ethical Considerations in End-Of-Life Care, Research Paper Example

Ethical Dilemmas in Brain Death Ethical dilemmas often arise in the treatments involving children on whether to administer certain medications or to withdraw some treatments. [...]

Pages: 5

Words: 1391

Research Paper

Ethical Dilemmas in Brain Death, Research Paper Example

Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in healthcare and emphasizes the need [...]

Pages: 7

Words: 2005

Research Paper

Politics of Difference and the Case of School Uniforms, Research Paper Example

Introduction In Samantha Deane’s article “Dressing Diversity: Politics of Difference and the Case of School Uniforms” and the Los Angeles Unified School District’s policy on [...]

Pages: 2

Words: 631

Research Paper

The Risk of Teenagers Smoking, Research Paper Example

Introduction Smoking is a significant public health concern in the United States, with millions of people affected by the harmful effects of tobacco use. Although, [...]

Pages: 11

Words: 3102

Research Paper

Impacts on Patients and Healthcare Workers in Canada, Research Paper Example

Introduction SDOH refers to an individual’s health and finances. These include social and economic status, schooling, career prospects, housing, health care, and the physical and [...]

Pages: 7

Words: 1839

Research Paper

Death by Neurological Criteria, Research Paper Example

Ethical Dilemmas in Brain Death Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in [...]

Pages: 7

Words: 2028

Research Paper

Ethical Considerations in End-Of-Life Care, Research Paper Example

Ethical Dilemmas in Brain Death Ethical dilemmas often arise in the treatments involving children on whether to administer certain medications or to withdraw some treatments. [...]

Pages: 5

Words: 1391

Research Paper

Ethical Dilemmas in Brain Death, Research Paper Example

Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in healthcare and emphasizes the need [...]

Pages: 7

Words: 2005

Research Paper

Politics of Difference and the Case of School Uniforms, Research Paper Example

Introduction In Samantha Deane’s article “Dressing Diversity: Politics of Difference and the Case of School Uniforms” and the Los Angeles Unified School District’s policy on [...]

Pages: 2

Words: 631

Research Paper