ADAPTIVE CERTIFICATE-BASED AUTHENTICATION PROTOCOL FOR MOBILE GRID INFRASTRUCTURE

Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 3, Issue 3

Abstract

Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a Grid environment the security issues are like Authentication, Authorization, Message protection and Delegation handled by GSI (Grid Security Infrastructure). Proving better Security between Mobile devices and Grid infrastructure is a major issue, because of owing to the open nature of wireless networks, heterogeneous and distributed environments. In a Mobile Grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the Mobile Grid environment. Some adaptive methodology or solution needed to solve the issues like Authentication of a base station, Security of information flowing between a mobile user and a base station, Prevention of attacks within a base station, Hand-over of authentication information, Communication cost of establishing a session key between mobile user and base station, Computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the Grid Service, the mobile devices should be proven authentic. This paper proposes the Dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and Dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources.

Authors and Affiliations

Anusha Bhuvaneswari G, Parveen Begam H.

Keywords

Related Articles

AN EFFICIENT ACTIVITY TRACKING AND RECOGNITION USING THE NEURAL NETWORK CLASSIFIER

A continuous video contains two important components such as tracks of the person in the video, and localization of the actions that are performed by the actors. The analysis of the activity is used for so...

BASED ON GREEN COMPUTING WORLD, THE HYBRID MALWARE DETECT MEMORY MAPPER IN KERNEL CENTRIC VIRTUAL MACHINE

Kernel malwares can provide user level-malware characteristics with additional probabilities of hiding their malicious activities by altering the legitimate kernel behavior of an operating system. Many researc...

A SURVEY ON UNIFIED COMMUNICATION

In recent years, unified communication is becoming a critical part in enterprise communication. Voice, messaging, conferencing, presence and availability, and directories have all become fundamental requirements...

Amalgamation of Forecasting Environment Based upon Natural Disaster (Earth Quake) Analysis using DM Techniques

Streams of data is collected from big data and gathered information is separated from these data is known as data mining. This tools forecasts performances and future developments, permitting trades to provide useful dec...

COMMUNITY DISCOVERY: COMPARITIVE SURVEY BETWEEN PAGE RANK, HITS, SALSA AND HEIGEN

his paper presents the comparative study of ranking algorithm such as PageRank, HITS, SALSA and Heigen. These algorithms share a common factor that is it finds the principal eigen vector. We experimented the...

Download PDF file
  • EP ID EP365587
  • DOI -
  • Views 122
  • Downloads 0

How To Cite

Anusha Bhuvaneswari G, Parveen Begam H. (2016). ADAPTIVE CERTIFICATE-BASED AUTHENTICATION PROTOCOL FOR MOBILE GRID INFRASTRUCTURE. Elysium Journal of Engineering Research and Management, 3(3), -. https://europub.co.uk/articles/-A-365587