ADAPTIVE CERTIFICATE-BASED AUTHENTICATION PROTOCOL FOR MOBILE GRID INFRASTRUCTURE

Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 3, Issue 3

Abstract

Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a Grid environment the security issues are like Authentication, Authorization, Message protection and Delegation handled by GSI (Grid Security Infrastructure). Proving better Security between Mobile devices and Grid infrastructure is a major issue, because of owing to the open nature of wireless networks, heterogeneous and distributed environments. In a Mobile Grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the Mobile Grid environment. Some adaptive methodology or solution needed to solve the issues like Authentication of a base station, Security of information flowing between a mobile user and a base station, Prevention of attacks within a base station, Hand-over of authentication information, Communication cost of establishing a session key between mobile user and base station, Computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the Grid Service, the mobile devices should be proven authentic. This paper proposes the Dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and Dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources.

Authors and Affiliations

Anusha Bhuvaneswari G, Parveen Begam H.

Keywords

Related Articles

A SECURITY APPLICATION WITH AUTO-SWITCHING PROFILE MANAGER AND SECURE SMS TRANSACTION

Mobile phone security has become more important in the mobile computing applications. Most data breaches on the mobile devices are typically due to basic security failure, such as weak passwo...

BRAIN TUMOR IMAGE SEGMENTATION USING INTELLIGENT MEAN SHIFT CLUSTERING TECHNIQUE

Brain tumor is a deadly disease which challenges on detecting tumor cells. The tumor detection becomes more complicated for diagnosis as it exhibits complex characteristics. To address this pr...

EFFECTIVE LEARNING OF RESTRAINTS FOR SEMI ADMINISTERED CLUSTERING

Semi-supervised clustering is improving clustering performance by considering user supervision in the form of pairwise constraints. We study the active learning problem of selecting pairwise must-link and cannot...

Elimination of Commutation Failure of VSC HVDC System with Controllable Capacitor

This system presents a totally unique hybrid converter configuration for traditional Line-Commutated converter (LCC) HVDC technology aiming to eliminate commutation failures at lower place serious faults. Dynamic series...

COMPARATIVE ANALYSIS OF CANTILEVER TYPE MEMS DEVICE FOR HUMIDITY MEASUREMENT

This paper presents research on water content present in transformer oils. Online moisture measurements were analyzed by using different designs of MEMS humidity sensor. The measurement of humidity is of great importance...

Download PDF file
  • EP ID EP365587
  • DOI -
  • Views 114
  • Downloads 0

How To Cite

Anusha Bhuvaneswari G, Parveen Begam H. (2016). ADAPTIVE CERTIFICATE-BASED AUTHENTICATION PROTOCOL FOR MOBILE GRID INFRASTRUCTURE. Elysium Journal of Engineering Research and Management, 3(3), -. https://europub.co.uk/articles/-A-365587