ADAPTIVE CERTIFICATE-BASED AUTHENTICATION PROTOCOL FOR MOBILE GRID INFRASTRUCTURE

Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 3, Issue 3

Abstract

Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a Grid environment the security issues are like Authentication, Authorization, Message protection and Delegation handled by GSI (Grid Security Infrastructure). Proving better Security between Mobile devices and Grid infrastructure is a major issue, because of owing to the open nature of wireless networks, heterogeneous and distributed environments. In a Mobile Grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the Mobile Grid environment. Some adaptive methodology or solution needed to solve the issues like Authentication of a base station, Security of information flowing between a mobile user and a base station, Prevention of attacks within a base station, Hand-over of authentication information, Communication cost of establishing a session key between mobile user and base station, Computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the Grid Service, the mobile devices should be proven authentic. This paper proposes the Dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and Dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources.

Authors and Affiliations

Anusha Bhuvaneswari G, Parveen Begam H.

Keywords

Related Articles

CURRENT SURVEY OF WEB CONTENT MINING TECHNIQUES

Data mining is also called knowledge discovery in databases (KDD). Web Mining is the application of data mining techniques to discovery interesting patterns that can be useful from ever expanding dat...

COMPARATIVE ANALYSIS OF HANDOFF TECHNIQUES USING RESPONSE SURFACE ALGORITHM

Handoff is one of the most challenging topic for the next-generation wireless network. In this paper, the handoff techniques are compared by using the five parameters such as Bandwidth, Network latency,...

A SECURE AND RELIABLE WIRELESS DATA COMMUNICATION FOR SMART GRID

Power system incorporating an information network, is the key to realizing the smart grid vision, but also introduced a number of security issues. Lower the high cost of wireless protocol to communicate...

A STUDY ON MICROCALCIFICATIONS IN MAMMOGRAMS USING M-BAND WAVELET TRANSFORM AND SUPPORT VECTOR MACHINE

Digital Mammography is a most important vital task early detection of breast cancer especially in the case of microcalcification. Microcalcification is tiny calcium less than 1/50 of an inch of a milli...

GAIT ANALYSIS BY DIFFERENT TECHNIQUES

Gait analysis is used in clinical evaluation of musculoskeletal system, design and assessment of prosthesis (especially for lower limbs), in the process of rehabilitation after injury and in biometrics. This paper review...

Download PDF file
  • EP ID EP365587
  • DOI -
  • Views 116
  • Downloads 0

How To Cite

Anusha Bhuvaneswari G, Parveen Begam H. (2016). ADAPTIVE CERTIFICATE-BASED AUTHENTICATION PROTOCOL FOR MOBILE GRID INFRASTRUCTURE. Elysium Journal of Engineering Research and Management, 3(3), -. https://www.europub.co.uk/articles/-A-365587