Authentication in SAAM routers
Loading...
Authors
Szczepankiewicz, Peter J.
Velazquez, Luis E.
Subjects
Subject term: Authentication, Encryption, Routing, Java, Key Distribution, Kerberos, Secure Time Synchronization.
Advisors
Xie, Geoffrey
Buddenberg, Rex
Date of Issue
2001-09
Date
June, 2000
Publisher
Monterey, California. Naval Postgraduate School
Language
en_US
Abstract
Authentication is particularly important in the SAAM system because SAAM uses mobile codes, called resident agents. These resident agents are loaded onto SAAM routers dynamically, and execute on the destination SAAM router. Mobile code in the SAAM system requires an authentication scheme to prevent an outsider from sending a malicious resident agent. The primary focus of this research is to find the best-fit authentication scheme for the SAAM system. SAAM with authentication can be used as the technical network infrastructure to support Network Centric Warfare (NCW) as described in JV2OlO. The prototype in this thesis authenticates new nodes that join a SAAM network using Kerberos. Signaling data, called control traffic, is authenticated with a dynamic signature key that changes every two minutes. Once a SAAM node is authenticated, its identity is protected throughout the battle.
Type
Thesis
Description
Series/Report No
Department
Information Technology Management
Organization
Naval Postgraduate School (U.S.)
Identifiers
NPS Report Number
Sponsors
Funder
Format
xvi, 208 p.;28 cm.
Citation
Distribution Statement
Approved for public release; distribution is unlimited.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
