Authentication in SAAM routers
dc.contributor.advisor | Xie, Geoffrey | |
dc.contributor.advisor | Buddenberg, Rex | |
dc.contributor.author | Szczepankiewicz, Peter J. | |
dc.contributor.author | Velazquez, Luis E. | |
dc.date | June, 2000 | |
dc.date.accessioned | 2012-08-09T19:28:40Z | |
dc.date.available | 2012-08-09T19:28:40Z | |
dc.date.issued | 2001-09 | |
dc.identifier.uri | https://hdl.handle.net/10945/9331 | |
dc.identifier.uri | http://handle.dtic.mil/100.2/ADA380178 | |
dc.description.abstract | Authentication is particularly important in the SAAM system because SAAM uses mobile codes, called resident agents. These resident agents are loaded onto SAAM routers dynamically, and execute on the destination SAAM router. Mobile code in the SAAM system requires an authentication scheme to prevent an outsider from sending a malicious resident agent. The primary focus of this research is to find the best-fit authentication scheme for the SAAM system. SAAM with authentication can be used as the technical network infrastructure to support Network Centric Warfare (NCW) as described in JV2OlO. The prototype in this thesis authenticates new nodes that join a SAAM network using Kerberos. Signaling data, called control traffic, is authenticated with a dynamic signature key that changes every two minutes. Once a SAAM node is authenticated, its identity is protected throughout the battle. | en_US |
dc.description.uri | http://archive.org/details/authenticationin109459331 | |
dc.format.extent | xvi, 208 p.;28 cm. | en_US |
dc.language.iso | en_US | |
dc.publisher | Monterey, California. Naval Postgraduate School | en_US |
dc.rights | This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. | en_US |
dc.title | Authentication in SAAM routers | en_US |
dc.type | Thesis | en_US |
dc.contributor.corporate | Naval Postgraduate School (U.S.) | |
dc.contributor.department | Information Technology Management | |
dc.subject.author | Subject term: Authentication, Encryption, Routing, Java, Key Distribution, Kerberos, Secure Time Synchronization. | en_US |
dc.description.recognition | Outstanding Thesis | en_US |
dc.description.service | U.S. Navy (U.S.N.) author. | en_US |
etd.thesisdegree.name | M.S. in Information Technology Management | en_US |
etd.thesisdegree.level | Masters | en_US |
etd.thesisdegree.discipline | Information Technology Management | en_US |
etd.thesisdegree.grantor | Naval Postgraduate School | en_US |
dc.description.distributionstatement | Approved for public release; distribution is unlimited. |
Files in this item
This item appears in the following Collection(s)
-
1. Thesis and Dissertation Collection, all items
Publicly releasable NPS Theses, Dissertations, MBA Professional Reports, Joint Applied Projects, Systems Engineering Project Reports and other NPS degree-earning written works. -
2. NPS Outstanding Theses and Dissertations