Total views : 358

Authentication Framework for Military Applications Employing Wireless Sensor Networks and Private Cloud


  • Department of Information Technology, SRM University, Chennai - 603203, Tamil Nadu, India


Objectives: To provide an authentication framework between military data centres pertaining to different levels of operations within the private cloud and a simple authentication schema for authenticating users at the wing-commander level in the special sinks deployed in our territory closer to line of control. Methods: In order to achieve the above mentioned objectives, we designed a conceptual defense structure that will highlight the various hierarchical levels of military operations. Military WSNs and data centres will utilize the designed simple authentication schema to improve the lifetime of the WSNs. The methodology adopted primarily consists of modifications to the existing Kerberos setup, so that it could fit the conceptual defense structure by utilizing Heimdal Kerberos distribution. Heimdal's modified Kerberos distribution is utilized in the cloud gateway system to create Kerberos Distribution Center. The modified Kerberos equations are provided in this paper. Findings: Based on the simulations carried out, it is identified that number of messages required for various dialogs for modified Kerberos is relatively less compared to the original version of Kerberos. The response time for modified Kerberos in single realm and cross realm based on different number of requests showed that modified Kerberos is performing better and efficient with respect to the response time metric. Minimum number of messages required for Kerberos Authentication using v4 (Simple dialog), v4 (Secure dialog), v4 (Authentication dialog), v5 (Request for service in another realm using Inter realm authentication) are 3, 5, 6 and 7 respectively. Response times range for single realm lie in the range of 3ms to 20ms approximately for 10 to 100 requests per minute. Response times range for cross realm lie in the range of 7 ms to 47 ms approximately for 10 to 100 requests per minute. The authentication time to authenticate instructions received at special sinks from level 1 resource via cloud gateway ranges from 4.5 ms to 6 ms for message sizes ranging from 100 bytes to 1000 bytes. The response times obtained from single realm authentication indicates lesser values as compared against cross realm authentication which is in consensus with the theory of Kerberos. Applications: The proposed scheme finds its application in all mission critical tasks where the time taken for successful authentication of users should be drastically reduced to improve the system performance.


Authentication, Cloud, Defense, Kerberos, Wireless Sensor Networks.

Full Text:

 |  (PDF views: 319)


  • Reddy AMV, Katru SP, Padmanabh K. Can we plug wireless sensor network to cloud. SETLabs Briefings; 2009.
  • NetworkWorld. Available from: 3. Li H, Dai Y, Tian L, Yang H. Identity based authentication for cloud computing, cloud computing. Springer-Verlag: Berlin Heidelberg; 2009. p. 157–66.
  • Foster I, Kesselman C, Tsudik G, Tuecke S. A security architecture for computational grids. Proceeding of the 5thACM conference on communications and security; 1998. p. 83–92.
  • Freier AO, Kocher PC. The SSL protocol, v3.0. InternetDraft; 1996. p. 1–63.
  • Mao W. An identity based non interactive authentication framework for computational grids. HP Labs: UK; 2004.
  • Song Z, Molina J, Lee S, Lee H, Kotani S, Masuoka R. TrustCube: An infrastructure that builds trust in client. Future of Trust in Computing; 2009. p. 68–79.
  • Song Z, Molina J, Lee S, Lee H, Kotani S, Masuoka R, Shi E. Authentication in the clouds: A framework and its application to mobile users. CCSW; 2010. p. 1–6.
  • Use case scenarios for kerberos provided by MIT. Available from: Kerberos-Cloud-use-cases-11june2010.pdf
  • Field Manual 24-12. Communications in a come as-you-are war. USA: Department of the Army; 1990.
  • Liebig J. Authentication on DoD information systems. GSLC Practical Assignment, Version1.0; 2004.
  • Yavuz AA, Alagoz F, Anarim E. A new multi tier adaptive military MANET security protocol using hybrid cryptography and signcryption. Turkish Journal of Electrical Engineering and Computer Science. 2010; 18(1):1–21.
  • The Warfighter Information network- Tactical (WIN-T). Available from: systems/ground/win-t.htm
  • Gu DL, Pei G, Ly H, Gerla M, Hong X. Hierarchical routing for multi layer ad-hoc wireless networks with UAVs. IEEE MILCOM 2000; 2000. p. 310–14.
  • Kong J, Luo H, Xu K, Gu DL, Gerla M, Lu S. Adaptive security for multi layer ad-hoc networks. Special Issue of Wireless Communications and Mobile Computing. 2002; 2:533–47.
  • Candolin C, Lundber J, Kari H. Packet level authentication in military networks. Finland: Helsinki University; 2005. p. 1–3.
  • Tang H, Salmanian M, Chang C. Strong authentication for tactical mobile ad-hoc networks. Canada: Technical Memorandum; 2007.
  • Nagaraju S, Parthiban L. SecAuthn: Provably secure multifactor authentication for the cloud computing system systems, Indian Journal of Science and Technology. 2016; 9(9):1–18.
  • Choi J-H, Lee S-H, Kim M-K. Integrated user authentication method using BAC (Brokerage Authentication Center) in multi-clouds. Indian Journal of Science and Technology. 2015; 8(25):1–7.
  • Kumar DG, Rajasekaran S, Prabu R. PB verification and authentication for server using multi communication. Indian Journal of Science and Technology. 2016; 9(5):1–6.
  • Hong S. Multi-factor user authentication on group communication. Indian Journal of Science and Technology. 2015; 8(15):1–6.
  • Hagedorn A, Starobinski D, Trachtenberg A. Rateless Deluge: Over-the-air programming of wireless sensor networks using random linear codes. Proceedings of International Conference on Information Processing in Sensor Networks, IPSN’08; St Louis, MO. 2008. p. 457–66.
  • Heimdal kerberos distribution. Available from:
  • Wickremasinghe B, Calheiros RN, Buyya R. CloudAnalyst: A cloudSim-based modeller for analyzing cloud computing environments and application, 24th IEEE International Conference on Advanced Information Networking and Applications; Perth, WA. 2010. p. 446–52.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.