Location based Kerberos Authentication Protocol

Nabih Abdelmajid, Alamgir Hossain, Simon Shepherd, Khaled Mahmoud

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    13 Citations (Scopus)


    Online communication offers organizations greater efficiency. However, online processes increase the threat level during message transfer. This necessitates researchers to develop and improve security protocols in order to enhance the security of communication lines. Despite the evaluation and acceptance of many authentication protocols, online communications remain insecure, we propose to add the user's physical location as a new authentication factor into Kerberos protocol and call it N-Kerberos protocol, and we validate the new form of Kerberos (N-Kerberos).
    Original languageEnglish
    Title of host publicationSocialCom 2010 : proceedings, the second IEEE International Conference on Social Computing : PASSAT 2010, the second IEEE International Conference on Privacy, Security, Risk, and Trust
    Place of PublicationPiscataway, NJ
    ISBN (Print)978-1424484393
    Publication statusPublished - 30 Sept 2010
    EventIEEE 2nd International Conference on Social Computing (SocialCom) - Minneapolis, Minnesota, USA
    Duration: 30 Sept 2010 → …


    ConferenceIEEE 2nd International Conference on Social Computing (SocialCom)
    Period30/09/10 → …


    Dive into the research topics of 'Location based Kerberos Authentication Protocol'. Together they form a unique fingerprint.

    Cite this