Abstract
Kerberos, a renowned token based authentication protocol, which is famous since mid-80’s for its cryptographic process, assurance of privacy, and data security for identifying appropriate users. Due to its versatile characteristics, users of the system often need to remember complex passwords as the good practice of the method requires update of the same within a defined time-frame which becomes bit difficult for users to cope up with. At the same time, it also not provides adequate channel security to transmit the user credential between the pathway of the client and server. Therefore, researchers are trying to find out a simple solution where user does not necessitate to memorize the passwords where it could guarantee better user validation. In this paper, an enhancement of Kerberos authentication model has been proposed where biometric template and Steganography are incorporated to solve the existing weaknesses. Instead of taking username and password, the new solution will take a pair of random fingerprints from the user and convert it into a hash. It will then embed the hash in the randomized image and send it to the server for authentication. A security analysis of the proposed protocol is proven using BAN logic in this article where it ensures reliability, practicability and security of the enhanced Kerberos protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kumar, A., Ome, H.: An improved and secure multiserver authentication scheme based on biometrics and smartcard. Digit. Commun. Netw. 4(1), 27–38 (2018)
Van Dijk, M., et al.: Providing authentication codes which include token codes and biometric factors. U.S. Patent No. 8,752,146, 10 June 2014
Shanmugapriya, D., Padmavathi, G.: A survey of biometric keystroke dynamics: approaches, security and challenges. arXiv preprint arXiv:0910.0817 (2009)
Brostoff, S., Sasse, M.A.: Are passfaces more usable than passwords? A field trial investigation. In: McDonald, S., Waern, Y., Cockton, G. (eds.) People and Computers XIV – Usability or Else!, pp. 405–424. Springer, London (2000). https://doi.org/10.1007/978-1-4471-0515-2_27
Kesanupalli, R.: Fingerprint sensor device and system with verification token and methods of using. U.S. Patent Application No. 12/561,186
Hessler, C.J.: Method for mobile security via multi-factor context authentication. U.S. Patent No. 8,935,769, 13 January 2015
Ashibani, Y., Kauling, D., Mahmoud, Q.H.: Design and implementation of a contextual-based continuous authentication framework for smart homes. Appl. Syst. Innov. 2(1), 4 (2019)
Koong, C.-S., Yang, T.-I., Tseng, C.-C.: A user authentication scheme using physiological and behavioral biometrics for multitouch devices. Sci. World J. 2014, 1–12 (2014)
Mukhamedov, A.: Full agreement in BAN kerberos. In: 2005 Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, pp. 218–223. Citeseer (2005)
Lo, G.: A hierarchy of authentication specifications. In: Proceedings of the 10th Computer Security Foundations Workshop (CSFW 1997). IEEE Computer Society (1997)
Kasslin, K., Tikkanen, A.: Kerberos V Security: ReplayAttacks. Enhancing Trust, Citeseer, p. 191
Fan, K., Li, H., Wang, Y.: Security analysis of the kerberos protocol using BAN logic. In: 2009 Fifth International Conference on Information Assurance and Security (2009). https://doi.org/10.1109/ias.2009.320
Leu, J.-S., Hsieh, W.-B.: Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards. IET Inf. Secur. 8(2), 104–113 (2013)
Tsai, J.-L., Lo, N.-W., Tzong-Chen, W.: Novel anonymous authentication scheme using smart cards. IEEE Trans. Ind. Inform. 9(4), 2004–2013 (2012)
Yang, G., et al.: Two-factor mutual authentication based on smart cards and passwords. J. Comput. Syst. Sci. 74(7), 1160–1172 (2008)
Chen, B.-L., Kuo, W.-C., Wuu, L.-C.: Robust smart-card-based remote user password authentication scheme. Int. J. Commun Syst 27(2), 377–389 (2014)
Chattaraj, D., Sarma, M., Das, A.K.: A new two-server authentication and key agreement protocol for accessing secure cloud services. Comput. Netw. 131, 144–164 (2018)
Chaturvedi, A., et al.: A privacy preserving biometric-based three-factor remote user authenticated key agreement scheme. J. Inf. Secur. Appl. 32, 15–26 (2017)
Nacer, H., et al.: A distributed authentication model for composite web services. Comput. Secur. 70, 144–178 (2017)
Das, S., et al.: Lip biometric template security framework using spatial steganography. Pattern Recogn. Lett. 126, 102–110 (2019)
Bhatnagar, G., Wu, Q.M.J., Raman, B.: Biometric template security based on watermarking. Procedia Comput. Sci. 2, 227–235 (2010)
Bedi, P., Bansal, R., Sehgal, P.: Multimodal biometric authentication using PSO based watermarking. Procedia Technol. 4, 612–618 (2012)
Sajjad, M., et al.: CNN-based anti-spoofing two-tier multi-factor authentication system. Pattern Recogn. Lett. 126, 123–131 (2019)
Kadhim, I.J., et al.: Comprehensive survey of image steganography: techniques, evaluations and trends in future research. Neurocomputing 335, 299–326 (2019)
Minz, K.S., Yadav, P.S.: A review on secure communication method based on encryption and steganography. Complexity 6(01) (2019)
Sharma, U.: A review on various approaches of data hiding for secure data transmission (2019)
Jeong, Y.-S., Lee, B.-K., Lee, S.-H.: An efficient device authentication protocol using bioinformatic. In: Wang, Y., Cheung, Y., Liu, H. (eds.) CIS 2006. LNCS (LNAI), vol. 4456, pp. 567–575. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74377-4_59
Alturki, F., Mersereau, R.: A novel approach for increasing security and data embedding capacity in images for data hiding applications. In: Proceedings International Conference on Information Technology: Coding and Computing. IEEE (2001)
Ali, S.S., et al.: Polynomial vault: a secure and robust fingerprint based authentication. IEEE Trans. Emerg. Top. Comput. (2019)
Lee, J.K., Ryu, S.R., Yoo, K.Y.: Fingerprint-based remote user authentication scheme using smart cards. Electron. Lett. 38(12), 554–555 (2002)
Wangkeeree, N., Boonkrong, S.: Finding a suitable threshold value for an iris-based authentication system. Int. J. Electr. Comput. Eng. 9, 3558 (2019). (2088–8708)
Mare, S.F., Vladutiu, M., Prodan, L.: Secret data communication system using Steganography, AES and RSA. In: 2011 IEEE 17th International Symposium for Design and Technology in Electronic Packaging (SIITME). IEEE (2011)
Korukonda, V.R., Reddy, E.S.: Iris based texture analysis for verification and detection: revisit (2019)
Kannavara, R., Bourbakis, N.: Iris biometric authentication based on local global graphs: an FPGA implementation. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. IEEE (2009)
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. In: ACM Transactions on Computer Systems (TOCS), pp. 18–36. ACM, New York (1990)
Acknowledgement
The authors would like to express their gratitude to the authority of Cyber Security Center, DIU (CSC, DIU) for the cooperation and support to execute the study.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Tabassum, M., Sarower, A.H., Esha, A., Hassan, M.M. (2020). An Enhancement of Kerberos Using Biometric Template and Steganography. In: Bhuiyan, T., Rahman, M.M., Ali, M.A. (eds) Cyber Security and Computer Science. ICONCS 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 325. Springer, Cham. https://doi.org/10.1007/978-3-030-52856-0_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-52856-0_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-52855-3
Online ISBN: 978-3-030-52856-0
eBook Packages: Computer ScienceComputer Science (R0)