Upload
others
View
17
Download
0
Embed Size (px)
Citation preview
90
CHAPTER 7
AUTHENTICATION EMPLOYING KERBEROS
The continuing need for private communication in public world drives
the development of communications security technology and forces us to follow
stringent measures and policies to achieve appreciable privacy. Security is an
inherent part of any communication systems, be it mobile based or computer based
or human based. Security not only depends on the communication systems but also
on the applications utilizing these systems. The level of security to be achieved
depends on the sensitivity of applications and the frequency with which attempts
will be on to break into these systems by adversaries. One such extremely sensitive
area where communications security, device security, and network security must be
ensured to a great extent is in defense.
Though the activities of enemies and adversaries, against a nation’s
defense are diverse, major concentrations are towards interrupting the military
communication network, intercepting the communications across different military
entities, personifying as authenticated users and sending messages to different
entities, modifying the intercepted message and retransmitting the same. These
aforementioned actions undoubtedly will create an insecure environment in the
military. Enemies breaking into military communications and military security
technologists developing security solutions are circular processes. Hence in this
chapter we concentrate on the general security problems and measures available to
mitigate them with respect to communications in section 7.1. Section 7.2 focuses on
the importance of communication security and authentication within and among
military systems. Major thrust on employing Kerberos authentication protocol in the
presence of defense private cloud and cloud gateway connecting military WSNs and
91
military personnel in the cloud, is provided in section 7.3. Section 7.4 deals with the
analysis of response times for authentication in local realm and cross realm through
different configurations of cloud based military entities leading towards Quality of
Service (QoS).
7.1 OVERVIEW OF SECURITY PROBLEMS AND SECURITY
SOLUTIONS
Before going to the description on how I have implemented a modified
form of Kerberos in the Military System Security, this section provides a
fundamental understanding and classification of various types of security attacks,
security mechanisms to prevent, detect or recover from the attacks and services that
enhance the security of the data processing systems and the information transfers of
an organization.
Based on X.800 and RFC 2828, security attacks are primarily classified
into active and passive attacks. Operation of system resources gets affected and they
get altered during active attacks. Active attacks get further divided into the
following sub categories:
a. Masquerade
b. Replay
c. Modification of messages
d. Denial of services
When data stream gets modified or a false stream of data gets added in
the communication channel before reaching a specific destination it is considered
that an active attack has taken place. When one entity pretends to be a different
entity it is normal to consider it as a form of MASQUERADE. The passive capture
of a data unit and its retransmission to produce an unauthorized effect is known as
REPLAY ATTACKS. A portion of a legitimate message gets altered or original
92
message segments get reordered or delayed, resulting in the MODIFICATION OF
MESSAGES. When the communication services to an authorized/authenticated user
is denied, it is known as Denial of Service (DoS).
Passive attacks attempt to learn or make use of information from the
system but do not affect system resources. The very purpose of passive attack is
eavesdropping into transmissions. Majority of passive attacks can be classified
under the categories of release of message contents and traffic analysis.
Apart from providing an overview of security attacks, X.800 also
specifies different security mechanisms to mitigate various attacks. These security
mechanisms are broadly classified into specific security mechanism and pervasive
security mechanisms. Specific security mechanisms are techniques incorporated at
appropriate protocol layers. Popular specific security mechanisms include
encipherments, digital signature, access control, data integrity and authentication
exchange. Encipherment converts intelligible data to an unintelligible one. Proving
the identity of the source and protecting against forgery is the applications of digital
signature. Release of message contents and traffic analysis can be mitigated by
access control mechanisms that enforce access rights to resources. Data integrity
mechanisms assure the integrity of a data unit or stream of data units. Source and
destination can prove their identity with the help of authentication exchange
mechanisms. Pervasive security mechanisms are not specific to any particular
protocol layer. These mechanisms include the following:
a. Trusted functionality
b. Security label
c. Event Detection
d. Security Audit trail
e. Security Recovery
93
Security service is defined as a service provided by a protocol layer of
communicating open systems which ensure adequate security of the systems or of
data transfers. Generally, security services are classified under five categories and
fourteen specific services are listed based X.800 specifications. Security policies are
implemented using security services and security services are implemented using
security mechanisms. Figure 7.1 provides relationship between security policies,
services and mechanisms. Figure 7.2 gives a clear view on the categorization of
security services and different services under various categories.
Figure 7.1 Security Policies, Security Services and Security Mechanisms
Table 7.1 as provided by [89] indicates a meaningful relationship
between security services and security mechanisms. Hackers and intruders breaking
into communication systems and security technologists and security management
professionals developing solutions and implementing policies are continuous
activities. This makes quite evident that any security mechanism that is developed
today for a particular threat, attack or vulnerability make become unsuitable for
tomorrow.
94
Figure 7.2 Categorization of Security Services
Hence, the work on developing foolproof security solutions is a never
ending action. Having provided a clear notion about security attacks, services and
mechanisms in this section, it is very apt to place our discussion on the importance
of communications security and authentication within and among military systems
and mechanisms that are available to enhance the security of different heterogeneous
devices in the military in the next section.
95
Table 7.1 Relationship between Security Services and Mechanisms
Mechanism
Service E
ncip
herm
ent
Dig
ital
Sign
atur
e A
cces
s C
ontr
ol
Dat
a In
tegr
ity
Aut
hent
icat
ion
Exch
ange
Traf
fic
Padd
ing
Rou
ting
Con
trol
Not
ariz
atio
n
Peer entity authentication
Y Y Y
Data origin authentication
Y Y
Accesscontrol
Y
Confidentiality Y Y
Traffic flow confidentiality
Y Y Y
Data integrity Y Y Y
Non repudiation Y Y Y
Availability Y Y
7.2 COMMUNICATIONS SECURITY IN MILITARY SYSTEMS
Military communication systems are always characterized by the
presence of sensitive information. This information when obtained by the
adversaries proves to be a major threat for the security of a nation. Hence, efforts are
continuously on to maintain and improve the communications security of these
defense systems. Moreover, defense systems are characterized by heterogeneity in
the type of devices used for command and control operations. In order to account for
the importance of communications security within and across multiple
heterogeneous military systems, this section deals with the variety of methodologies
and techniques used to achieve the same.
96
Reference [90], deals with the communications security operations
utilized in the military, primarily the cryptographic and transmission security
portions. Communications security operations are protective measures taken to deny
unauthorized persons, telecommunications information. An authentication system
protects a communication system against the acceptance of fraudulent transmissions.
In a tactical environment, everyone who communicates requires some form of
authentication. Good authentication procedures contribute to combat survival and
effectiveness, because they aid in establishing the validity of a transmission,
message or originator. Proper authentication techniques prevent enemy from posing
as a friendly station. When authentication procedures are implemented in military
systems, trade off has to be achieved such that effective communications are
maintained without harassment of friendly communications. Reference [90], states
that the most commonly used authentication mechanisms in military are challenge-
reply and transmission authentication. The primary difference between the two is
that the former requires two way communications and the latter does not. But
challenge reply authentication is simple and flexible compared to the transmission
authentication. Reference [90], provides information on the use of codes for tactical
communications. A code is a language substitution system that transforms plain
language of irregular length, such as words and phrases, into groups of characters of
fixed length. In military systems, tactical communications are performed using
security codes and brevity codes. When a code hides meaning from another party, it
is called as a security code. A code that shortens transmissions is called as a brevity
code.
Reference [91], states the transition of DoD in the perspective of
authentication using a combination of three pillars of authentication namely,
“something you know, something you have or something you are”. Previously,
authentication in DoD information systems are carried out using username and
password or Personal Identification number (PIN) only (something you know). In
this modern technological era, the military is implementing more advanced
authentication procedures using the Common Access Card (CAC) [something you
have] and biometrics (something you are). Though, the combination of CAC and
97
biometrics have some obstacles in the implementation, with time and technology
improvements military can use combinations of PIN, CAC and biometrics to
provide authentication for its systems. Reference [92], proposes a new multi tier
adaptive military MANET security protocol using hybrid cryptography and
signcryption. Reference [92], deals with securing military MANET communication
from the perspectives of cryptographic methods used in MANETs, hybrid key
management protocols and structural organization of the military MANETs.
Reference [93], requires the importance of secure, integrated and
efficient networking in Digital Battle Fields (DBFs), which may be comprised of
various critical networking components. MANETs are ideal for instant
communication in both military and civilian applications. Hostile environment
operation and infrastructure less characteristics of MANETs make them susceptible
to various types of attacks. A secure multi cast concept to provide instant secure
communication in a Digital Battle Field (DBF) is proposed in [92]. In [94], [95],
two tiered Unmanned Aerial Vehicle-Mobile Backbone Networks (UAV-MBN)
have been proposed for DBFs utilizing the heterogeneous structure of military
MANETs, which significantly facilitates key management for secure
communication.
Reference [96], deals with Packet Level Authentication (PLA) in military
networks. PLA resembles the verification procedures used to check the authenticity
of money. In PLA, any node shall be able to verify the authenticity of an IP packet
using pre defined security procedures, by being source independent. PLA also
detects illegitimate, erroneous, duplicated and delayed packets in every router and
the destination. PLA provides for mitigating denial of service attacks that are based
on spoofing/forging IP packets and copying or manipulating legitimate IP packets.
The PLA header is added to every IP packet and takes advantage of standard IPv6
header extension techniques. Figure 7.3 given below provides details on different
fields of PLA header added to an IP packet for authentication purposes.
98
Figure 7.3 PLA Extension header
Reference [97], identifies eight requirements of strong authentication in a
military MANET for a tactical scenario. It also proposes two approaches to resolve
strong authentication issues in military MANETs, one based on Public-Key
Infrastructure (PKI) and the other based on Identity Based Encryption (IBE). These
approaches utilize offline key generation and integrate user and device
authentication for access to tactical MANETs. The various requirements for
authentication in tactical MANETs as given in [97] are as follows:
a. Strong Authentication
b. Easy to Use
c. Scalable
d. Low Latency
e. Low Control Overhead
f. Support Re-authentication
g. Support Revocation
h. Interoperable
99
Figure 7.4 depicts the flow chart for strong authentication process
describing the six steps.
Figure 7.4 Six Steps of a Strong Authentication Process
To summarize, this section deals with the security of military
communication systems using different tactical scenarios. From these discussions it
is quite evident that most of the works related to security are dependent on situations
and scenarios. Hence, they cannot be applied to all defense structures.
7.3 AUTHENTICATION, COMMAND/DATA CONNECTIVITY IN
OUR CONCEPTUAL DEFENSE STRUCTURE
In this thesis, we are conceptualizing the use of cloud technology along
with Wireless Sensor Networks deployed for military and other essential purposes.
Private cloud, one of the deployment models of cloud computing is integrated with
military WSNs. Security has always been a concern in military communications.
100
The integration of private defense cloud with WSNs has increased the scope of
mandatory operations and also the risk of security threats and vulnerabilities.
Discussion on the integration of private defense cloud with military WSNs
presented in chapter 4 is expanded here based on Figure 7.5, to provide rigid
authentication procedures with Kerberos.
Figure 7.5 Authentication, Command/ Data Connectivity
Sensor nodes deployed for border patrolling send periodical and event
based messages to Cluster Head1 (CH1) present in our territory. In addition, CH1 is
assumed to send highly prioritized packets with priority set to HIGH to the cloud
gateway. Cloud Gateway that lies at the heart of the defense structure, is logically
partitioned to perform two different functions namely authentication and
information dissemination (functional). Packets that arise out of Cluster Head2
(CH2) and Cluster Head3 (CH3) are set with priority value LOW. Packets are
101
provided with priority values by the source of generation. When the source which
creates packets gets authenticated at the cloud gateway, then the packets are allowed
to enter the gateway and then routed to the appropriate military data center server,
for corresponding services. Every sensor node will be provided with a unique node
ID which shall be utilized during authentication procedures. This unique node ID
shall be assigned from a database of random IDs by one of the data center servers.
The method of assigning node ID applies to cluster heads also. When military
personnel at different levels of military hierarchy wants to communicate with the
immediately preceding and succeeding level, those personnel should get
authenticated through the cloud gateway.
In a nutshell, authentication procedures followed at the cloud gateway
happens for node level authentication from the military WSNs, to utilize the services
of military data center servers. Next, authentication procedures are followed at the
cloud gateway for military personnel level authentication to transmit messages to
the soldiers in the battlefield and to the personnel present at either side of their own
levels.
Kerberos authentication protocol is used to provide rigid authentication
mechanisms, since it can provide authentication effectively at the levels of users,
client systems, servers and applications. For authenticating sensor nodes at cloud
gateway, using Kerberos, cloud gateway houses the Kerberos Server (KS). Since
Gateway is a single system, Kerberos server is a integrated system of Authentication
server (AS) and Ticket Granting Server (TGS). Sensor nodes are considered to be
client systems and Gateway-Functional is considered to be a server that provides a
service of receiving packets after authentication. Cluster heads transmit the packets
from their cluster members to the cloud gateway. The authentication of sensor nodes
is left to the cluster heads. Here in this authentication method using Kerberos, we
require the cluster heads to get authenticated at the cloud gateway-Authentication
before packets from them are allowed to enter Cloud Gateway-Functional.
102
The following equations facilitate the understanding process of how
authentication takes place in single realm where nodes, cluster heads and cloud
gateway are present in an area of few sq.kms:
CH-Cluster Head
GWKS- Gateway Kerberos Server
GWFS-Gateway Functional Server
CH�GWKS : Options||IDCH||RealmCH||IDGWKS||Times||Nonce1 (7.1)
GWKS�CH :
RealmCH||IDCH||TicketGWFS||E(KCH,GWKS,[KCH,GWFS||Times||Nonce1||RealmGWFS||IDG
WFS])||E(KCH[KCH,GWKS]) (7.2)
TicketGWFS=E(KGWFS[Flags||KCH,GWFS||RealmCH||IDCH||ADCH||Times])
a. Exchanges between CH and GWKS to obtain TicketGWFS
CH�GWFS : Options|| TicketGWFS||AuthenticatorCH (7.3)
AuthenticatorCH=E(KCH,GWFS,[IDCH||RealmCH||TS1])
GWFS�CH : E(KCH,GWFS[TS2|| Subkey|| seq#] (7.4)
b. Cluster Head/Gateway Functional Server Authentication Exchange to obtain
service
Authentication of cluster heads at Cloud Gateway follows two different
parts namely, i) exchanges between cluster head and gateway Kerberos server and
ii) cluster head/gateway functional server authentication exchange to obtain service.
103
Equation (7.1) indicates a request from the cluster head to gateway
Kerberos server in order to receive valid ticket for obtaining required services from
gateway functional server. This request consists of identity of cluster head, identity
of gateway Kerberos server, realm in which cluster head is present and the
timestamp of generation of the request along with options.
Equation (7.2) indicates how a ticket for cluster head to obtain services
from gateway functional server is issued by gateway Kerberos server. This message
contain the actual ticket, unique key used for communication between cluster head
and gateway functional server encrypted using the key that is known to cluster head
and gateway Kerberos server alone. The key that is known to cluster head and
gateway Kerberos server is encrypted using the key of cluster head which is known
to cluster head only. The key that is to be shared only among the cluster head and
gateway Kerberos server is generated every time when authentication requests are
received from the cluster heads. Timestamp is added at appropriate places to check
the life and validity of the request and reply.
Equation (7.3) denotes the process of requesting the service from
gateway functional server by the cluster head through providing necessary
credentials such as ticket for gateway functional server issued by gateway Kerberos
server, and authenticator message which contains identity of cluster head and realm
of cluster head encrypted using the key that is known to cluster head and gateway
functional server alone. This key is also present in the ticket for gateway functional
server which encrypted using the key of gateway functional server which is known
to it and gateway Kerberos server.
Equation (7.4) indicates the issuance of subkey for further
communication between cluster head and gateway functional server after
verification of the credentials. Similarly, for authenticating communication between
military personnel at adjacent levels, we consider again gateway to house in
Kerberos Server, source initiating communication to be client and destination
receiving the message to be server.
104
The authentication of military personnel at one level at the cloud
gateway for transmitting messages to any of the adjacent level of personnel obeys
the following equations concerned with Kerberos Authentication Procedures:
SP - Source Personnel
DP - Destination Personnel
GWKS - Gateway Kerberos Server
SP�GWKS : Options||IDSP||RealmSP||IDGWKS||Times||Nonce1 (7.5)
GWKS�SP : RealmSP||IDSP||TicketDP||E(KSP,GWKS,[KSP,DP||Times||Nonce1||
RealmDP||IDDP])||E(KSP[KSP,GWKS]) (7.6)
TicketDP=E(KDP[Flags||KSP,DP||RealmSP||IDSP||ADSP||Times])
a. Exchanges between SP and GWKS to obtain Ticket DP
SP�DP : Options|| TicketDP||AuthenticatorSP (7.7)
AuthenticatorSP=E(KSP,DP,[IDSP||RealmSP||TS1])
DP�SP : E(KSP,DP[TS2|| Subkey|| seq#]) (7.8)
b. SP/DP Authentication Exchange to obtain service
Equation (7.5) indicates a request from the source personnel to gateway
Kerberos server in order to receive valid ticket for obtaining required services from
destination personnel. This request consists of identity of source personnel, identity
of gateway Kerberos server, realm in which source personnel is present and the
timestamp of generation of the request along with options.
Equation (7.6) indicates how a ticket for source personnel to obtain
services from destination personnel is issued by gateway Kerberos server. This
message contain the actual ticket, unique key used for communication between
105
source personnel and destination personnel encrypted using the key that is known to
source personnel and gateway Kerberos server alone. The key that is known to
source personnel and gateway Kerberos server is encrypted using the key of source
personnel which is known to source personnel only. The key that is to be shared
only among the source personnel and gateway Kerberos server is generated every
time when authentication requests are received from the source personnel.
Timestamp is added at appropriate places to check the life and validity of the request
and reply.
Equation (7.7) denotes the process of requesting the service from
destination personnel by the source personnel through providing necessary
credentials such as ticket for destination personnel issued by gateway Kerberos
server, and authenticator message which contains identity of source personnel and
realm of source personnel encrypted using the key that is known to source personnel
and destination personnel alone. This key is also present in the ticket for destination
personnel who encrypted using the key of destination personnel which is known to
itself and gateway Kerberos server. Equation (7.8) indicates the issuance of subkey
for further communication between source personnel and destination personnel after
verification of the credentials.
7.4 ANALYSIS OF RESPONSE TIMES FOR KERBEROS
AUTHENTICATION
As discussed in the previous section, different levels of hierarchical data
centre systems need to authenticate each other in order to send messages. Also,
cluster heads need to get authenticated at the cloud gateway, so that packets from
sensor nodes can successfully reach the cloud gateway. Cloud gateway is denoted as
Kerberos Distribution Centre (KDC) which is implemented in the cloud gateway in
Figure 7.6 for the sake of clarity in understanding. KDC consists of Authentication
Server (AS) and Ticket Granting Server (TGS). Since in our structure we have
conceptualized the Kerberos distribution centre as a single system which performs
the functions of both AS and TGS in a combined fashion and we call it as Kerberos
Server (KS). Though there are different distributions of Kerberos available, we
106
preferred the Heimdal Kerberos server due to its multithreading support. Heimdal
distribution implements Kerberos v5 authentication services [98]. Kerberos service
implementation in the cloud gateway made use of a symmetric key cryptographic
algorithm known as Advanced Encryption Standard (AES). AES has a block size of
128 bit and it supports 128, 192, 256 bit keys. AES is also resistant to timing based
cryptanalysis. If a new principal in Kerberos database has to be added or if a
principal’s key has to be changed, it is done using a protocol between a client and a
third Kerberos server known as Kerberos Administration Server (KADM). This
protocol is not discussed in this work.
Performance of Kerberos authentication protocol using AES is carried
out in CloudAnalyst [100]. CloudAnalyst is based on CloudSim and is built on the
multithreading capabilities of Java. CloudAnalyst supports creation of systems
within data centers. These systems were created and configured as Virtual Machines
(VMs) within the CloudAnalyst- Cloud Computing Simluator.
Figure 7.6 shows a typical setup of a Kerberos distribution centre for
mutual authentication. Kerberos server (KS) is created as a separate virtual machine
with Ubuntu server. Two virtual machines in two different data centers were created
to use Ubuntu distribution of Client Operating Systems. Since, in our proposed
defense structure, there is no separate application server physically available, we
consider using one VM configured with Ubuntu client OS, as client and another VM
configured with Ubuntu Client OS as application server. Heimdal distribution of
Kerberos v5 contained a component to be installed in the client machines. It is
configured to issue requests periodically, quickly confirm the validity of the
response and timestamp the transaction to report response time statistics. Since KS
and data center systems are present within a private defense cloud, it is logical to
consider it as a single realm of Kerberos authentication protocol. Bandwidth of
internal network used for communication among systems in cloud is set to 10 Gbps.
107
Figure 7.6 Kerberos Distribution Centre for Mutual Authentication
Since it can be equally argued that systems present in the cloud should be
assumed to be present in different realms, CloudAnalyst configurations of VMs for
different systems of Kerberos were executed. The executions were carried out for
local authentication as well as cross realm authentication. Client systems were
configured to issue 10 to 15 requests per minute. Kerberos distribution component
installed in client is also configured to timestamp the transaction that ultimately
authenticates it to the application servers. Based on this timestamp, client can record
the response time statistics for different number of requests.
We utilized CloudAnalyst, a simulator for cloud computing to create
virtual machines within two data centers with Ubuntu distribution of Linux. These
client systems are configured to issue 10 to 15 requests per minute. Kerberos
distribution component in client, timestamps the transaction that ultimately
authenticates it to the application servers. Heimdal Kerberos server distribution is
108
used in the cloud gateway system created in the CloudAnalyst to implement
Kerberos Distribution Center (KDC).
We simulated the modified form of Kerberos to perform Node level
authentication and User level authentication, where only one Kerberos Server is
present instead of Authentication Server (AS) and Ticket Granting Server (TGS).
We have also compared the performance in terms of response time of the
authentication mechanism using normal Kerberos and modified Kerberos protocols.
The graphs (Figure 7.7 and Figure 7.8) provide results for response time
based on single realm node level authentication and cross-realm node level
authentication respectively with respect to normal Kerberos protocol and our
modified Kerberos protocol to suit the proposed defense structure.
The graphs in Figure 7.9 and Figure 7.10 depict the performance of
normal Kerberos protocol with our modified Kerberos protocol in terms of response
times for User level authentication in single realm and cross realm configurations.
Figure 7.7 Response Times for Node Level Authentication with Single Realm
109
Figure 7.8 Response Times for Node Level Authentication with Cross Realm
using one hop server
Figure 7.9 Response Times for User Level Authentication with Single Realm
110
Figure 7.10 Response Times for User Level Authentication with Cross Realm
using one hop server
7.5 CONCLUSION
In this chapter we discuss the importance of secure communications in a
tactical environment like military. It also presents the various technologies and
protocols developed for the purposes of enhancing security of defense users and
systems. The need for rigid authentication is well asserted through the discussions in
the chapter based on string authentication mechanism in the form of Kerberos
authentication protocol. We also modified the Kerberos authentication protocol to
suit our proposed defense structure and the necessary equations were provided.
Response time is a critical parameter in the improvement of Quality of Service
(QoS) as part of military security technology. The performance of the altered
Kerberos protocol was tested using simulations in CloudAnalyst with Heimdal
Distribution of Kerberos with AES library for User level authentication with the
help of response times. For node level authentication, response times were recorded
based on NS-2 simulator’s packet data provided to CloudAnalyst and Heimdal
distribution.
111
CONCLUSION AND FUTURE WORK
It has become imperative that in present day military operations,
timeliness and integrity of information and data transmission are very critical.
Ammunitions and hardware requirements are already available in a highly
sophisticated manner. But what is lacking is, deployment and analysis of modern
methodologies in terms of logistics that involve hybrid algorithms towards security
and reliable transmission of information and data. In this respect, the thesis covers
time synchronization for real time effects, scheduling and transmission of data using
queuing models and authentication requirements with Kerberos. The algorithms
suggested are supported by appropriate simulation.
In this respect, this thesis conceived a proposal to use private cloud
structure for typical military applications where WSNs are deployed and simulation
of clustering process based on LEACH algorithm is carried out .This dissertation
also covers time synchronization for real time effects, among nodes of wireless
sensor networks. Slave controlled time synchronization for high density wireless
sensor networks with large number of clusters is developed as part of this
dissertation and the results show relatively reduced relative clock drift among sensor
nodes compared to the widely used TPSN mechanism. Since it is necessary to have
a consistent snapshot of data present within the nodes, this thesis have discussed
data synchronization as part of the WSNs based on slave controlled time
synchronization scheme. This dissertation have employed M/G/1 queuing model to
service data packets at the cloud gateway which lies at the heart of the structure
proposed. The use of queuing model in the structure is carried out only to
streamline the scheduling and transmission of data to various military entities
present off the battlefield. Since authentication is very vital in the proposed military
cloud structure for communication and transactions among various entities,