EFFICIENCY AND EFFECTIVENESS ANALYSIS OVER ECC-BASED DIRECT AND INDIRECT AUTHENTICATION PROTOCOLS: AN EXTENSIVE COMPARATIVE STUDY

Abstract
Elliptic curve cryptography finds enormous applications because of its security offering using the remarkable property of elliptic curve. The Elliptic curve cryptography finds enormous applications in almost all the emerging areas. However in mobile networks, the usage of elliptic curve cryptography is limited. Moreover, the operation of mobile networks in an un-trusted environment increases the significance of the usage of security protocols. To provide a secure environment, an improved authentication protocols are required as the menacing effects increasing. Hence, in the previous works, we have proposed two authentication protocols. One of the protocols performs direct authentication and the other one performs indirect authentication. However, the performance of both of them has to be analyzed. Hence in this paper, a comparative analysis is made between the two authentication protocols. The analysis is done empirically as well experimentally. For performance analysis, the efficiency measures such as computational overhead, communication overhead, storage overhead and total computational complexity and the effectiveness measures such as replay attack, guessing attack and Stolen-Verifier attack are considered.

Authors
K. Thilagavathi1 and P.G.Rajeswari2
1Kongunadu Arts and Science College, India,2Easa College of Engineering and Technology, India

Keywords
Elliptic Curve Cryptography (ECC), Direct Authentication Protocol, Indirect Authentication Protocol, Efficiency, Effectiveness
Published By :
ICTACT
Published In :
ICTACT Journal on Communication Technology
( Volume: 3 , Issue: 1 )
Date of Publication :
March 2012

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.