vioft2nntf2t|tblJournal|Abstract_paper|0xf4ffc28f0a000000108a010001000100 Elliptic curve cryptography finds enormous applications because of its security offering using the remarkable property of elliptic curve. The Elliptic curve cryptography finds enormous applications in almost all the emerging areas. However in mobile networks, the usage of elliptic curve cryptography is limited. Moreover, the operation of mobile networks in an un-trusted environment increases the significance of the usage of security protocols. To provide a secure environment, an improved authentication protocols are required as the menacing effects increasing. Hence, in the previous works, we have proposed two authentication protocols. One of the protocols performs direct authentication and the other one performs indirect authentication. However, the performance of both of them has to be analyzed. Hence in this paper, a comparative analysis is made between the two authentication protocols. The analysis is done empirically as well experimentally. For performance analysis, the efficiency measures such as computational overhead, communication overhead, storage overhead and total computational complexity and the effectiveness measures such as replay attack, guessing attack and Stolen-Verifier attack are considered.
K. Thilagavathi1 and P.G.Rajeswari2
1Kongunadu Arts and Science College, India,2Easa College of Engineering and Technology, India
Elliptic Curve Cryptography (ECC), Direct Authentication Protocol,
Indirect Authentication Protocol, Efficiency, Effectiveness
January | February | March | April | May | June | July | August | September | October | November | December |
0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| Published By : ICTACT
Published In :
ICTACT Journal on Communication Technology ( Volume: 3 , Issue: 1 , Pages: 515-524 )
Date of Publication :
March 2012
Page Views :
210
Full Text Views :
2
|