全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Performance Analysis of Mobile Security Protocols: Encryption and Authentication

Keywords: Encryption , Authentication , GSM (Global System for Mobile communication) , UMTS (Universal Mobile Telecommunication System) , Time complexity , Performance Analysis , Throughput

Full-Text   Cite this paper   Add to My Lib

Abstract:

Due to extremely high demand of mobile phones among people, over the years there has beena great demand for the support of various applications and security services. 2G and 3Gprovide two levels of security through: encryption and authentication. This paper presentsperformance analysis and comparison between the algorithms in terms of time complexity.The parameters considered for comparison are processing power and input size. Securityfeatures may have adverse effect on quality of services offered to the end users and thesystem capacity. The computational cost overhead that the security protocols and algorithmsimpose on lightweight end users devices is analyzed. The results of analysis reveal the effectof authentication and encryption algorithms of 2G and 3G on system performance defined interms of throughput which will further help in quantifying the overhead caused due tosecurity.

Full-Text

Contact Us

[email protected]

QQ:3279437679

WhatsApp +8615387084133