|
Performance Analysis of Mobile Security Protocols: Encryption and AuthenticationKeywords: Encryption , Authentication , GSM (Global System for Mobile communication) , UMTS (Universal Mobile Telecommunication System) , Time complexity , Performance Analysis , Throughput Abstract: Due to extremely high demand of mobile phones among people, over the years there has beena great demand for the support of various applications and security services. 2G and 3Gprovide two levels of security through: encryption and authentication. This paper presentsperformance analysis and comparison between the algorithms in terms of time complexity.The parameters considered for comparison are processing power and input size. Securityfeatures may have adverse effect on quality of services offered to the end users and thesystem capacity. The computational cost overhead that the security protocols and algorithmsimpose on lightweight end users devices is analyzed. The results of analysis reveal the effectof authentication and encryption algorithms of 2G and 3G on system performance defined interms of throughput which will further help in quantifying the overhead caused due tosecurity.
|