Quantitative analysis of security protocols in wireless networks

Loading...
Thumbnail Image
Issue Date
2003-06-18
Authors
Best, Patricia K.
Namuduri, Kameswara
Pendse, Ravi
Advisor
Citation

Best, P.; Kamesh Namuduri; Pendse, R.; , "Quantitative analysis of security protocols in wireless networks," Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society , vol., no., pp. 290- 291, 18-20 June 2003 doi: 10.1109/SMCSIA.2003.1232436

Abstract

Security has been a major concern for computer networks, and required levels of security continue to increase and become more complicated to provide. Wireless devices face new challenges in securely exchanging information due to their limitations such as power and bandwidth. Powerful algorithms have also been developed to provide authentication, confidentially, and integrity to information exchanged over computer networks. We evaluate security protocols, designed to overcome these limitations and quantitatively determine the performance differences between them. All the protocols were developed based on the assumption that a certificate authority (CA) exists and maintains the certificates of each device.

Table of Content
Description
The full text of this article is not available on SOAR. WSU users can access the article via IEEE Xplore database licensed by University Libraries: http://libcat.wichita.edu/vwebv/holdingsInfo?bibId=1045954
publication.page.dc.relation.uri
DOI