Quantitative analysis of security protocols in wireless networks

Loading...
Thumbnail Image
Authors
Best, Patricia K.
Namuduri, Kameswara
Pendse, Ravi
Advisors
Issue Date
2003-06-18
Type
Conference paper
Keywords
Computer security , Cryptography , Data security , Data integrity , Digital signatures , Intelligent networks , Message authentication , Public key , Wireless application protocol
Research Projects
Organizational Units
Journal Issue
Citation
Best, P.; Kamesh Namuduri; Pendse, R.; , "Quantitative analysis of security protocols in wireless networks," Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society , vol., no., pp. 290- 291, 18-20 June 2003 doi: 10.1109/SMCSIA.2003.1232436
Abstract

Security has been a major concern for computer networks, and required levels of security continue to increase and become more complicated to provide. Wireless devices face new challenges in securely exchanging information due to their limitations such as power and bandwidth. Powerful algorithms have also been developed to provide authentication, confidentially, and integrity to information exchanged over computer networks. We evaluate security protocols, designed to overcome these limitations and quantitatively determine the performance differences between them. All the protocols were developed based on the assumption that a certificate authority (CA) exists and maintains the certificates of each device.

Table of Contents
Description
The full text of this article is not available on SOAR. WSU users can access the article via IEEE Xplore database licensed by University Libraries: http://libcat.wichita.edu/vwebv/holdingsInfo?bibId=1045954
Publisher
IEEE
Journal
Book Title
Series
Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society;vol., no., pp. 290- 291
PubMed ID
DOI
ISSN
EISSN