Quantitative analysis of security protocols in wireless networks
Best, P.; Kamesh Namuduri; Pendse, R.; , "Quantitative analysis of security protocols in wireless networks," Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society , vol., no., pp. 290- 291, 18-20 June 2003 doi: 10.1109/SMCSIA.2003.1232436
Security has been a major concern for computer networks, and required levels of security continue to increase and become more complicated to provide. Wireless devices face new challenges in securely exchanging information due to their limitations such as power and bandwidth. Powerful algorithms have also been developed to provide authentication, confidentially, and integrity to information exchanged over computer networks. We evaluate security protocols, designed to overcome these limitations and quantitatively determine the performance differences between them. All the protocols were developed based on the assumption that a certificate authority (CA) exists and maintains the certificates of each device.