Quantitative analysis of security protocols in wireless networks

Thumbnail Image
Issue Date
Best, Patricia K.
Namuduri, Kameswara
Pendse, Ravi

Best, P.; Kamesh Namuduri; Pendse, R.; , "Quantitative analysis of security protocols in wireless networks," Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society , vol., no., pp. 290- 291, 18-20 June 2003 doi: 10.1109/SMCSIA.2003.1232436


Security has been a major concern for computer networks, and required levels of security continue to increase and become more complicated to provide. Wireless devices face new challenges in securely exchanging information due to their limitations such as power and bandwidth. Powerful algorithms have also been developed to provide authentication, confidentially, and integrity to information exchanged over computer networks. We evaluate security protocols, designed to overcome these limitations and quantitatively determine the performance differences between them. All the protocols were developed based on the assumption that a certificate authority (CA) exists and maintains the certificates of each device.

Table of Content
The full text of this article is not available on SOAR. WSU users can access the article via IEEE Xplore database licensed by University Libraries: http://libcat.wichita.edu/vwebv/holdingsInfo?bibId=1045954