Performance Analysis Of 3G Protocol Encryption And Authentication PDF PPT Download
3G provides two types of security algorithms, KASUMI for encryption and Milenage for authentication. This paper presents performance analysis and comparison between the algorithms in terms of time complexity. Parameters considered are processing power and input size. Security features may have adverse effect on quality of services offered to the end users and the system capacity.
The computational cost overhead that the security protocols and algorithms impose on lightweight and users devices is analyzed. The analysis results revealed the effect of authentication and encryption algorithms of 3G on system performance defined in terms of throughput.
Third generation mobile systems such as UMTS revolutionized telecommunications technology by offering mobile users content rich services, wireless broadband access to Internet, and worldwide roaming. However, the broadcast nature of the wireless communication and increased popularity of wireless devices introduce serious security vulnerabilities. Mobile
users and providers must be assured of the correct identity of the communicating party; user and signaling data must be protected with confidentiality and integrity mechanisms.
Encryption and Authentication are the two main security mechanisms in 3G network access securities.
For details please click on the file attached below !!