Gender: : Female
City : ChandigarhSend Friend Request
3G provides two types of security algorithms, KASUMI for encryption and Milenage for authentication. This paper presents performance analysis and comparison between the algorithms in terms of time complexity. Parameters considered are processing power and input size. Security features may have adverse effect on quality of services offered to the end users and the system capacity.
The computational cost overhead that the security protocols and algorithms impose on lightweight and users devices is analyzed. The analysis results revealed the effect of authentication and encryption algorithms of 3G on system performance defined in terms of throughput.
Third generation mobile systems such as UMTS revolutionized telecommunications technology by offering mobile users content rich services, wireless broadband access to Internet, and worldwide roaming. However, the broadcast nature of the wireless communication and increased popularity of wireless devices introduce serious security vulnerabilities. Mobile
users and providers must be assured of the correct identity of the communicating party; user and signaling data must be protected with confidentiality and integrity mechanisms.
Encryption and Authentication are the two main security mechanisms in 3G network access securities.
For details please click on the file attached below !!
- Performance analysis in Mock Gate
- Project report on performance analysis of biodiesel engine ebook download doc
- Automation of network protocol analysis seminar report/pdf/ppt download
- Performance analysis of straight tooth labyrinth seals pdf download
- Notes for Digital Signature and Authentication Protocol