Please use this identifier to cite or link to this item: https://elibrary.tucl.edu.np/handle/123456789/14820
Title: Evaluation of Direct and Indirect Authentication Mechanisms in Mobile Networks
Authors: Bhatt, Deependra Prasad
Keywords: Authentication Mechanisms;Mobile Networks
Issue Date: 2013
Publisher: Department of Computer Science and I.T.
Institute Name: Central Department of Computer Science and Information Technology
Level: Masters
Abstract: The rapid progress in wireless mobile communication technology and personal communication systems has prompted new security questions.Typically,mobile networks are deployed in un-trusted environments. In mobile network there is unrestricted mobility and information access between unacquainted nodes and server occurs frequently from anywhere, anytime. In such conditions keeping the security and privacy of information from accessing illegally by any invalid user node is a big concern. The sharing of data and information between various parties from different locations through insecure channel is quite general. The vast majority of internet users are concerned about the safety of their secret information and personal details from being accessed by unauthorized entities. So, before sharing the secure and sensitive data, information and providing access to various resources, the identification of the intended or claimed entities is one of the major essential factors for any secure communication system. Crypto system is an important technique to identify the authenticity in order to protect the confidential and sensitive data in case of mobile networks. There are some direct and indirect authentication schemes that are based on different cryptographic systems such as RSA, ECC etc and some are based on the modified versions of Kerberos assisted authentication scheme.The selection of an efficient authentication scheme plays an important role in case of mobile networks where devices are resource constrained in nature. In this context, this study focuses on the implementation and analysis of computational cost of ECC based direct authentication, ECC based indirect authentication, RSA based direct authentication, RSA based indirect authentication, Kaman authentication mechanism and Chang Cheng's authentication mechanism so as to select the best authentication system for resource constrained devices in mobile network.
URI: https://elibrary.tucl.edu.np/handle/123456789/14820
Appears in Collections:Computer Science & Information Technology

Files in This Item:
File Description SizeFormat 
Cover.pdf44.83 kBAdobe PDFView/Open
Chapter.pdf490.68 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.