Please use this identifier to cite or link to this item: https://elibrary.tucl.edu.np/handle/123456789/14820
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBhatt, Deependra Prasad-
dc.date.accessioned2023-02-03T06:53:47Z-
dc.date.available2023-02-03T06:53:47Z-
dc.date.issued2013-
dc.identifier.urihttps://elibrary.tucl.edu.np/handle/123456789/14820-
dc.description.abstractThe rapid progress in wireless mobile communication technology and personal communication systems has prompted new security questions.Typically,mobile networks are deployed in un-trusted environments. In mobile network there is unrestricted mobility and information access between unacquainted nodes and server occurs frequently from anywhere, anytime. In such conditions keeping the security and privacy of information from accessing illegally by any invalid user node is a big concern. The sharing of data and information between various parties from different locations through insecure channel is quite general. The vast majority of internet users are concerned about the safety of their secret information and personal details from being accessed by unauthorized entities. So, before sharing the secure and sensitive data, information and providing access to various resources, the identification of the intended or claimed entities is one of the major essential factors for any secure communication system. Crypto system is an important technique to identify the authenticity in order to protect the confidential and sensitive data in case of mobile networks. There are some direct and indirect authentication schemes that are based on different cryptographic systems such as RSA, ECC etc and some are based on the modified versions of Kerberos assisted authentication scheme.The selection of an efficient authentication scheme plays an important role in case of mobile networks where devices are resource constrained in nature. In this context, this study focuses on the implementation and analysis of computational cost of ECC based direct authentication, ECC based indirect authentication, RSA based direct authentication, RSA based indirect authentication, Kaman authentication mechanism and Chang Cheng's authentication mechanism so as to select the best authentication system for resource constrained devices in mobile network.en_US
dc.language.isoen_USen_US
dc.publisherDepartment of Computer Science and I.T.en_US
dc.subjectAuthentication Mechanismsen_US
dc.subjectMobile Networksen_US
dc.titleEvaluation of Direct and Indirect Authentication Mechanisms in Mobile Networksen_US
dc.typeThesisen_US
local.institute.titleCentral Department of Computer Science and Information Technologyen_US
local.academic.levelMastersen_US
Appears in Collections:Computer Science & Information Technology

Files in This Item:
File Description SizeFormat 
Cover.pdf44.83 kBAdobe PDFView/Open
Chapter.pdf490.68 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.