EFFICIENCY AND EFFECTIVENESS ANALYSIS OVER ECC-BASED DIRECT AND INDIRECT AUTHENTICATION PROTOCOLS: AN EXTENSIVE COMPARATIVE STUDY

Elliptic curve cryptography finds enormous applications because of its security offering using the remarkable property of elliptic curve. The Elliptic curve cryptography finds enormous applications in almost all the emerging areas. However in mobile networks, the usage of elliptic curve cryptography is limited. Moreover, the operation of mobile networks in an un-trusted environment increases the significance of the usage of security protocols. To provide a secure environment, an improved authentication protocols are required as the menacing effects increasing. Hence, in the previous works, we have proposed two authentication protocols. One of the protocols performs direct authentication and the other one performs indirect authentication. However, the performance of both of them has to be analyzed. Hence in this paper, a comparative analysis is made between the two authentication protocols. The analysis is done empirically as well experimentally. For performance analysis, the efficiency measures such as computational overhead, communication overhead, storage overhead and total computational complexity and the effectiveness measures such as replay attack, guessing attack and Stolen-Verifier attack are considered.

[1]  Rehan Akbani,et al.  Elliptic curve cryptosystem and its applications , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[2]  M. Indra Devi,et al.  Knapsack Based ECC Encryption and Decryption , 2009, Int. J. Netw. Secur..

[3]  Natarajan Vijayarangan A system and design of extensible authentication protocols based on ECC and SKE mechanisms for mobile and wireless communications , 2010 .

[4]  Eman Shaaban,et al.  Lightweight Mutual Authentication Protocol for Low Cost RFID Tags , 2010, ArXiv.

[5]  Lei Yang,et al.  Identification-free batch authentication for RFID tags , 2010, The 18th IEEE International Conference on Network Protocols.

[6]  Manju Sanghi,et al.  Speeding up Computation of Scalar Multiplication in , 2010 .

[7]  Zoltán Ádám Mann,et al.  IMPLEMENTING ELLIPTIC CURVE CRYPTOGRAPHY ON PC AND SMART CARD , 2003 .

[8]  Wenbo Mao,et al.  An Identity-based Non-interactive Authentication Framework for Computational Grids , 2004 .

[9]  K. Thilagavathi,et al.  An Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Mobile Networks , 2009 .

[10]  Wayne Luk,et al.  Reconfigurable elliptic curve cryptosystems on a chip , 2005, Design, Automation and Test in Europe.

[11]  Berk Sunar,et al.  Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic , 2004, CHES.

[12]  Miguel Morales-Sandoval,et al.  On the hardware design of an elliptic curve cryptosystem , 2004, Proceedings of the Fifth Mexican International Conference in Computer Science, 2004. ENC 2004..

[13]  Peter Langendörfer,et al.  Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors , 2010, Int. J. Distributed Sens. Networks.

[14]  Kefa Rabah,et al.  Elliptic Curve Cryptography over Binary Finite Field GF(2m) , 2006 .

[15]  V. Sumathy,et al.  A Novel Approach Towards Cost Effective Region-Based Group Key Agreement Protocol for Peer - to - Peer Information Sharing in Mobile Ad Hoc Networks , 2010, ArXiv.

[16]  Wayne Luk,et al.  Customizable elliptic curve cryptosystems , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[17]  Wendy Chou,et al.  Elliptic Curve Cryptography and Its Applications to Mobile Devices , 2022 .

[18]  Paz Morillo,et al.  An efficient semantically secure elliptic curve cryptosystem based on KMOV , 2002, IACR Cryptol. ePrint Arch..

[19]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[20]  K. Thilagavathi,et al.  A NOVEL PROTOCOL FOR INDIRECT AUTHENTICATION IN MOBILE NETWORKS BASED ON ELLIPTIC CURVE CRYPTOGRAPHY , 2009 .

[21]  Adnan Abdul-Aziz Gutub,et al.  Remodeling of Elliptic Curve Cryptography Scalar Multiplication Architecture using Parallel Jacobian Coordinate System , 2010 .

[22]  Kefa Rabah Implementation of Elliptic Curve Diffie-Hellman and EC Encryption Schemes , 2005 .

[23]  Juan E. Tapiador,et al.  EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, OTM Workshops.

[24]  Kwangjo Kim,et al.  Untraceable Mobile Node Authentication in WSN , 2010, Sensors.

[25]  Tarek A. El-Ghazawi,et al.  Implementation of Elliptic Curve Cryptosystems on a reconfigurable computer , 2003, Proceedings. 2003 IEEE International Conference on Field-Programmable Technology (FPT) (IEEE Cat. No.03EX798).

[26]  Liu Zhi-meng An elliptic curve cryptography based on authentication and key agreement protocol for wireless communication , 2008 .

[27]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[28]  S. Prasanna Ganesan An Efficient Protocol for Resource Constrained Platforms Using ECC , 2009 .

[29]  K. Thanushkodi,et al.  Performance analysis of mobile IP registration protocols , 2009 .

[30]  Vivek Kapoor,et al.  Elliptic curve cryptography , 2008, UBIQ.

[31]  Salwa H. El-Ramly,et al.  New real time multicast authentication protocol , 2008, 2008 International Conference on Computer Engineering & Systems.

[32]  Joos Vandewalle,et al.  Hardware architectures for public key cryptography , 2003, Integr..

[33]  Vipul Gupta,et al.  An End-to-End Systems Approach to Elliptic Curve Cryptography , 2002, CHES.