• May 27, 2016 News!The submission for Special Issue is officially open now!   [Click]
  • May 03, 2016 News!Vol.6, No.6 has been indexed by EI (Inspec).   [Click]
  • Mar 17, 2017 News!Vol.9, No.2 has been published with online version. 13 peer reviewed articles from 4 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2013 Vol.5(5): 754-758 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2013.V5.790

Energy-Efficient Mutual Authentication Protocol for Handhled Devices Based on Public Key Cryptography

Wilayat Khan, Habib Ullah, and Riaz Hussain
Abstract—Mobility is one of the major features of wireless communication systems and handheld devices form a major part of these systems. The recent growth in the functionality and features of the handheld devices has increased their use and importance in different applications around the world. Unfortunately, the security threats and their intensities are also increasing with the passage of time. The limited resources like battery, memory, and computational power of these devices is a bottle neck in the security of such devices. Meanwhile, the focus of recent research is to propose better security solutions with limited resource usage. Authentication of handheld devices and servers with each other is one such security issue has not yet been solved satisfactorily. Many authentication protocols based on symmetric or asymmetric cryptography has been proposed. The former one is more feasible in terms of energy and speed but not as secure and reliable as the last one. The last one is more reliable but on the other hand it consumes more energy. In this paper, we propose enhancements to the existing asymmetric authentication protocol based on FIPS 196 standards. With these enhancements, the energy consumption in handheld devices is reduced during authentication process while the reliability and security level, inherent in the asymmetric cryptographic algorithms, remains the same.

Index Terms—Authentication, handheld devices, FIPS 196, security, public-key cryptography, asymmetric protocols.

Wilayat Khan was with the Department of Electrical Engineering, Comsats, Pakistan. He is now with Department of Computer Science, Ca Foscari University of Venice, Italy (e-mail: khan@ dsi.unive.it).
Habib Ullah was with the Department of Electrical Engineering, Comsats, Pakistan. He is now with Department of Computer Science, University of Trento, Italy (e-mail: habib@ciit-wah.edu.pk).
Riaz Hussain is with the Department of Electrical Engineering, Comsats, Pakistan. (e-mail: riaz.junejo@gmail.com).

[PDF]

Cite:Wilayat Khan, Habib Ullah, and Riaz Hussain, "Energy-Efficient Mutual Authentication Protocol for Handhled Devices Based on Public Key Cryptography," International Journal of Computer Theory and Engineering vol. 5, no. 5, pp. 754-758, 2013.

Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com