E3C: A Tool for Evaluating Communication and Computation Costs in Authentication and Key Exchange Protocol

12/06/2022
by   Yashar Salami, et al.
0

Today, with the development of blockchain and Internet of Things technologies, we need authentication protocols and key exchanges to communicate with these different technologies. Symmetric and asymmetric encryption methods are used to design authentication and key exchange protocols, each of which has different computation costs. In the Internet of Things systems, due to the limited memory and computation power, researchers are looking the lightweight design protocols so that the pressure caused by the computation of protocols can be minimized. Calculating protocols' computational and communication costs was done manually until now, which was associated with human error. In this paper, we proposed an E3C tool that can calculate the computation and communication costs of the authentication and key exchange protocols. E3C provides the ability to compare several protocols in terms of communication and processing costs and present them in separate charts. Comparing the processing and communication costs of classical and modern protocols manually and with the E3C indicate that the E3C can calculate the processing and communication costs of authentication and key exchange protocols with 99.99

READ FULL TEXT

page 12

page 14

research
07/12/2019

A Federated Lightweight Authentication Protocol for the Internet of Things

Considering the world's IoT development and market, it is necessary to g...
research
12/18/2022

Efficient RDMA Communication Protocols

Developers of networked systems often work with low-level RDMA libraries...
research
01/18/2022

A Multi-factor Multi-level and Interaction based (M2I) Authentication Framework for Internet of Things (IoT) Applications

Existing authentication solutions proposed for Internet of Things (IoT) ...
research
08/19/2020

A Computationally Intelligent Hierarchical Authentication and Key Establishment Framework for Internet of Things

Our high expectations from Internet of Things (IoT) and how it will posi...
research
01/16/2020

Performance Evaluation of Multiparty Authentication in 5G IIoT Environments

With the rapid development of various emerging technologies such as the ...
research
05/17/2023

Entanglement-based Mutual Quantum Distance Bounding

Mutual distance bounding (DB) protocols enable two distrusting parties t...
research
07/25/2018

Directory Reconciliation

We initiate the theoretical study of directory reconciliation, a general...

Please sign up or login with your details

Forgot password? Click here to reset