Abstract

AbstractCryptographic primitives need to be carefully evaluated when being applied in components ensuring enhanced protection aims. This work analyses the performance of RSA‐ and ECDSA‐based digital signature schemes in the context of multi‐hop ad hoc networks. Our work shows that contrary to a single wireless hop scenario with restricted clients in the wireless network and a powerful server in the fixed network, the choice of an appropriate signature candidate is not as obvious as for the aforementioned architecture. Our performance analysis considers three partially interdependent axes (a) the required security level, (b) the device restriction and (c) the protocol specification with the required security relationships, and the assumed traffic flow. We take (c) into account by analysing two charging protocols for wireless multi‐hop scenarios. By generalising our observations, we carefully derive some recommendations to strengthen the security engineering process for dependable distributed systems over the wireless network. Copyright © 2005 AEIT.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.