International Journal of Computer Science and Network
As per the recent studies, the volatile growth has been seen in the use of mobile devices as the supporting technology for accessing internet based services, as well as for personal communication needs in networking. Various studies indicate that it is impossible to utilize strong cryptographic functions for implementing security protocols on mobile devices. The authors' research negates this. Explicitly, a performance analysis focused on the most commonly used cryptographic protocols based on the location address (latitude & longitude) of the user for mobile applications and anticipated provably secure authentication protocol that is more efficient than any of the existing authentication protocol is being discussed in this paper.