Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

May Edition 2020

International Journal of Applied Information Systems solicits high quality original research papers for the May 2020 Edition of the journal. The last date of research paper submission is April 15, 2020.

Security Enhancement Algorithms for Data Transmission in 4G Networks

Prerana Choudhari, Vikas Kaul, S K Narayankhedkar Published in Networks

IJAIS Proceedings on International Conference and workshop on Advanced Computing 2014
Year of Publication: 2014
© 2014 by IJAIS Journal
Download full text
  1. Prerana Choudhari, Vikas Kaul and S K Narayankhedkar. Article: Security Enhancement Algorithms for Data Transmission in 4G Networks. IJAIS Proceedings on International Conference and workshop on Advanced Computing 2014 ICWAC 2014(2):25-30, June 2014. BibTeX

    @article{key:article,
    	author = "Prerana Choudhari and Vikas Kaul and S K Narayankhedkar",
    	title = "Article: Security Enhancement Algorithms for Data Transmission in 4G Networks",
    	journal = "IJAIS Proceedings on International Conference and workshop on Advanced Computing 2014",
    	year = 2014,
    	volume = "ICWAC 2014",
    	number = 2,
    	pages = "25-30",
    	month = "June",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

This paper, presents the design and evaluation of security enhancement for data transmission in 4G networks. An advanced encryption method with AES algorithm is used here. Enhancement is done in AES by modifying the S-box. The static S-box is made dynamic using cipher key. To increase the complexity of the system, AES is used in Round structure. The performance evaluation based on Runtime, Throughput is done and comparison is made between AES and the enhanced system.

Reference

  1. Qing Xiuhua, Cheng Chuanhui, Wang Li, "A Study of Some Key Technologies of 4G System*", Industrial Electronics and Applications, 2008. ICIEA 2008. 3rd IEEE Conference.
  2. Xinxin Fan, Gaung Gong, "Specification of the stream cipher WG-16 based confidentiality and integrity algorithm", http://cacr. uwaterloo. ca/techreports/2014/cacr2014-06. pdf
  3. Sasan Adibi, Amin Mobasher, Mostafa Tofighbakhsh, Fourth-Generation Wireless Networks: Applications and Innovations, IGI Global, December 31, 2009
  4. The Verizon Wireless 4G LTE Network: Transforming Business with Next-Generation Technology, Verizon Wireless, http://business. verizonwireless. com/content /dam/b2b/resources/LTE_FutureMobileTech_WP. pdf
  5. Yu Zheng, Dake He, Xiaohu Tang and Hongxia Wang, "AKA and Authorization Scheme For 4G Mobile Networks Based on Trusted Mobile Platform", ICICS 2005
  6. Anirudh Ramaswamy Ganesh, Naveen Manikandan P, Sethu S Pl, Sundararajan R, Pargunarajan K. ," An Improved AES-ECC Hybrid Encryption Scheme for Secure Communication in Cooperative Diversity based Wireless Sensor networks", IEEE conference on Recent Trends in Information Technology (ICRTIT), 2011
  7. Anastasios N. Bikos, Nicolas Sklavos, "LTE/SAE Security Issues on 4G Wireless Networks", IEEE Security & Privacy, 2014
  8. Ghada Zaibi, Abdennaceur Kachouri, Fabrice Peyrard, Daniele Foumier-Prunaret, "On Dynamic chaotic S-BOX", IEEE 2009
  9. Mobile 4G: The Revolution Is Here Now. , http://m2m. sprint. com/media/78386/4g_the_revolution_is_now. pdf
  10. Mahdi Aiash, Glenford Mapp and Aboubaker Lasebae, Raphael Phan, "Providing Security in 4G Systems: Unveiling the Challenges", IEEE 2010
  11. N. Seddigh, B. Nandy, R. Makkar, J. F. Beaumont, "Security Advances and Challenges in 4G Wireless Networks", IEEE 2010
  12. Yu Zheng, Dake He, Weichi Yu and Xiaohu Tang,"Trusted Computing-Based Security Architecture For 4G Mobile Networks", IEEE 2005
  13. Saif Al-alak, Zuriati Ahmed, Azizol Abdullah and Shamala Subramiam "AES and ECC Mixed for ZigBee Wireless Sensor Security", World Academy of Science, Engineering and Technology 2011
  14. Razi Hosseinkhani, H. Haj Seyyed Javadi, "Using Cipher Key to Generate Dynamic S-Box in AES Cipher System", International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (1) : 2012
  15. Krishnamurthy G N, V Ramaswamy," Making AES Stronger: AES with Key Dependent S-Box", IJCSNS International Journal of Computer Science and Network Security, VOL. 8 No. 9, September 2008
  16. Kazys KAZLAUSKAS, Jaunius KAZLAUSKAS, "Key-Dependent S-Box Generation in AES Block Cipher System", INFORMATICA, 2009, Vol. 20, No. 1, 23–34, 2009
  17. Shirbhate D. D. , Kale A. R. , "Providing Security Challenges In 4g Systems", Bioinfo Security Informatics Volume 2, Issue 1, 2012
  18. M. B. Vishnu, S. K. Tiong, M. Zaini, S. P. Koh, "Security Enhancement of Digital Motion Image Transmission Using Hybrid AES-DES Algorithm", APCC 2008
  19. M. Kaleem Iqbal, M. Bilal Iqbal, Iftikhar Rasheed, Abdullah Sandhu, "4G Evolution and Multiplexing Techniques with solution to implementation challenges", International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, 2012
  20. Shabaan Sahmoud, Wisam Elmasry and Shadi Abdulfa, "Enhancement the security of AES against modern attacks by using variable key block cipher", International Arab Journel of e-technology, Vol 3,No. 1, January 2014
  21. Julia Juremi, Ramlan Mahmod, Salasiah Sulaiman, "A Proposal for Improving AES S-box with Rotation and Key-dependent", Cyber Warfare and Digital Forensic (CyberSec) international conference, 2012
  22. What are 1G, 2G, 3G and 4G networks ?
  23. http://www. speedguide. net/faq_in_q. php?qid=365
  24. Manuel Mogollon, Cryptography and Security Services: Mechanisms and applications, IGI Global, January 31, 2008

Keywords

3G; 4G; AES; S-box; Round structure