Security Enhancement Algorithms for Data Transmission in 4G Networks
Prerana Choudhari, Vikas Kaul and S K Narayankhedkar. Article: Security Enhancement Algorithms for Data Transmission in 4G Networks. IJAIS Proceedings on International Conference and workshop on Advanced Computing 2014 ICWAC 2014(2):25-30, June 2014. BibTeX
@article{key:article, author = "Prerana Choudhari and Vikas Kaul and S K Narayankhedkar", title = "Article: Security Enhancement Algorithms for Data Transmission in 4G Networks", journal = "IJAIS Proceedings on International Conference and workshop on Advanced Computing 2014", year = 2014, volume = "ICWAC 2014", number = 2, pages = "25-30", month = "June", note = "Published by Foundation of Computer Science, New York, USA" }
Abstract
This paper, presents the design and evaluation of security enhancement for data transmission in 4G networks. An advanced encryption method with AES algorithm is used here. Enhancement is done in AES by modifying the S-box. The static S-box is made dynamic using cipher key. To increase the complexity of the system, AES is used in Round structure. The performance evaluation based on Runtime, Throughput is done and comparison is made between AES and the enhanced system.
Reference
- Qing Xiuhua, Cheng Chuanhui, Wang Li, "A Study of Some Key Technologies of 4G System*", Industrial Electronics and Applications, 2008. ICIEA 2008. 3rd IEEE Conference.
- Xinxin Fan, Gaung Gong, "Specification of the stream cipher WG-16 based confidentiality and integrity algorithm", http://cacr. uwaterloo. ca/techreports/2014/cacr2014-06. pdf
- Sasan Adibi, Amin Mobasher, Mostafa Tofighbakhsh, Fourth-Generation Wireless Networks: Applications and Innovations, IGI Global, December 31, 2009
- The Verizon Wireless 4G LTE Network: Transforming Business with Next-Generation Technology, Verizon Wireless, http://business. verizonwireless. com/content /dam/b2b/resources/LTE_FutureMobileTech_WP. pdf
- Yu Zheng, Dake He, Xiaohu Tang and Hongxia Wang, "AKA and Authorization Scheme For 4G Mobile Networks Based on Trusted Mobile Platform", ICICS 2005
- Anirudh Ramaswamy Ganesh, Naveen Manikandan P, Sethu S Pl, Sundararajan R, Pargunarajan K. ," An Improved AES-ECC Hybrid Encryption Scheme for Secure Communication in Cooperative Diversity based Wireless Sensor networks", IEEE conference on Recent Trends in Information Technology (ICRTIT), 2011
- Anastasios N. Bikos, Nicolas Sklavos, "LTE/SAE Security Issues on 4G Wireless Networks", IEEE Security & Privacy, 2014
- Ghada Zaibi, Abdennaceur Kachouri, Fabrice Peyrard, Daniele Foumier-Prunaret, "On Dynamic chaotic S-BOX", IEEE 2009
- Mobile 4G: The Revolution Is Here Now. , http://m2m. sprint. com/media/78386/4g_the_revolution_is_now. pdf
- Mahdi Aiash, Glenford Mapp and Aboubaker Lasebae, Raphael Phan, "Providing Security in 4G Systems: Unveiling the Challenges", IEEE 2010
- N. Seddigh, B. Nandy, R. Makkar, J. F. Beaumont, "Security Advances and Challenges in 4G Wireless Networks", IEEE 2010
- Yu Zheng, Dake He, Weichi Yu and Xiaohu Tang,"Trusted Computing-Based Security Architecture For 4G Mobile Networks", IEEE 2005
- Saif Al-alak, Zuriati Ahmed, Azizol Abdullah and Shamala Subramiam "AES and ECC Mixed for ZigBee Wireless Sensor Security", World Academy of Science, Engineering and Technology 2011
- Razi Hosseinkhani, H. Haj Seyyed Javadi, "Using Cipher Key to Generate Dynamic S-Box in AES Cipher System", International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (1) : 2012
- Krishnamurthy G N, V Ramaswamy," Making AES Stronger: AES with Key Dependent S-Box", IJCSNS International Journal of Computer Science and Network Security, VOL. 8 No. 9, September 2008
- Kazys KAZLAUSKAS, Jaunius KAZLAUSKAS, "Key-Dependent S-Box Generation in AES Block Cipher System", INFORMATICA, 2009, Vol. 20, No. 1, 23–34, 2009
- Shirbhate D. D. , Kale A. R. , "Providing Security Challenges In 4g Systems", Bioinfo Security Informatics Volume 2, Issue 1, 2012
- M. B. Vishnu, S. K. Tiong, M. Zaini, S. P. Koh, "Security Enhancement of Digital Motion Image Transmission Using Hybrid AES-DES Algorithm", APCC 2008
- M. Kaleem Iqbal, M. Bilal Iqbal, Iftikhar Rasheed, Abdullah Sandhu, "4G Evolution and Multiplexing Techniques with solution to implementation challenges", International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, 2012
- Shabaan Sahmoud, Wisam Elmasry and Shadi Abdulfa, "Enhancement the security of AES against modern attacks by using variable key block cipher", International Arab Journel of e-technology, Vol 3,No. 1, January 2014
- Julia Juremi, Ramlan Mahmod, Salasiah Sulaiman, "A Proposal for Improving AES S-box with Rotation and Key-dependent", Cyber Warfare and Digital Forensic (CyberSec) international conference, 2012
- What are 1G, 2G, 3G and 4G networks ?
- http://www. speedguide. net/faq_in_q. php?qid=365
- Manuel Mogollon, Cryptography and Security Services: Mechanisms and applications, IGI Global, January 31, 2008
Keywords
3G; 4G; AES; S-box; Round structure