CFP last date
16 December 2024
Reseach Article

Development of Security Enhancement Techniques for 3G/4G Networks

Published on September 2015 by Punjabi Jasbir Kaur, Vikas Kaul, Vinayak A Bharadi, S K Narayankhedkar
International Conference and Workshop on Communication, Computing and Virtualization
Foundation of Computer Science USA
ICWCCV2015 - Number 2
September 2015
Authors: Punjabi Jasbir Kaur, Vikas Kaul, Vinayak A Bharadi, S K Narayankhedkar
051a8c6a-008a-4529-839b-81020e8caebd

Punjabi Jasbir Kaur, Vikas Kaul, Vinayak A Bharadi, S K Narayankhedkar . Development of Security Enhancement Techniques for 3G/4G Networks. International Conference and Workshop on Communication, Computing and Virtualization. ICWCCV2015, 2 (September 2015), 0-0.

@article{
author = { Punjabi Jasbir Kaur, Vikas Kaul, Vinayak A Bharadi, S K Narayankhedkar },
title = { Development of Security Enhancement Techniques for 3G/4G Networks },
journal = { International Conference and Workshop on Communication, Computing and Virtualization },
issue_date = { September 2015 },
volume = { ICWCCV2015 },
number = { 2 },
month = { September },
year = { 2015 },
issn = 2249-0868,
pages = { 0-0 },
numpages = 1,
url = { /proceedings/icwccv2015/number2/799-1569/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference and Workshop on Communication, Computing and Virtualization
%A Punjabi Jasbir Kaur
%A Vikas Kaul
%A Vinayak A Bharadi
%A S K Narayankhedkar
%T Development of Security Enhancement Techniques for 3G/4G Networks
%J International Conference and Workshop on Communication, Computing and Virtualization
%@ 2249-0868
%V ICWCCV2015
%N 2
%P 0-0
%D 2015
%I International Journal of Applied Information Systems
Abstract

4G, the next-generation mobile telecommunication system, is the requirement for security enhancement and reliable communication. This paper presents the design of security enhancement techniques for data transmission in LTE networks using TLS. Here AES is used for encryption. AES is enhanced by using Chaos and Dynamic S-box. By the use of chaos the shift rows is made dynamic and the key space is made infinite. S-box is made dynamic and key-dependent using cipher key. Complexity of the system is increased by using AES in round structure. Comparison of the traditional and enhanced AES will be made on the basis of Performance evaluation using Encryption Time, Decryption Time, Overall Time, and Throughput.

References
  1. Shannon C E, Communication Theory of Secrecy Systems, bell Systems Technical Journal,1949:28:656-715.
  2. M. B. Vishnu, S. K. Tiong. "Security Enhancement of Digital Motion Image Transmission Using Hybrid AES-DES Algorithm," APCC 2008 OF IEICE, 2008.
  3. Xiang Li, Junli Chen, Dinghu Qin, Wanggen Wan. "Research and Realization based on hybrid encryption algorithm of improved AES and ECC," IEEE journal 2010.
  4. Dr. E. Ramaraj, S. Karthikeyan and M. Hemalatha. "A Design of Security Protocol using Hybrid Encryption Technique (AES- Rijndael and RSA)," International Journal of The Computer, the Internet and Management Vol. 17. No. 1, April 2009.
  5. GhadaZaibi, AbdennaceurKachouri, FabricePeyrard, Daniele Foumier-Prunaret, "On Dynamic chaotic S-BOX," IEEE 2009
  6. L Kocarev. "Chaos-based Cryptography:aBrief overview," IEEE Circuits and Systems Magazines,2001:1(3):6~22
  7. Gonzalo Alvarez1 and Shujun Li2, "Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems," International Journal of Bifurcation and Chaos, vol. 16, no. 8, pp. 2129-2151, 2006
  8. Blackledge, J. , Ptitsyn, N. : Encryption using Deterministic Chaos. "ISAST Transactions onElectronics and Signal Processing," vol. 4,issue 1, pp. 6-17. 2010.
  9. Bruce Shneier, "Applied Crptography :protocol Algorithms," and source code in C. Johnwiley&Sons,Inc, 1996.
  10. LjupcoKocarev and ShiguoLian (Eds. ): "Chaos-Based cryptography, Theory," Algorithms and Applications. Studies in Computational Intelligence ISSN 1860-949X, 2011 Springer-Verlag Berlin Heidelberg.
  11. George Makris ,Ioannis Antoniou, "Cryptography with Chaos Proceedings," 5th Chaotic Modeling and Simulation, International Conference, 12 – 15 June 2012, Athens Greece.
  12. Next generation Encryption, Cisco Security Intelligence Operations, 2012,http://www. cisco. com/web/about/security/intelligence/nextgen_crypto. html
  13. Yuan Kun, Zhang Han Li Zhaohui, "An Improved AES algorithm based on chaos," International Conference on Multimedia Information Networking and Security 2009.
  14. Bianco et al, "Encryption System Based on Chaos Theory," United State Patent, Patent Number:5,048,086 Date of Patent Sep. 10, 1991.
  15. G. Jakimoski,L. Kocarev , "Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps," IEEE transactions on circuits and systems: Fundamental Theory and Applications, vol. 48, No2, pp. 163–169, February 2001.
  16. Chung-Ming Ou, "Design of Block Ciphers by Simple Chaotic Functions," IEEE computational intelligence magazine, pp. 54–59, May 2008.
  17. N. Masuda, K. Aihara, "Cryptosystems with discretized chaotic maps," IEEE Trans CircSyst-I 2002;49(1):2840.
  18. N. Courtois, A. Klimov, 1. Patarin, A. Shamir, "Efficient algorithm for solving overdefmed systems of muhivariate polynomial equations," Proceedings for Eurocrypt 2000, LNCS 1807, pp 392407,Springer-Verlag, 2000.
  19. Zhao Rui. Wang Qingsheng. Wen Huiping, "Design of AES Algorithm Based on Two Dimensional Logistic and Chebyshev Chaotic Mapping," 2008.
  20. Q. V. Lawande, B. R. Ivan, S. D. Dhodapkar, "Chaos Based Cryptography," A New Approach to Secure Communications, BARC News Letter, July 2005.
  21. Jing Wang, Guo-ping Jiang, "Improved DES Algorithm Based On Irrational Numbers," IEEE Int. Conference Neural Networks & Signal Processing, Zhenjiang, China, June 8~10, 2008.
  22. BassemBakhache, "A New Chaotic Encryption Algorithm to Enhance the Security of ZigBee and Wi-Fi networks," International Journal of Intelligent Computing Research (IJICR), vol. 2, Dec 2011.
  23. Krishnamurthy G N, V Ramaswamy, "Making AES Stronger: AES with Key Dependent S-Box," IJCSNS International Journal of Computer Science and Network Security, vol. 8 No. 9, September 2008
  24. V. Sumathy& C. Navaneethan, "Enhanced AES Algorithm for Strong Encryption," International Journal of Advances in Engineering & Technology, Sept 2012. ©IJAET ISSN: 2231-1963.
  25. RaziHosseinkhani, H. Haj SeyyedJavadi, "Using Cipher Key to Generate Dynamic S-Box in AES Cipher System," International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (1) : 2012
  26. Julia Juremi, RamlanMahmod, SalasiahSulaiman, "A Proposal for Improving AES S-box with Rotation and Key-dependent," Cyber Warfare and Digital Forensic (CyberSec) international conference, 2012
  27. ShabaanSahmoud, WisamElmasry and ShadiAbdulfa, "Enhancement the security of AES against modern attacks by using variable key block cipher,"International Arab Journel of e-technology, Vol 3,No. 1, January 2013
  28. Neha Jain, Vikas Kaul and S K Karayankhedkar, "Security Enhancement Algorithm for Data Transmission for Next Generation Networks," IJCA Proceedings on International Conference and Workshop on Emerging Trends in Technology 2013ICWET(2):1-6, April 2013.
  29. Vikas Kaul, Prerana Choudhari, S K Narayankhedkar, "Security Enhancement for Data Transmission In 4G Networks," IEEE The Next Generation Information Technology Summit (Confluence), Noida, India, September 2526,2014,ISBN:9781479942374,DOI:10. 1109/CONFLUENCE. 2014. 6949278, pp:373-378.
  30. Vikas Kaul, Prerana Choudhari, S K Narayankhedkar, "Security Enhancement for Data Transmission In 4G Networks," International Journal of Advanced Research in Computer Science and Software Engineering 4(5), May - 2014,vol. 4, pp. 1232-1239
Index Terms

Computer Science
Information Sciences

Keywords

4G; AES; S-box; Round structure; Chaos