DocumentCode :
2159065
Title :
Analysis and implementation of security algorithms for wireless communications
Author :
Ali, Abdinasir Hassan ; Masrom, Maslin
Author_Institution :
Centre for Adv. Software Eng., Univ. Teknol. Malaysia, Kuala Lumpur, Malaysia
Volume :
2
fYear :
2010
fDate :
26-28 Feb. 2010
Firstpage :
430
Lastpage :
434
Abstract :
Wireless communication is the process of communicating information in electromagnetic media over a distance through the free space environment, rather than through traditional wired or other physical conduits The secure provision of mobile computing and telecommunication services is rapidly increasing in importance as both demand and applications in order to provide a large number of advanced services to mobile users. The first generation of cellular mobile communications systems contained few if any security measures to protect the system operator and users. The second generation generally did a lot better, and contained entity authentication and confidentiality protection. Although this was a major improvement, security protection in the second generation left a lot to be desired in terms of key management and strong security algorithms. With the advent of third generation a (3G) mobile system a serious effort has been made to create consistent security architecture based on the threats and risks a 3G system faces. The goal of this study is to propose the security mechanism of wireless communication to protect against any attack using technical approach that implements the authentication and encryption process.
Keywords :
3G mobile communication; cryptography; telecommunication security; 3G system; authentication process; cellular mobile communications systems; communicating information; electromagnetic media; encryption process; mobile computing; mobile users; security algorithms; security protection; telecommunication services; third generation mobile system; wireless communications; Algorithm design and analysis; Authentication; Communication system security; Information security; Mobile computing; Physics computing; Protection; Telecommunication computing; Telecommunication services; Wireless communication; authentication; encryption and key management; security algorithms; wireless communication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer and Automation Engineering (ICCAE), 2010 The 2nd International Conference on
Conference_Location :
Singapore
Print_ISBN :
978-1-4244-5585-0
Electronic_ISBN :
978-1-4244-5586-7
Type :
conf
DOI :
10.1109/ICCAE.2010.5451589
Filename :
5451589
Link To Document :
بازگشت