Title :
Solving security issues in mobile computing using cryptography techniques — A Survey
Author :
Mathur, Raghav ; Agarwal, Shruti ; Sharma, Vishnu
Author_Institution :
Sch. of Comput. Sci. & Eng., Galgotias Univ., Greater Noida, India
Abstract :
Advancements in wireless networking have initiated the idea of mobile computing, where the user does not have to be bound to a fixed physical location in order to exchange any information. The benefits of on-the-move connectivity are many but there exist serious networking and security issues that need to be solved before realizing the full benefits of mobile computing. In this paper, we discuss the security problems arising from the technological advances in mobile computing as well as their solution. Using cryptographic techniques, information can be provided adequate security, over the air. Encryption of data takes place using symmetric or asymmetric cryptography algorithms depending on the area of application and level of security required. The paper presents a comparative survey on AES, DES, IDEA, RC2, BLOWFISH, RSA encrypting algorithms with their advantages and disadvantages over different parameters. Finally, we derive conclusion over security solutions through these algorithms that may be worked upon to enhance the information and network security in future.
Keywords :
cryptography; mobile computing; AES; BLOWFISH; DES; IDEA; RC2; RSA encrypting algorithm; asymmetric cryptography algorithm; cryptographic technique; data encryption; mobile computing; security issue; wireless networking; Ciphers; Encryption; Mobile communication; Mobile computing; Receivers; AES; BLOWFISH; Cryptography; DES; DSA; IDEA; Mobile computing; RC-2; RSA; Security issues;
Conference_Titel :
Computing, Communication & Automation (ICCCA), 2015 International Conference on
Conference_Location :
Noida
Print_ISBN :
978-1-4799-8889-1
DOI :
10.1109/CCAA.2015.7148427