Repository logo
  • English
  • Deutsch
  • Español
  • Français
Log In
New user? Click here to register.
  1. Home
  2. Browse by Author

Browsing by Author "Sulaiman, Alyaa Ghanim"

Filter results by typing the first few letters
Now showing 1 - 1 of 1
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Some of the metrics are blocked by your 
    consent settings
    Publication
    Comparative study on 4G/LTE cryptographic algorithms
    (Kuala Lumpur : International Islamic University Malaysia, 2014, 2014)
    Sulaiman, Alyaa Ghanim
    ;
    The significance of increasing the protection of LTE network has grown rapidly due to increased possible threats against this new technology. Apparently, a Long Term Evolution (LTE) is denoted also as 4G (Fourth Generation) of mobile communication, developed by 3GPP (Third Generation Partnership project) which is an evolution of the 3rd generation of mobile communication to provide better reliability, higher efficiency, more data capacity and lower cost than previous generation. In fact, LTE makes an evolution in mobile marketing as 4G wireless services. The LTE is launched on December in 2009 by TeliaSonera in Oslo and Stockholm. By 2010, Verizon wireless started using the LTE network in a wide range in North America. Additionally, the LTE inherited all cryptographic algorithms that work with its predecessors such as SNOW 3G and AES. Furthermore, LTE has one extra cryptographic algorithm named as ZUC to cope with the next generation of mobile communication and guarantee its security from different threats. The main aim of cryptography in LTE network is to ensure data confidentiality and integrity. Hence, several studies have been conducted since 2010 to support LTE network with a high level of security through studying the encryption and decryption algorithms that work with this new technology and do enhancement on them. Therefore, this research aims to study all cryptographic algorithms related to LTE network and then do comparative study among them based on different factors. The reason of using different factors is to measure the performance of an algorithm from several perspectives such as area and throughput from hardware perspective, time and memory complexity from security perspective and others. So, our target is reveal the advantages and disadvantages of the LTE cryptographic algorithms from different perspectives in order to increase confidentiality and integrity of transmitted data over the air interface in LTE network. Keywords: LTE, 4G, 3GPP, Cryptography

This site contains copyrighted unpublished research owned by International Islamic University Malaysia (IIUM) and(or) the owner of the research. No part of any material contained in or derived from any unpublished research may be used without written permission of the copyright holders or due acknowledgement.

Contact:
  • Dar al-Hikmah Library
    International Islamic University Malaysia (IIUM)
    P.O Box 10, 50728
    Kuala Lumpur
  • +603-64214829/4813
  • studentrepo@iium.edu.my
Follow Us:
Copyright © 2024: Dar al-Hikmah Library, IIUM
by CDSOL