Publication:
Comparative study on 4G/LTE cryptographic algorithms

dc.contributor.affiliation#PLACEHOLDER_PARENT_METADATA_VALUE#en_US
dc.contributor.authorSulaiman, Alyaa Ghanimen_US
dc.date.accessioned2024-10-08T07:42:16Z
dc.date.available2024-10-08T07:42:16Z
dc.date.issued2014
dc.description.abstractThe significance of increasing the protection of LTE network has grown rapidly due to increased possible threats against this new technology. Apparently, a Long Term Evolution (LTE) is denoted also as 4G (Fourth Generation) of mobile communication, developed by 3GPP (Third Generation Partnership project) which is an evolution of the 3rd generation of mobile communication to provide better reliability, higher efficiency, more data capacity and lower cost than previous generation. In fact, LTE makes an evolution in mobile marketing as 4G wireless services. The LTE is launched on December in 2009 by TeliaSonera in Oslo and Stockholm. By 2010, Verizon wireless started using the LTE network in a wide range in North America. Additionally, the LTE inherited all cryptographic algorithms that work with its predecessors such as SNOW 3G and AES. Furthermore, LTE has one extra cryptographic algorithm named as ZUC to cope with the next generation of mobile communication and guarantee its security from different threats. The main aim of cryptography in LTE network is to ensure data confidentiality and integrity. Hence, several studies have been conducted since 2010 to support LTE network with a high level of security through studying the encryption and decryption algorithms that work with this new technology and do enhancement on them. Therefore, this research aims to study all cryptographic algorithms related to LTE network and then do comparative study among them based on different factors. The reason of using different factors is to measure the performance of an algorithm from several perspectives such as area and throughput from hardware perspective, time and memory complexity from security perspective and others. So, our target is reveal the advantages and disadvantages of the LTE cryptographic algorithms from different perspectives in order to increase confidentiality and integrity of transmitted data over the air interface in LTE network. Keywords: LTE, 4G, 3GPP, Cryptographyen_US
dc.description.callnumbert TK 5103.48325 S949C 2014en_US
dc.description.degreelevelMasteren_US
dc.description.identifierThesis : Comparative study on 4G/LTE cryptographic algorithms /by Alyaa Ghanim Sulaimanen_US
dc.description.identityt11100337213AlyaaGhanimen_US
dc.description.kulliyahKulliyyah of Information and Communication Technologyen_US
dc.description.notesThesis (MIT)--International Islamic University Malaysia, 2014en_US
dc.description.physicaldescriptionxiv, 92 leaves : ill. ; 30cm.en_US
dc.description.programmeMaster of Information Technologyen_US
dc.identifier.urihttps://studentrepo.iium.edu.my/handle/123456789/9591
dc.identifier.urlhttps://lib.iium.edu.my/mom/services/mom/document/getFile/IsLBKmiOxYb0yLliHzX71d8zTSaoMc2E20150611144350133
dc.language.isoenen_US
dc.publisherKuala Lumpur : International Islamic University Malaysia, 2014en_US
dc.rightsCopyright International Islamic University Malaysia
dc.subject.lcshLong-Term Evolution (Telecommunications)en_US
dc.subject.lcshBroadband communication systemsen_US
dc.titleComparative study on 4G/LTE cryptographic algorithmsen_US
dc.typeMaster Thesisen_US
dspace.entity.typePublication

Files

Original bundle

Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
t11100337213AlyaaGhanim_SEC_24.pdf
Size:
839.22 KB
Format:
Adobe Portable Document Format
Description:
24 pages file
Loading...
Thumbnail Image
Name:
t11100337213AlyaaGhanim_SEC.pdf
Size:
2.28 MB
Format:
Adobe Portable Document Format
Description:
Full text secured file

Collections