Analysis and implementation of security algorithms for wireless communications
Wireless communication is the process of communicating information in electromagnetic media over a distance through the free space environment, rather than through traditional wired or other physical conduits. The secure provision of mobile computing and telecommunication services is rapidly increas...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2010
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/12675/6/AbdinasirHassanAliMFSKSM2010.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Wireless communication is the process of communicating information in electromagnetic media over a distance through the free space environment, rather than through traditional wired or other physical conduits. The secure provision of mobile computing and telecommunication services is rapidly increasing in importance as both demand and applications in order to provide a large number of advanced services to mobile users. The first generation of cellular mobile communications systems contained few if any security measures to protect the system operator and users. The second generation generally did a lot better, and contained entity authentication and confidentiality protection. Although this was a major improvement, security protection in the second generation left a lot to be desired in terms of key management and strong security algorithms. With the advent of third generation a (3G) mobile system a serious effort has been made to create consistent security architecture based on the threats and risks a 3G system faces. The basic security mechanisms are confidentiality, integrity, and availability. In the case of the wireless communications (as in many other networks), authentication, authorization, and access control are also the basic security mechanisms to be attained. The goal of this research is to propose the security mechanism of wireless communication to protect against any attack using technical approach that implements the authentication and encryption process. |
---|