Analysis and implementation of security algorithms for wireless communications
Wireless communication is the process of communicating information in electromagnetic media over a distance through the free space environment, rather than through traditional wired or other physical conduits. The secure provision of mobile computing and telecommunication services is rapidly increas...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2010
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/12675/6/AbdinasirHassanAliMFSKSM2010.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-utm-ep.12675 |
---|---|
record_format |
uketd_dc |
spelling |
my-utm-ep.126752017-09-17T08:34:54Z Analysis and implementation of security algorithms for wireless communications 2010 Hassan Ali, Abdinasir TK Electrical engineering. Electronics Nuclear engineering Wireless communication is the process of communicating information in electromagnetic media over a distance through the free space environment, rather than through traditional wired or other physical conduits. The secure provision of mobile computing and telecommunication services is rapidly increasing in importance as both demand and applications in order to provide a large number of advanced services to mobile users. The first generation of cellular mobile communications systems contained few if any security measures to protect the system operator and users. The second generation generally did a lot better, and contained entity authentication and confidentiality protection. Although this was a major improvement, security protection in the second generation left a lot to be desired in terms of key management and strong security algorithms. With the advent of third generation a (3G) mobile system a serious effort has been made to create consistent security architecture based on the threats and risks a 3G system faces. The basic security mechanisms are confidentiality, integrity, and availability. In the case of the wireless communications (as in many other networks), authentication, authorization, and access control are also the basic security mechanisms to be attained. The goal of this research is to propose the security mechanism of wireless communication to protect against any attack using technical approach that implements the authentication and encryption process. 2010 Thesis http://eprints.utm.my/id/eprint/12675/ http://eprints.utm.my/id/eprint/12675/6/AbdinasirHassanAliMFSKSM2010.pdf application/pdf en public masters Universiti Teknologi Malaysia, Faculty of Computer Science and Information Systems Faculty of Computer Science and Information Systems |
institution |
Universiti Teknologi Malaysia |
collection |
UTM Institutional Repository |
language |
English |
topic |
TK Electrical engineering Electronics Nuclear engineering |
spellingShingle |
TK Electrical engineering Electronics Nuclear engineering Hassan Ali, Abdinasir Analysis and implementation of security algorithms for wireless communications |
description |
Wireless communication is the process of communicating information in electromagnetic media over a distance through the free space environment, rather than through traditional wired or other physical conduits. The secure provision of mobile computing and telecommunication services is rapidly increasing in importance as both demand and applications in order to provide a large number of advanced services to mobile users. The first generation of cellular mobile communications systems contained few if any security measures to protect the system operator and users. The second generation generally did a lot better, and contained entity authentication and confidentiality protection. Although this was a major improvement, security protection in the second generation left a lot to be desired in terms of key management and strong security algorithms. With the advent of third generation a (3G) mobile system a serious effort has been made to create consistent security architecture based on the threats and risks a 3G system faces. The basic security mechanisms are confidentiality, integrity, and availability. In the case of the wireless communications (as in many other networks), authentication, authorization, and access control are also the basic security mechanisms to be attained. The goal of this research is to propose the security mechanism of wireless communication to protect against any attack using technical approach that implements the authentication and encryption process. |
format |
Thesis |
qualification_level |
Master's degree |
author |
Hassan Ali, Abdinasir |
author_facet |
Hassan Ali, Abdinasir |
author_sort |
Hassan Ali, Abdinasir |
title |
Analysis and implementation of security algorithms for wireless communications |
title_short |
Analysis and implementation of security algorithms for wireless communications |
title_full |
Analysis and implementation of security algorithms for wireless communications |
title_fullStr |
Analysis and implementation of security algorithms for wireless communications |
title_full_unstemmed |
Analysis and implementation of security algorithms for wireless communications |
title_sort |
analysis and implementation of security algorithms for wireless communications |
granting_institution |
Universiti Teknologi Malaysia, Faculty of Computer Science and Information Systems |
granting_department |
Faculty of Computer Science and Information Systems |
publishDate |
2010 |
url |
http://eprints.utm.my/id/eprint/12675/6/AbdinasirHassanAliMFSKSM2010.pdf |
_version_ |
1747814944543342592 |