Enhanced Secure Communication Protocol with Pipelined Advanced Encryption for Mobile Networks
Main Article Content
Abstract
In today's increasingly connected world, the demand for secure mobile communications is paramount. The security protocols are specifically tailored for mobile communication systems, ensuring the confidentiality and integrity of sensitive data transmitted over wireless networks. It can be seamlessly integrated into various mobile applications such as messaging platforms, VoIP services, and mobile banking apps, providing end-to-end encryption for user privacy. Current encryption protocols used in mobile communications often face challenges related to performance and security. Traditional encryption methods may not adequately address the evolving threats posed by sophisticated attackers. Moreover, the computational overhead associated with encryption and decryption processes can impact the overall efficiency of mobile communication systems. This work presents a novel approach to enhancing the security of mobile communications through the design of a Pipelined Advanced Encryption Based Cryptography Protocol (PAEBCP). The proposed protocol aims to address the vulnerabilities present in existing encryption methods by leveraging a pipelined architecture for efficient encryption and decryption processes. The proposed PAEBCP protocol introduces a pipelined architecture that optimizes the encryption and decryption processes for mobile communication systems. By dividing the encryption process into multiple stages and parallelizing key operations, the protocol enhances both security and performance.
Downloads
Metrics
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
References
Rajput, Gurudayal Singh, Rajeev Thakur, and Rovin Tiwari. "VLSI implementation of lightweight
cryptography technique for FPGA-IOT application." Materials Today: Proceedings (2023).
Rajski, Janusz, Maciej Trawka, Jerzy Tyszer, and Bartosz Włodarczak. "H2B: Crypto Hash Functions Based
on Hybrid Ring Generators." IEEE Transactions on Computer-Aided Design of Integrated Circuits and
Systems (2023).
Alatawi, Mohammed Naif. "A Hybrid Cryptographic Cipher Solution for Secure Communication in Smart
Cities."
He, Pengzhou, Yazheng Tu, Jiafeng Xie, and H. S. Jacinto. "Kina: Karatsuba initiated novel accelerator for
ring-binary-lwe (rblwe)-based post-quantum cryptography." IEEE Transactions on Very Large-Scale
Integration (VLSI) Systems (2023).
Althobaiti, Hamad, and Ahmed Adas. "Simulation of Elliptical Curve Cryptography in IPSec on Ad-Hoc
Networks." European Journal of Engineering and Formal Sciences 6, no. 1 (2023): 1-26.
Vidaković, Marin, and Kruno Miličević. "Performance and Applicability of Quantum Digital Signature
Algorithms in Resource-Constrained Environments." Algorithms 16, no. 11 (2023): 518.
Feng, Jundong, Junchao Wang, Yubin Zhu, and Kaining Han. "A Hybrid Chaotic Encryption ASIC with
Dynamic Precision for Internet of Things." IEEE Internet of Things Journal (2023).
Trujillo-Toledo, D. A., O. R. López-Bonilla, E. E. García-Guerrero, J. J. Esqueda-Elizondo, J. R. CárdenasValdez, U. J. Tamayo-Pérez, O. A. Aguirre-Castro, and E.Inzunza-González. "Real-time medical image
encryption for H-IoT applications using improved sequences from chaotic maps." Integration 90 (2023):
-145.
Dam, Duc-Thuan, Thai-Ha Tran, Van-Phuc Hoang, Cong-Kha Pham, and Trong-Thuc Hoang. "A survey of
post-quantum cryptography: Start of a new race." Cryptography 7, no. 3 (2023): 40.
Oladipupo, Esau Taiwo, Oluwakemi Christiana Abikoye, Agbotiname Lucky Imoize, Joseph Bamidele
Awotunde, Ting-Yi Chang, Cheng-Chi Lee, and Dinh-Thuan Do. "An Efficient Authenticated Elliptic
Curve Cryptography Scheme for Multicore Wireless Sensor Networks." IEEE Access 11 (2023): 1306-
Li, Bin, Yunfei Yan, Yuanxin Wei, and Heru Han. "Scalable and Parallel Optimization of the Number
Theoretic Transform Based on FPGA." IEEE Transactions on Very Large-Scale Integration (VLSI)
Systems (2023).
Della Sala, Riccardo, and Giuseppe Scotti. "Exploiting the DD-Cell as an ultra-compact entropy source for
an FPGA-based re-configurable PUF-TRNG architecture." IEEE Access (2023).
U. Penchalaiah and V. S. Kumar, "Design and Implementation of Low Power and Area Efficient
Architecture for High Performance ALU", Parallel Processing Letters., vol. 32, no. 01n02, pp. 2150017,
Camacho-Ruiz, Eros, Macarena C. Martínez-Rodríguez, Santiago Sánchez-Solano, and Piedad Brox.
"Timing-Attack-Resistant Acceleration of NTRU Round 3 Encryption on Resource-Constrained Embedded
Systems." Cryptography 7, no. 2 (2023): 29.
Nath, Himun Jyoti, and Hiten Choudhury. "Privacy-preserving Authentication Protocols in VANET: A
Review." (2023).
Thi, Sang Duong, Hoai Luan Pham, Vu Trung Duong Le, Ren Imamura, Thi Hong Tran, and Yasuhiko
Nakashima. "Small-footprint Reconfigurable Heterogeneous Cryptographic Accelerator for Fog
Computing." environment 3: 4.