Enhanced Secure Communication Protocol with Pipelined Advanced Encryption for Mobile Networks

Main Article Content

A. HariKrishna
Devasani Bindu
Cherukuru Sowmya
Gumparlapati Varshitha
Challagundla Tharunasree

Abstract

In today's increasingly connected world, the demand for secure mobile communications is paramount. The security protocols are specifically tailored for mobile communication systems, ensuring the confidentiality and integrity of sensitive data transmitted over wireless networks. It can be seamlessly integrated into various mobile applications such as messaging platforms, VoIP services, and mobile banking apps, providing end-to-end encryption for user privacy. Current encryption protocols used in mobile communications often face challenges related to performance and security. Traditional encryption methods may not adequately address the evolving threats posed by sophisticated attackers. Moreover, the computational overhead associated with encryption and decryption processes can impact the overall efficiency of mobile communication systems. This work presents a novel approach to enhancing the security of mobile communications through the design of a Pipelined Advanced Encryption Based Cryptography Protocol (PAEBCP). The proposed protocol aims to address the vulnerabilities present in existing encryption methods by leveraging a pipelined architecture for efficient encryption and decryption processes. The proposed PAEBCP protocol introduces a pipelined architecture that optimizes the encryption and decryption processes for mobile communication systems. By dividing the encryption process into multiple stages and parallelizing key operations, the protocol enhances both security and performance.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
HariKrishna, A. ., Bindu, D. ., Sowmya, C., Varshitha, G. ., & Tharunasree, C. . (2024). Enhanced Secure Communication Protocol with Pipelined Advanced Encryption for Mobile Networks. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 15(1), 205–211. https://doi.org/10.61841/turcomat.v15i1.14613
Section
Research Articles

References

Rajput, Gurudayal Singh, Rajeev Thakur, and Rovin Tiwari. "VLSI implementation of lightweight

cryptography technique for FPGA-IOT application." Materials Today: Proceedings (2023).

Rajski, Janusz, Maciej Trawka, Jerzy Tyszer, and Bartosz Włodarczak. "H2B: Crypto Hash Functions Based

on Hybrid Ring Generators." IEEE Transactions on Computer-Aided Design of Integrated Circuits and

Systems (2023).

Alatawi, Mohammed Naif. "A Hybrid Cryptographic Cipher Solution for Secure Communication in Smart

Cities."

He, Pengzhou, Yazheng Tu, Jiafeng Xie, and H. S. Jacinto. "Kina: Karatsuba initiated novel accelerator for

ring-binary-lwe (rblwe)-based post-quantum cryptography." IEEE Transactions on Very Large-Scale

Integration (VLSI) Systems (2023).

Althobaiti, Hamad, and Ahmed Adas. "Simulation of Elliptical Curve Cryptography in IPSec on Ad-Hoc

Networks." European Journal of Engineering and Formal Sciences 6, no. 1 (2023): 1-26.

Vidaković, Marin, and Kruno Miličević. "Performance and Applicability of Quantum Digital Signature

Algorithms in Resource-Constrained Environments." Algorithms 16, no. 11 (2023): 518.

Feng, Jundong, Junchao Wang, Yubin Zhu, and Kaining Han. "A Hybrid Chaotic Encryption ASIC with

Dynamic Precision for Internet of Things." IEEE Internet of Things Journal (2023).

Trujillo-Toledo, D. A., O. R. López-Bonilla, E. E. García-Guerrero, J. J. Esqueda-Elizondo, J. R. CárdenasValdez, U. J. Tamayo-Pérez, O. A. Aguirre-Castro, and E.Inzunza-González. "Real-time medical image

encryption for H-IoT applications using improved sequences from chaotic maps." Integration 90 (2023):

-145.

Dam, Duc-Thuan, Thai-Ha Tran, Van-Phuc Hoang, Cong-Kha Pham, and Trong-Thuc Hoang. "A survey of

post-quantum cryptography: Start of a new race." Cryptography 7, no. 3 (2023): 40.

Oladipupo, Esau Taiwo, Oluwakemi Christiana Abikoye, Agbotiname Lucky Imoize, Joseph Bamidele

Awotunde, Ting-Yi Chang, Cheng-Chi Lee, and Dinh-Thuan Do. "An Efficient Authenticated Elliptic

Curve Cryptography Scheme for Multicore Wireless Sensor Networks." IEEE Access 11 (2023): 1306-

Li, Bin, Yunfei Yan, Yuanxin Wei, and Heru Han. "Scalable and Parallel Optimization of the Number

Theoretic Transform Based on FPGA." IEEE Transactions on Very Large-Scale Integration (VLSI)

Systems (2023).

Della Sala, Riccardo, and Giuseppe Scotti. "Exploiting the DD-Cell as an ultra-compact entropy source for

an FPGA-based re-configurable PUF-TRNG architecture." IEEE Access (2023).

U. Penchalaiah and V. S. Kumar, "Design and Implementation of Low Power and Area Efficient

Architecture for High Performance ALU", Parallel Processing Letters., vol. 32, no. 01n02, pp. 2150017,

Camacho-Ruiz, Eros, Macarena C. Martínez-Rodríguez, Santiago Sánchez-Solano, and Piedad Brox.

"Timing-Attack-Resistant Acceleration of NTRU Round 3 Encryption on Resource-Constrained Embedded

Systems." Cryptography 7, no. 2 (2023): 29.

Nath, Himun Jyoti, and Hiten Choudhury. "Privacy-preserving Authentication Protocols in VANET: A

Review." (2023).

Thi, Sang Duong, Hoai Luan Pham, Vu Trung Duong Le, Ren Imamura, Thi Hong Tran, and Yasuhiko

Nakashima. "Small-footprint Reconfigurable Heterogeneous Cryptographic Accelerator for Fog

Computing." environment 3: 4.