Novel Method to Ensure Security in Telecommunications Systems

PDF

Published: 2023-11-20

Page: 155-162


Monsuru A. Okandeji

Department of Electrical and Electronic Engineering, Igbajo Polytechnic, Igbajo, Osun State, Nigeria.

Janet O. Jooda

Department of Computer Engineering, Redeemer’s University, Ede, Osun State, Nigeria.

Samuel Adewale Fajumobi

Department of Electrical and Electronic Engineering, Igbajo Polytechnic, Igbajo, Osun State, Nigeria.

Olajide Blessing Olajide *

Department of Computer Engineering, Federal University Wukari, Taraba State, Nigeria.

*Author to whom correspondence should be addressed.


Abstract

Data in the cloud and all forms of wireless communication are susceptible to many forms of attack. Forming hybridized cipher with symmetric and asymmetric algorithms allays the fear of security concern having identified the weakness of single-layer encryption. However, the hybrized cipher requires exchange of secret keys between sender and receiver and also paid little attention to throughput. Hence, this research removes the need to share secrete key for a private key by developing a hybrid cipher using the output Elliptic Curve Cryptography (ECC) for key exchange of symmetric key cipher, RC4c.The stages involved in the developed ECCRC4c algorithm are ECC and RC4c encryption. Varying lengths of data in step of 8 bits were used to estimate the performance metrics of the proposed system of this research. The results showed a significant improvement in the throughput and computation time on the existing algorithm. There was an improvement of 94.6% in throughput and 89.9% in computation time which implied power savings. Performance metrics of a hybrid cryptographic algorithm are proportional to performance metrics of the components ciphers as shown from the individual metrics of DES, RSA, ECC, RC4c, RSADES and ECCRC4c.

Keywords: Wireless, communication, hybridized, cipher symmetric, asymmetric, cryptography


How to Cite

Okandeji , M. A., Jooda , J. O., Fajumobi, S. A., & Olajide, O. B. (2023). Novel Method to Ensure Security in Telecommunications Systems. Asian Basic and Applied Research Journal, 5(1), 155–162. Retrieved from https://globalpresshub.com/index.php/ABAARJ/article/view/1898

Downloads

Download data is not yet available.

References

Kulkarni G, Gambhir J, Rajnikant P. Cloud Computing-Software as service. International Journal of Computer Science & Information Technology Research Excellence. 2012;II(1):90-93.

Srinivas J, Reddy S, Moiz Q. Cloud computing basics. International Journal of Advanced Research in Computer and Communication Engineering. 2012;342-347.

Microsoft Azure; 2020. Available:https://azure.microsoft.com/en-us/overview/what-is-a-public-cloud/?cdn=disable

Chethan V, Babu SM, Kavitha, AV, Praveen Krishna. Data security analysis in cloud computing environment; 2023.

DOI:10.1109/ICCMC56507.2023.10083 547

Sanyal S, IP. Cloud computing: An Approach with modern cryptography; 2013)

Scott F, Itsik M, Shamir A. (n.d.). Available:https://www.cs.cornell.edu/people/egs/615/rc4_ksaproc.pdf

Panpatil S, Deshmukh U, Sonawane G, Mhatre M. Cryptography. 2023;04 Available:https://doi.org/https://www.doi.org/10.56726/IRJMETS37086

Goswami T, Solanki J, Jagveer T, Suthar T, Adwakar K. Cloud storage using symmetric alogrithm. 2018;4(5). Available:https://doi.org/10.32628/CI049

Naser JA, Fadli ZM. Use of cryptography in cloud computing. ResearchGate. 2016;176-184.

Nisha S, Mohammed F. RSA public key cryptography algorithm – A review. Internationa Journal of Scientific & Technology Research. 2017;6(7):187-191.

Eric G; 2020. Available:https://www.pcmag.com/news/what-is-cloud-computing

Kumar K, S. Security and privacy preservation for data communication network. Procedia Computer Science; 2022. DOI: 10.1016/j.procs.2022.12.001

Rong B. Security in wireless communication networks. IEEE Wireless Communications; 2023. DOI: 10.1109/MWC.2023.10077227

Khan SS, Tuteja RR. Cloud security using multilevel encryption algorithms. International Journal of Advanced Research in Computer and Communication Engineering. 2016;(1): 70-75.

Oguntunde BO, Arekete SA, Odim MO, Olakanmi O. A Comparative study of some traditional and modern cryptographic techniques. International Journal of Engineering and Management Research. 2017;VII (6):76-82.

Forouza AB, Shopia CF. Data communications and networking (4th Edition ed.). (R. Olson, Ed.) New York: McGraw Hills; 2007.

Diaa Salama AE, Hatem MA, Mohie MH. Performance evaluation of symmetric encryption algorithms on power consumption for wireless devices. International Journal of Computer Theory & Engineering. 2009;1(4):343–351, IV ( 4), 343–351.

Olakanmi. RC4c : A secured way to view data 2012 international Journal of Computer Networks & Communications (IJCNC)IV117-128; 2012.

Scott F, Itsik M, Shamir A. (n.d.). Available:https://www.cs.cornell.edu/people/egs/615/rc4_ksaproc.pdf

Omar SE, Adegoke O. Performance comparisons, design and implementation of RC5 symmetric encryption core using reconfigurable hardware. Journal of Computers. 2008;III(3):49-55.

Adam SA, Yousif A, Bashir MB. Multilevel Authentication Scheme for Cloud Computing. 2016;IX(9) Available:https://doi.org/10.14257/IJGDC.2016.9.9.18

Ooi CS. Data security; 2023. Available:https://doi.org/10.5281/zenodo.7952027

Cloud security Alliance; 2019.

Retrieved from Cloud security alliance: https://cloudsec_urityalliance.org/download/security-guidance-for-criticaareas-of-focus-in-cloudcomputing-v3/

Olenski J. 2015. Available:www.globalsign.com/en/blog/elliptic-curve-cryptography