Novel Method to Ensure Security in Telecommunications Systems


Published: 2023-11-20

Page: 155-162

Monsuru A. Okandeji

Department of Electrical and Electronic Engineering, Igbajo Polytechnic, Igbajo, Osun State, Nigeria.

Janet O. Jooda

Department of Computer Engineering, Redeemer’s University, Ede, Osun State, Nigeria.

Samuel Adewale Fajumobi

Department of Electrical and Electronic Engineering, Igbajo Polytechnic, Igbajo, Osun State, Nigeria.

Olajide Blessing Olajide *

Department of Computer Engineering, Federal University Wukari, Taraba State, Nigeria.

*Author to whom correspondence should be addressed.


Data in the cloud and all forms of wireless communication are susceptible to many forms of attack. Forming hybridized cipher with symmetric and asymmetric algorithms allays the fear of security concern having identified the weakness of single-layer encryption. However, the hybrized cipher requires exchange of secret keys between sender and receiver and also paid little attention to throughput. Hence, this research removes the need to share secrete key for a private key by developing a hybrid cipher using the output Elliptic Curve Cryptography (ECC) for key exchange of symmetric key cipher, RC4c.The stages involved in the developed ECCRC4c algorithm are ECC and RC4c encryption. Varying lengths of data in step of 8 bits were used to estimate the performance metrics of the proposed system of this research. The results showed a significant improvement in the throughput and computation time on the existing algorithm. There was an improvement of 94.6% in throughput and 89.9% in computation time which implied power savings. Performance metrics of a hybrid cryptographic algorithm are proportional to performance metrics of the components ciphers as shown from the individual metrics of DES, RSA, ECC, RC4c, RSADES and ECCRC4c.

Keywords: Wireless, communication, hybridized, cipher symmetric, asymmetric, cryptography

How to Cite

Okandeji , M. A., Jooda , J. O., Fajumobi, S. A., & Olajide, O. B. (2023). Novel Method to Ensure Security in Telecommunications Systems. Asian Basic and Applied Research Journal, 5(1), 155–162. Retrieved from


Download data is not yet available.


Kulkarni G, Gambhir J, Rajnikant P. Cloud Computing-Software as service. International Journal of Computer Science & Information Technology Research Excellence. 2012;II(1):90-93.

Srinivas J, Reddy S, Moiz Q. Cloud computing basics. International Journal of Advanced Research in Computer and Communication Engineering. 2012;342-347.

Microsoft Azure; 2020. Available:

Chethan V, Babu SM, Kavitha, AV, Praveen Krishna. Data security analysis in cloud computing environment; 2023.

DOI:10.1109/ICCMC56507.2023.10083 547

Sanyal S, IP. Cloud computing: An Approach with modern cryptography; 2013)

Scott F, Itsik M, Shamir A. (n.d.). Available:

Panpatil S, Deshmukh U, Sonawane G, Mhatre M. Cryptography. 2023;04 Available:

Goswami T, Solanki J, Jagveer T, Suthar T, Adwakar K. Cloud storage using symmetric alogrithm. 2018;4(5). Available:

Naser JA, Fadli ZM. Use of cryptography in cloud computing. ResearchGate. 2016;176-184.

Nisha S, Mohammed F. RSA public key cryptography algorithm – A review. Internationa Journal of Scientific & Technology Research. 2017;6(7):187-191.

Eric G; 2020. Available:

Kumar K, S. Security and privacy preservation for data communication network. Procedia Computer Science; 2022. DOI: 10.1016/j.procs.2022.12.001

Rong B. Security in wireless communication networks. IEEE Wireless Communications; 2023. DOI: 10.1109/MWC.2023.10077227

Khan SS, Tuteja RR. Cloud security using multilevel encryption algorithms. International Journal of Advanced Research in Computer and Communication Engineering. 2016;(1): 70-75.

Oguntunde BO, Arekete SA, Odim MO, Olakanmi O. A Comparative study of some traditional and modern cryptographic techniques. International Journal of Engineering and Management Research. 2017;VII (6):76-82.

Forouza AB, Shopia CF. Data communications and networking (4th Edition ed.). (R. Olson, Ed.) New York: McGraw Hills; 2007.

Diaa Salama AE, Hatem MA, Mohie MH. Performance evaluation of symmetric encryption algorithms on power consumption for wireless devices. International Journal of Computer Theory & Engineering. 2009;1(4):343–351, IV ( 4), 343–351.

Olakanmi. RC4c : A secured way to view data 2012 international Journal of Computer Networks & Communications (IJCNC)IV117-128; 2012.

Scott F, Itsik M, Shamir A. (n.d.). Available:

Omar SE, Adegoke O. Performance comparisons, design and implementation of RC5 symmetric encryption core using reconfigurable hardware. Journal of Computers. 2008;III(3):49-55.

Adam SA, Yousif A, Bashir MB. Multilevel Authentication Scheme for Cloud Computing. 2016;IX(9) Available:

Ooi CS. Data security; 2023. Available:

Cloud security Alliance; 2019.

Retrieved from Cloud security alliance:

Olenski J. 2015.