Comparative study on 4G/LTE cryptographic algorithms /

The significance of increasing the protection of LTE network has grown rapidly due to increased possible threats against this new technology. Apparently, a Long Term Evolution (LTE) is denoted also as 4G (Fourth Generation) of mobile communication, developed by 3GPP (Third Generation Partnership pr...

Full description

Saved in:
Bibliographic Details
Main Author: Sulaiman, Alyaa Ghanim
Format: Thesis
Language:English
Published: Kuala Lumpur : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2014
Subjects:
Online Access:http://studentrepo.iium.edu.my/handle/123456789/5651
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The significance of increasing the protection of LTE network has grown rapidly due to increased possible threats against this new technology. Apparently, a Long Term Evolution (LTE) is denoted also as 4G (Fourth Generation) of mobile communication, developed by 3GPP (Third Generation Partnership project) which is an evolution of the 3rd generation of mobile communication to provide better reliability, higher efficiency, more data capacity and lower cost than previous generation. In fact, LTE makes an evolution in mobile marketing as 4G wireless services. The LTE is launched on December in 2009 by TeliaSonera in Oslo and Stockholm. By 2010, Verizon wireless started using the LTE network in a wide range in North America. Additionally, the LTE inherited all cryptographic algorithms that work with its predecessors such as SNOW 3G and AES. Furthermore, LTE has one extra cryptographic algorithm named as ZUC to cope with the next generation of mobile communication and guarantee its security from different threats. The main aim of cryptography in LTE network is to ensure data confidentiality and integrity. Hence, several studies have been conducted since 2010 to support LTE network with a high level of security through studying the encryption and decryption algorithms that work with this new technology and do enhancement on them. Therefore, this research aims to study all cryptographic algorithms related to LTE network and then do comparative study among them based on different factors. The reason of using different factors is to measure the performance of an algorithm from several perspectives such as area and throughput from hardware perspective, time and memory complexity from security perspective and others. So, our target is reveal the advantages and disadvantages of the LTE cryptographic algorithms from different perspectives in order to increase confidentiality and integrity of transmitted data over the air interface in LTE network. Keywords: LTE, 4G, 3GPP, Cryptography
Physical Description:xiv, 92 leaves : ill. ; 30cm.
Bibliography:Includes bibliographical references (leaves 89-92).