Optimized and robust implementation of mobile networks confidentiality and integrity functions
نویسندگان
چکیده
In mobile networks, sensitive information is transmitted over the radio link between Base Station (BS) and Mobile (MS). Therefore, a security mechanism based on confidentiality integrity functions designed to protect anonymity of users’. More precisely, function was standardized by Third Generation Partnership Project (3GPP) users’ data control (signaling) data. However, both are same kernel algorithm. For example, used in Universal Telecommunications System (UMTS) network algorithm, namely KASUMI block cipher. this work, we proposed an optimized that combines one Running-Block-Cipher ensures functionalities as basic (UMTS F8 F9 functions). We architectural synthesis technique allows for achieving significant reduction area occupied hardware device. The architecture implemented Xilinx Virtex Field Programmable Gate Arrays (FPGA) technology. results after place-and-route comparison with previous works show good performance terms throughput, consumed energy, logic resources.
منابع مشابه
development and implementation of an optimized control strategy for induction machine in an electric vehicle
in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...
15 صفحه اولNew Implementation of RMI to Protect Integrity and Confidentiality for Mobile Agents
A new implementation of RMI named OnePort RMI is proposed in this paper. OnePort RMI consists of new RMI runtime, classes which are implemented interfaces by RMI specification, and MultiChannelSocketFactory. Using OnePort RMI, when an object on a client invokes methods of remote objects on a server, the client can use sockets of different types to connect one destination port at the same time, ...
متن کاملa contrastive study of rhetorical functions of citation in iranian and international elt scopus journals
writing an academic article requires the researchers to provide support for their works by learning how to cite the works of others. various studies regarding the analysis of citation in m.a theses have been done, while little work has been done on comparison of citations among elt scopus journal articles, and so the dearth of research in this area demands for further investigation into citatio...
Data Confidentiality in Mobile Ad hoc Networks
Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes act as routers to forward both their own data and also their neighbours’ data by sending and receiving packets to and from other nodes in the network. The relatively easy confi...
متن کاملProtocol design, implementation and integration for the protection of sensor data confidentiality and integrity
Wireless sensor networks are data centric because in many applications, sensor nodes are required to generate data, collect data, storage data and process data queries. Meanwhile, wireless sensor networks are vulnerable to security attacks because they are deployed in unattended (often hostile) environments and do not have tamper resistant hardware. Therefore, secure and efficient data manageme...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Security
سال: 2021
ISSN: ['0167-4048', '1872-6208']
DOI: https://doi.org/10.1016/j.cose.2020.102093