[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Wireless Communication Systems: Confidentiality

Encryption and Decryption

  • Chapter
  • First Online:
Wireless Communications Systems Architecture
  • 129 Accesses

Abstract

In common communication systems confidentiality are ensured exclusively by encryption of the messages. This chapter covers the security procedures in wireless communication systems. The goal of physical layer security is to make use of the properties of the physical layer to enable critical security aspects. Moreover, wireless communication services are rapidly increasing because of the proliferation of mobile devices and the advent of the Internet of Things (IoT). Authentication is an important issue in wireless communications because the open nature of the wireless medium provides more security vulnerabilities. Most of existing wireless communication systems achieve the authentication goal via upper-layer authentication mechanisms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 43.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 54.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
GBP 69.99
Price includes VAT (United Kingdom)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. I. Ahmad, S. Shahabuddin, T. Kumar, J. Okwuibe, A. Gurtov, M. Ylianttila, Security for 5G and beyond. IEEE Commun. Surveys Tuts. 21(4), 3682–3722 (2019)

    Google Scholar 

  2. N. Xie, C. Chen, M. Zhong, Security model of authentication at the physical layer and performance analysis over fading channels. IEEE Trans. Depend. Secure Comput. 27 (2018)

    Google Scholar 

  3. P. Zhang, T. Taleb, X. Jiang, B. Wu, Physical layer authentication for massive MIMO systems with hardware impairments. IEEE Trans Ind. Informat. 19(3), 1563–1576 (2020)

    Google Scholar 

  4. https://www.sciencedirect.com/topics/computer-science/stream-ciphers

  5. https://www.researchgate.net/publication/338556941_Single_secret_image_sharing_scheme_using_neural_cryptography

  6. K.D. Deepak, D. Pawan, Performance comparison of symmetric data encryption techniques. Int. J. Adv. Res. Comput. Eng. Technol. 1(4), (2012). ISSN: 2278-1323

    Google Scholar 

  7. P. Kalpana, S. Singaraju, Data security in cloud computing using RSA algorithm. Int. J. Res. Comput. Commun. Technol. IJRCCT 1(4), 145 (2012). ISSN 2278-5841

    Google Scholar 

  8. A.H. Vinck, Introduction to Public Key Cryptography (Duisburg-Essen, Germany, 2012). Retrieved from http://www.exp-math.uni-essen.de/~vinck/crypto/script-crypto-pdf/add-to-3.pdf. 12 May 2012

  9. J.T.J. Penttinen, 5G Explained: Security and Deployment of Advanced Mobile Communications (Wiley, 2019)

    Google Scholar 

  10. K.S. Mohamed, Cryptography concepts: integrity, authentication, availability, access control, and non-repudiation, in New Frontiers in Cryptography (Springer, Cham, 2020), pp. 41–63

    Google Scholar 

  11. B. Sun, Z. Liu, V. Rijmen, R. Li, L. Cheng, Q. Wang, H. Alkhzaimi, C. Li, Links among impossible differential, integral and zero correlation linear cryptanalysis, in Annual Cryptology Conference (Springer, 2015), pp. 95–115

    Google Scholar 

  12. S. Tajik, E. Dietz, S. Frohmann, J.-P. Seifert, D. Nedospasov, C. Helfmeier, C. Boit, H. Dittrich, Physical characterization of arbiter PUFs, in International Workshop on Cryptographic Hardware and Embedded Systems (Springer, 2014), pp. 493–509

    Google Scholar 

  13. C. Li, D. Lin, B. Feng, J. Lü, F. Hao, Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6, 75834–75842 (2018)

    Google Scholar 

  14. X. Chai, Z. Gan, K. Yang, Y. Chen, X. Liu, An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Sig. Process. Image Commun. 52, 6–19 (2017)

    Google Scholar 

  15. Y. Zhang, The image encryption algorithm based on chaos and DNA computing. Multimedia Tools Appl. 77(16), 21589–21615 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khaled Salah Mohamed .

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Mohamed, K.S. (2022). Wireless Communication Systems: Confidentiality. In: Wireless Communications Systems Architecture. Synthesis Lectures on Engineering, Science, and Technology. Springer, Cham. https://doi.org/10.1007/978-3-031-19297-5_3

Download citation

Publish with us

Policies and ethics