Securing peer-to-peer mobile communications using public key cryptography: new security strategy
Mobile phones are considered to be the most common communication devices in history. Recently, mobile phones are not only used for casual greetings but also, sending and receiving important data such as, social security numbers, bank account details and passwords. Public key cryptography is a proven...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Academic Journals
2011
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/18715/1/Al-bakri_et_al.pdf http://irep.iium.edu.my/18715/ http://www.academicjournals.org/ijps/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.iium.irep.18715 |
---|---|
record_format |
dspace |
spelling |
my.iium.irep.187152013-07-02T06:33:28Z http://irep.iium.edu.my/18715/ Securing peer-to-peer mobile communications using public key cryptography: new security strategy Al- Bakri, S.H. Mat Kiah, M.L. Zaidan , A. A. Zaidan, B.B. Alam, Gazi Mahabubul T Technology (General) Mobile phones are considered to be the most common communication devices in history. Recently, mobile phones are not only used for casual greetings but also, sending and receiving important data such as, social security numbers, bank account details and passwords. Public key cryptography is a proven security solution, which can be used to secure the mobile communications. Several researchers have proposed server-based architectures public key cryptography solution to secure the mobile communications. Third party servers were used to check the certificates, authenticating the communicating parties, key distribution, etc. This paper proposes and implements a non-server (that is, P2P), architecture public key cryptography to secure the mobile communications. The proposed implementation of public key cryptography can provide confidentiality, authentication, integrity and non-repudiation security services needed for mobile communication. Compared with server based architecture, non-server based architecture has lower risk and the security has been improved, to avoid many kinds of attacks. Academic Journals 2011-02-18 Article REM application/pdf en http://irep.iium.edu.my/18715/1/Al-bakri_et_al.pdf Al- Bakri, S.H. and Mat Kiah, M.L. and Zaidan , A. A. and Zaidan, B.B. and Alam, Gazi Mahabubul (2011) Securing peer-to-peer mobile communications using public key cryptography: new security strategy. International Journal of the Physical Sciences, 6 (4). pp. 930-938. ISSN 1992-1950 http://www.academicjournals.org/ijps/ |
institution |
Universiti Islam Antarabangsa Malaysia |
building |
IIUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
International Islamic University Malaysia |
content_source |
IIUM Repository (IREP) |
url_provider |
http://irep.iium.edu.my/ |
language |
English |
topic |
T Technology (General) |
spellingShingle |
T Technology (General) Al- Bakri, S.H. Mat Kiah, M.L. Zaidan , A. A. Zaidan, B.B. Alam, Gazi Mahabubul Securing peer-to-peer mobile communications using public key cryptography: new security strategy |
description |
Mobile phones are considered to be the most common communication devices in history. Recently, mobile phones are not only used for casual greetings but also, sending and receiving important data such as, social security numbers, bank account details and passwords. Public key cryptography is a proven security solution, which can be used to secure the mobile communications. Several researchers have proposed server-based architectures public key cryptography solution to secure the mobile communications. Third party servers were used to check the certificates, authenticating the
communicating parties, key distribution, etc. This paper proposes and implements a non-server (that is, P2P), architecture public key cryptography to secure the mobile communications. The proposed implementation of public key cryptography can provide confidentiality, authentication, integrity and non-repudiation security services needed for mobile communication. Compared with server based architecture, non-server based architecture has lower risk and the security has been improved, to avoid many kinds of attacks. |
format |
Article |
author |
Al- Bakri, S.H. Mat Kiah, M.L. Zaidan , A. A. Zaidan, B.B. Alam, Gazi Mahabubul |
author_facet |
Al- Bakri, S.H. Mat Kiah, M.L. Zaidan , A. A. Zaidan, B.B. Alam, Gazi Mahabubul |
author_sort |
Al- Bakri, S.H. |
title |
Securing peer-to-peer mobile communications using
public key cryptography: new security strategy |
title_short |
Securing peer-to-peer mobile communications using
public key cryptography: new security strategy |
title_full |
Securing peer-to-peer mobile communications using
public key cryptography: new security strategy |
title_fullStr |
Securing peer-to-peer mobile communications using
public key cryptography: new security strategy |
title_full_unstemmed |
Securing peer-to-peer mobile communications using
public key cryptography: new security strategy |
title_sort |
securing peer-to-peer mobile communications using
public key cryptography: new security strategy |
publisher |
Academic Journals |
publishDate |
2011 |
url |
http://irep.iium.edu.my/18715/1/Al-bakri_et_al.pdf http://irep.iium.edu.my/18715/ http://www.academicjournals.org/ijps/ |
_version_ |
1643607507216629760 |
score |
13.211869 |