Title
Analyzing The Security Techniques Used In Lte Advanced And Their Evaluation
Abstract
In this paper we discuss about security which is the main element in the wireless communication. As the generation changes many steps are used to improve the security so in this we discuss many security techniques choose, implement and compare two of them which provide better security to customers in LTE Advanced. LTE Advanced is evolved and advanced version of LTE (Long Term Evolution) which is developed by 3GPP. We implement the security techniques which we can use in LTE Advanced. To secure our data we use security algorithms (KASUMI & TDES) which have two parts encryption and decryption. In encryption process we convert our original data in cipher text by using keys and then transmit this encrypted data to the receiver. And at the receiving end we decrypt the encrypted data with the same keys to recover the original data. KASUMI Algorithm is a block cipher that produces a 64-bit output from 64-bit input under the control of a 128-key and three functions. It has 8 rounds. TDES Algorithm is a block cipher that produces a 64-bit output from a 64-bit input under the control of three keys of 64-bits with a function. It has 16 rounds. We implement these techniques in Matlab for verifying our results, and then we conclude that both algorithms are efficient for security purposes, so that no one can crack our data.
Year
Venue
Keywords
2013
2013 EIGHTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT (ICDIM)
LTE Advanced, Kasumi securitytechnique, Triple DES security Technique
Field
DocType
Citations 
Wireless,Block cipher,Computer science,Cryptography,Computer network,Encryption,Ciphertext,KASUMI,Triple DES,LTE Advanced
Conference
0
PageRank 
References 
Authors
0.34
0
6
Name
Order
Citations
PageRank
Iftikhar Rasheed182.44
Asjad Amin261.53
Mahwish Chaudhary300.34
Sadaf Bukhari400.34
Muhammad Rizwan5339.89
Kashif Ali614716.49