Securing peer-to-peer mobile communications using public key cryptography: New security strategy

Mobile phones are considered to be the most common communication devices in history. Recently, mobile phones are not only used for casual greetings but also, sending and receiving important data such as, social security numbers, bank account details and passwords. Public key cryptography is a proven...

Full description

Bibliographic Details
Main Authors: Al-Bakri, S.H., Mat Kiah, M.L., Zaidan, A.A., Zaidan, B.B., Alam, G.M.
Format: Article
Language:English
Published: Academic Journals 2011
Subjects:
Online Access:http://eprints.um.edu.my/4920/1/2011_Securing_peer-to-peer_mobile_communications_using_public_key_cryptography.pdf
_version_ 1825719010245738496
author Al-Bakri, S.H.
Mat Kiah, M.L.
Zaidan, A.A.
Zaidan, B.B.
Alam, G.M.
author_facet Al-Bakri, S.H.
Mat Kiah, M.L.
Zaidan, A.A.
Zaidan, B.B.
Alam, G.M.
author_sort Al-Bakri, S.H.
collection UM
description Mobile phones are considered to be the most common communication devices in history. Recently, mobile phones are not only used for casual greetings but also, sending and receiving important data such as, social security numbers, bank account details and passwords. Public key cryptography is a proven security solution, which can be used to secure the mobile communications. Several researchers have proposed server-based architectures public key cryptography solution to secure the mobile communications. Third party servers were used to check the certificates, authenticating the communicating parties, key distribution, etc. This paper proposes and implements a non-server (that is, P2P), architecture public key cryptography to secure the mobile communications. The proposed implementation of public key cryptography can provide confidentiality, authentication, integrity and non-repudiation security services needed for mobile communication. Compared with server based architecture, non-server based architecture has lower risk and the security has been improved, to avoid many kinds of attacks.
first_indexed 2024-03-06T05:13:06Z
format Article
id um.eprints-4920
institution Universiti Malaya
language English
last_indexed 2024-03-06T05:13:06Z
publishDate 2011
publisher Academic Journals
record_format dspace
spelling um.eprints-49202019-03-20T08:26:22Z http://eprints.um.edu.my/4920/ Securing peer-to-peer mobile communications using public key cryptography: New security strategy Al-Bakri, S.H. Mat Kiah, M.L. Zaidan, A.A. Zaidan, B.B. Alam, G.M. T Technology (General) Mobile phones are considered to be the most common communication devices in history. Recently, mobile phones are not only used for casual greetings but also, sending and receiving important data such as, social security numbers, bank account details and passwords. Public key cryptography is a proven security solution, which can be used to secure the mobile communications. Several researchers have proposed server-based architectures public key cryptography solution to secure the mobile communications. Third party servers were used to check the certificates, authenticating the communicating parties, key distribution, etc. This paper proposes and implements a non-server (that is, P2P), architecture public key cryptography to secure the mobile communications. The proposed implementation of public key cryptography can provide confidentiality, authentication, integrity and non-repudiation security services needed for mobile communication. Compared with server based architecture, non-server based architecture has lower risk and the security has been improved, to avoid many kinds of attacks. Academic Journals 2011 Article PeerReviewed application/pdf en http://eprints.um.edu.my/4920/1/2011_Securing_peer-to-peer_mobile_communications_using_public_key_cryptography.pdf Al-Bakri, S.H. and Mat Kiah, M.L. and Zaidan, A.A. and Zaidan, B.B. and Alam, G.M. (2011) Securing peer-to-peer mobile communications using public key cryptography: New security strategy. International Journal of the Physical Sciences, 6 (4). pp. 930-938. ISSN 1992-1950, DOI https://doi.org/10.5897/IJPS10.680 <https://doi.org/10.5897/IJPS10.680>. http://www.academicjournals.org/ijps/pdf/pdf2011/18Feb/Al-bakri%20et%20al.pdf 10.5897/IJPS10.680
spellingShingle T Technology (General)
Al-Bakri, S.H.
Mat Kiah, M.L.
Zaidan, A.A.
Zaidan, B.B.
Alam, G.M.
Securing peer-to-peer mobile communications using public key cryptography: New security strategy
title Securing peer-to-peer mobile communications using public key cryptography: New security strategy
title_full Securing peer-to-peer mobile communications using public key cryptography: New security strategy
title_fullStr Securing peer-to-peer mobile communications using public key cryptography: New security strategy
title_full_unstemmed Securing peer-to-peer mobile communications using public key cryptography: New security strategy
title_short Securing peer-to-peer mobile communications using public key cryptography: New security strategy
title_sort securing peer to peer mobile communications using public key cryptography new security strategy
topic T Technology (General)
url http://eprints.um.edu.my/4920/1/2011_Securing_peer-to-peer_mobile_communications_using_public_key_cryptography.pdf
work_keys_str_mv AT albakrish securingpeertopeermobilecommunicationsusingpublickeycryptographynewsecuritystrategy
AT matkiahml securingpeertopeermobilecommunicationsusingpublickeycryptographynewsecuritystrategy
AT zaidanaa securingpeertopeermobilecommunicationsusingpublickeycryptographynewsecuritystrategy
AT zaidanbb securingpeertopeermobilecommunicationsusingpublickeycryptographynewsecuritystrategy
AT alamgm securingpeertopeermobilecommunicationsusingpublickeycryptographynewsecuritystrategy