Mobile technology generations and cryptographic algorithms: analysis study

Nowadays, Mobile wireless technologies are becoming more significant and growing rapidly for better features and services. Latest Mobile technologies are expected to provide higher processing power, support high quality multimedia applications, offer reliable wireless connections, faster data tr...

Full description

Bibliographic Details
Main Authors: Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha
Format: Conference or Workshop Item
Language:English
English
Published: The Institute of Electrical and Electronics Engineers, Inc. 2016
Subjects:
Online Access:http://irep.iium.edu.my/50971/
http://irep.iium.edu.my/50971/
http://irep.iium.edu.my/50971/
http://irep.iium.edu.my/50971/1/50971_mobile_technology.pdf
http://irep.iium.edu.my/50971/4/50971_Mobile%20technology%20generations%20and%20cryptographic_Scopus.pdf
Description
Summary:Nowadays, Mobile wireless technologies are becoming more significant and growing rapidly for better features and services. Latest Mobile technologies are expected to provide higher processing power, support high quality multimedia applications, offer reliable wireless connections, faster data transmission rates, and consume less power. At the same time, various mobile generations are susceptible to attack via eavesdropping and information leaking operations. Therefore, some cryptographic algorithms have proposed as confidentiality and integrity algorithms in different mobile generations, in order to prevent or mitigate these harmful operations. This paper provides analysis study of Mobile generations (From Mobile 1G to Mobile 4G) and cryptographic algorithms used in these generations. The study based on some factors like features, services, standards, and techniques which have adopted in these generations.