Abstract

Open networks enable data communication between different types of mobile devices that showcase the need to enforce elevated security measures. Securing sensitive or confidential data in mobile phones is accomplished by implementing a diverse range of cryptographic techniques. While encryption algorithms, such as Rivest–Shamir–Adleman (RSA) may offer secure solutions that are often difficult to compromise, these in turn prerequisite high speed computational resources for effective operation. Elliptical curve cryptography (ECC) is well thought-out standard that offers a workable and feasible methods of encryption/decryption, whilst being applicable to resource constraint devices. This paper implements a novel key exchange mechanism that helps to secure exchange of data between the communicating mobile devices. The study aims to address the limitation of Elliptic Curve Deffie Hellman, which is susceptible to Man-in-the-Middle attack and proposes an enhanced Elliptic Curve Deffie Hellman (ECDH) technique for secure data communication in open networks. The study results reveal, how the implementation of ECDH allows exchange of keys between the two communicating devices with limited resources.

Highlights

  • Smart phones’ processing capabilities are almost leveling up with the currently available desktop computers, and these carry functions that are comparable to functions offered by desktop computers

  • This study focuses on the need of Elliptical Curve Cryptography (ECC) in Android smart phone operating system

  • This research has contributed in preventing the denial of service attacks (DoS) but the base station is vulnerable to number of attacks while the users are registering or doing any other activity through base station

Read more

Summary

Introduction

Smart phones’ processing capabilities are almost leveling up with the currently available desktop computers, and these carry functions that are comparable to functions offered by desktop computers. Used smart phone operating systems–Android and IoS, include the basic and more advanced features targeted to attract a huge customer base, are consistently enriched with new intuitive features in the form of new product release Innovative products as such offer more user centric features in addition to technological changes that improve the major devices functionalities such as processing capabilities, network bandwidth, storage, and I/O functions. Due to open networks being more vulnerable to attacks, these apps pose more security concerns, and must guarantee confidentiality and privacy to users’ data during the communication process [21] [22] Typical scenarios experiencing such ­challenges, include mobile learning environments, as well as mobile performance ­support systems that demand security solutions to improve the security of data exchanges, ­ in Mobile Electronic Performance Support Systems (MEPSS). The ECC based solution, in this context, has been used as a non-instructional solution for mobile communication end users

Problem statement
Study outline
Overview of Android OS
Review of elliptic curve cryptography
Generate public and private keys
Generate shared keys
Encryption
Limitations
Key exchange via Android OS
Proposed enhancement and results
Conclusion
Authors
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call