
ANGLIA RUSKIN UNIVERSITY FACULTY OF SCIENCE AND ENGINEERING A NEW SECURITY SCHEME AND LIGHTWEIGHT ENCRYPTION ALGORITHM FOR VOICE OVER WIRELESS NETWORKS CONNECTIVITY TO INTERNET FIRAS IBRAHIM HAZZAA A Thesis in partial fulfillment of the requirements of Anglia Ruskin University for the degree of a Doctor of Philosophy Submitted: May 2019 2 Acknowledgments I am eternally grateful for the support that numerous people who provided me with exceptional support, encouragement and wisdom who have helped me along the way. First and foremost, I thank my God “Allah” for this achievement. And I am grateful to my first supervisor Dr.Sufian Yousef for his efforts in providing me invaluable suggestions and kindness and continuous support during this work. I am deeply grateful for my supervisory team Dr.Erika Sanchez and Dr.Nada Ali for their intelligent guidance and fervent support. I would also like to thank Prof.Marcian Cirstea the head of computing school at ARU and Dr.Antesar Shabut for their support in Global events and publications. I am deeply grateful to the Ministry of the Higher Education and Scientific Research in Iraq for funding this grant during the whole research period, this work would not be possible without their support. I am also thankful for the support of my family for their unconditional love, understanding and support, my parents, my wife and my kids Hiba and Yazen. They have been an endless source of great assistance, joy, and love to finish my Ph.D. Sincere thanks to my friends, colleagues, and collaborators: Philp, Mohammed Al-Amin, Mohamed Fakheralldeen, Folayo, and many others. Finally, Many thanks for the National Institute of Standard and Technology and for all institutes and organizations that support during the research time. 3 Declaration I declare that this thesis is my own original work, except for references. This thesis has not been submitted, in whole or in part, to any universities, except for the qualification of Doctor of Philosophy (PhD) at Anglia Ruskin University. Firas I. Hazzaa May 2019 4 ANGLIA RUSKIN UNIVERSITY ABSTRACT FACULTY OF SCIENCE AND ENGINEERING DOCTOR OF PHILOSOPHY A NEW SECURITY SCHEME AND LIGHTWEIGHT ENCRYPTION ALGORITHM FOR VOICE OVER WIRELESS NETWORKS CONNECTIVITY TO INTERNET FIRAS HAZZAA MAY 2019 The security system designed for Internet of Things IOT should be able to detect and prevent both internal and external attacks. It should be noted that not all connected devices have enough computational power. That means tasks like encrypting data are going to be impossible and any type of security must be lightweight. The privacy of the information on IOT needs a reliable security system that prevents unauthorized access to private data on the network. Cryptographic mechanisms must be smaller and faster but with no reduction in security level. In this work, a new security system for voice over wireless networks is being developed and tested. New encryption algorithms have been developed to meet the Quality of Service QoS requirements of voice traffic and to be suitable for wireless devices. The goal of the research is to reduce the execution time and Energy consumption of the encryption process and at the same time at least maintain or increase its security level. The proposed scheme uses similar methods used in Advanced Encryption Standard algorithm AES, with some changes and enhancements considering the limitations of the wireless device. The new technique introduces triple key usage in this algorithm, making it difficult to break and is more secure. A range of simulation scenarios are setup; testing data is analyzed to test delay, energy, and security. The test results show significant improvements in new design metrics. Also, the comparison between the new algorithms and the standard one shows a significant amount of time and energy consumption reduction being achieved (approximately 30% - 35%), with a high-level of complexity. The results provide and validate a framework for the implementation of security methods. The proposed algorithm is more suitable for wireless devices with limited resources, and it achieves a considerable trade-off solution (balance) between security and QoS, thus it exhibits its applicability for any wireless networks where the resources are limited. 5 Key Words: lightweight cryptography, secure communication, voice encryption, AES encryption, wireless network security. 6 Contents ABSTRACT ........................................................................................................................................... 5 List of Figures ....................................................................................................................................... 10 List of Tables ........................................................................................................................................ 13 Copyright .............................................................................................................................................. 16 1 Chapter One: Introduction ............................................................................................................ 17 1.1 Introduction: .......................................................................................................................... 17 1.1.1 Brief Overview for Wireless Networks......................................................................... 18 1.1.2 Brief Overview for the Security and Cryptography ...................................................... 19 1.2 Gap in Knowledge ................................................................................................................ 20 1.3 Research Questions ............................................................................................................... 22 1.4 Research Objectives: ............................................................................................................. 23 1.5 Knowledge gap filling Contributions .................................................................................... 24 1.6 Thesis Structure .................................................................................................................... 26 2 Chapter Two: Background & Literature review ........................................................................... 29 2.1 Introduction ........................................................................................................................... 29 2.2 Computer Networks .............................................................................................................. 29 2.2.1 Networks Types and Topology ..................................................................................... 29 2.2.2 Real-Time Traffic in Network ...................................................................................... 32 2.2.3 Power in Wireless Devices ........................................................................................... 35 2.2.4 Networks Security Challenges ...................................................................................... 36 2.3 Cybersecurity ........................................................................................................................ 37 2.3.1 Security Principles ........................................................................................................ 38 2.3.2 Threats and Attacks ....................................................................................................... 39 2.3.3 Security Issues .............................................................................................................. 40 2.3.4 Applications of Encryption in Network Security .......................................................... 41 2.4 Cryptography ........................................................................................................................ 44 2.4.1 Encryption Algorithms .................................................................................................. 45 2.4.2 Encryption in Wireless Devices .................................................................................... 50 2.4.3 Energy Consumption in Encryption and limitation ...................................................... 51 2.4.4 Advanced Encryption Standard (AES) ......................................................................... 53 2.4.5 AES Encryption and Decryption ................................................................................... 58 2.5 Lightweight Cryptography Discussion ................................................................................. 64 2.5.1 Summary & Conclusion toward Thesis Knowledge gap .............................................. 69 7 3 Chapter Three: Research Methodology & Proposed Framework ................................................. 71 3.1 Introduction ........................................................................................................................... 71 3.2 Research Quantitative Methodology ..................................................................................... 71 3.2.1 Justification of the Research Method ............................................................................ 72 3.3 Rationale for Research Approach ......................................................................................... 72 3.4 Research Design .................................................................................................................... 75 3.5 Implementation ....................................................................................................................
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages246 Page
-
File Size-