Verified Document

Cellular Phones And Encryption Essay

4G LTE Encryption When cellular phones first came out, the concerns about data loss and theft was not all that high. This was mostly because these devices functioned mostly (if not entirely) as phones with perhaps a camera phone here and there. Nowadays, however, cellular phones are often smartphones and they are literally small computers in terms of the data that they carry and the abilities that they have. Given that and the fact that tablets and other devices have entered the cellular signal fray, it is important to focus on the data security that these data devices have and whether that technology is being used in the way it could or should be and whether improvements are needed. While technology and encryption have come a long way, it is imperative that the envelope is pressed harder and harder every day so as to maintain (or create) privacy and safety for people making use of their technology.

Analysis

The main focus of this brief report will be to describe at least three encryption options that exist when it comes to 4G LTE traffic. While 4G LTE is not going to be the latest and greatest when it comes to cellular traffic, it is the best thing going on right now and any solutions created for 4G LTE can probably be applied to more advanced technologies when they come to pass. As with most things, there are tradeoffs and shortcomings of all technologies. In many to most cases, any gains and upsides to one technology or option are at least partially cancelled out by tradeoffs. Even so, the best overall solution in terms of speed, security and overall vulnerability is the way to go and this report shall explore a few of those options.

One consideration when it comes to cellular technology and the importance of how our devices communicate was laid bare when the earthquake and tsunami rattled Japan simultaneously in recent years. Indeed, people with cellular phones were unable to wield and use them in light of the physical infrastructures relating to cellular phone technology either being damaged or without power due to the storm. Some might wonder aloud what this has to do with encryption. The answer to that question would be the idea that devices should be able to communicate directly with each other even if the prevailing cellular networks are crippled or left in rubble. After all, two laptops or workstations can talk to each other even if the wider Internet is not functional or accessible. Further, these two devices can communicate in a way that...

The idea being put forward by many is that cellular phones and other devices should be able to do the same thing. Just as 4G LTE devices can be standardized and properly equipped in the same way so that they can all access a 4G LTE network, the same thing should apply to the need for these 4G devices to communicate with each other. This concept is not new and is known as device-to-device communication, or D2D for short. Such a technology is fairly new in that it was just coming out in 2014. Even so, the possibilities and benefits of such a system and framework being in place would be immeasurable when it comes to natural disasters like hurricanes, earthquakes, tsunamis and tornados. Simply being able to put out an "I'm OK" message is beyond words when it comes to the calm and benefit that is rendered (Alam, Yang, Rodriguez & Abd-Alhameed, 2014).
The business world and any environment where encrypted data transmission is a must are also things that are easy to find within the 4G realm. One of the stalwart companies that exists out there in terms of data security is RSA. The aforementioned problem with outages due to natural disasters is one of the shortcomings of LTE-A, which is short for LTE-Advance. Another problem that happens is its vulnerability to attacks and breaches by people with ill intentions. However, the solutions offered by RSA and others like them go a long way towards preventing those problems from becoming nightmares. Indeed, RSA and others have proposed or implemented systems that are based on a "novel security scheme." One system that is on the proposed side of the ledger is known as Se4GE. This is short for security system for a 4G environment. This proposed system integrates the information security prowess of RSA and Diffie-Hellman. It is an end-to-end system that uses a cipher-text transfer mechanism and it dynamically changes the encryption keys midstream so as to enforce a strong level of security when it comes to data transmission in a 4G LTE-A system. The system is strong enough that it employs two entirely different encryption/decryption techniques within the same system and for the same computers or smartphones. Early tests that were summarized in 2014 reports on the subject showed that this new Se4GE system was stronger than conventional 4G LTE-A across the board (Huang et al., 2014).

Two more 4G LTE encryption options are covered in an IEEE treatise that was published in mid-2015. Those two options are XOR and Phase Encryption. Indeed, those two methods were being actively compared and contrasted by IEEE. The study starts off by…

Sources used in this document:
References

Alam, M., Yang, D., Rodriguez, J., & Abd-Alhameed, R. (2014). Secure device-to-device

communication in LTE-A. IEEE Communications Magazine, 52(4), 66-73.

Huang, Y., Leu, F., You, I., Sun, Y., & Chu, C. (2014). A secure wireless communication system

integrating RSA, Diffie-Hellman PKDS, intelligent protection-key chains and a Data
Cite this Document:
Copy Bibliography Citation

Related Documents

Ciphering in Gprs Encryption in 3g Packet Data Networks
Words: 6460 Length: 23 Document Type: Thesis

General Packet Radio Services (GPRS) is a service used in the provision of packet radio access for the GSM (for Global System for Mobile Communications) users [1].In regard to the wireless component, the GPRS technology makes a reservation of the radio resources only in instances when there are instances of data to be sent over its infrastructure. This therefore ensures that the radio resources are optimized. The fixed part

VPN S And Wireless Encryption
Words: 1696 Length: 5 Document Type: Research Paper

Wi-Fi Safety The author of this report has been charged with, after having selected, the subject of Wi-Fi vulnerabilities, what to know about them and what to do about them. While using safe and secure Wi-Fi is not always possible, it is usually possible to use one or more means to avoid having data being compromised as it travels through the air. The issues that will be covered in this report

Issue of Cell Phones in Legal Cases
Words: 738 Length: 2 Document Type: Case Study

Riley v. California case, outlining, in particular, the method adopted for investigating the defendant's phone, alternative means of investigation, and an analysis of the practicality/legitimacy of investigating cell phones. The police stopped defendant, Riley, for breaking a traffic rule; the ultimate result of this event was Riley being detained for weapon possession. An official who searched Riley following the arrest got hold of the latter's smartphone. Upon browsing through the

Wireless Broadband Technology
Words: 20344 Length: 50 Document Type: Term Paper

Wireless Broadband Technology Overview of Wireless technology Presently it is quite evident to come across functioning of a sort of wireless technology in the form of mobile phone, a Palm pilot, a smart phone etc. With the inception of fast connectivity in the sphere of commerce it is customary and useful to operate from central locations communicating with the remote branches, conducting conferences in remote places, discussing with every body at every

Bluetooth Technology
Words: 7972 Length: 28 Document Type: Term Paper

BluetoothTM is a low cost, low power, short-range radio technology- originally perceived as cable replacement alternative for the cable / wire connected devices such as mobile phone hand, headsets, and portable computers. The BluetoothTM's goals expanded to include standardized wireless communications between any electrical devices and created a notion of Personal Area Network. The write-up traces history of BluetoothTM starting with its unusual name to formation of Special Interest Group,

Small Computer Systems Proposed Research
Words: 4808 Length: 15 Document Type: Term Paper

According to Paul B. Mckimmy (2003), "The first consideration of wireless technology is bandwidth. 802.11b (one of four existing wireless Ethernet standards) is currently the most available and affordable specification. It allows a maximum of 11 megabits per second (Mbps)" (p. 111); the author adds that wired Ethernet LANs are typically 10 or 100 Mbps. In 1997, when the IEEE 802.11 standard was first ratified, wireless LANs were incompatible and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now