128-bit Vectorization on Cha-Cha20 Algorithm for Device-to-Device Communication

Main Article Content

M. Satish Kumar
PVRD Prasada Rao

Abstract

In 5G networks, device to device(D2D) communication is the advanced technology, and it has the major advantages when compared with traditional systems. The coverage area of the system increases by device-to-device transmission which renders with low latency. No doubt, for the upcoming technologies D2D communications is an added advantage but in various views this kind of transmission is still under risk. D2D communication is transferring the information from one device to another device without the involvement of base station. So, the communication is possible with less delay time. Attackers are possible into the D2D communications. To provide the security in communication, encryption algorithms are used. The main theme of the Encryption algorithms is it should execute with less delay time to provide faster communication and in particular CHA-CHA20 offers the secure communication for encrypting the data packets to securing the data. Vectorization on Cha-Cha20 Algorithm provides the security with less delay time compared to AES encryption Algorithm and Cha-Cha20 algorithm. Compared to other encryption algorithms in cryptography, Cha-Cha20 is suited for resource constrained devices.

Article Details

How to Cite
Kumar, M. S. ., & Rao, P. P. . (2022). 128-bit Vectorization on Cha-Cha20 Algorithm for Device-to-Device Communication. International Journal on Recent and Innovation Trends in Computing and Communication, 10(2s), 281–288. https://doi.org/10.17762/ijritcc.v10i2s.5945
Section
Articles

References

M. Agiwal, A. Roy and N. Saxena, “Next Generation 5G Wireless Networks: A Comprehensive Survey”, IEEE Communications Surveys & Tutorials, 2016.; 18(3): 1617-1655

Gandotra P., Jha R.K., and Jain S., “A survey on device-to-device (d2d) communication: Architecture and security issues,” Journal of Network and Computer Applications, 2017; 78: 9 – 29,

D. Ma and G. Tsudik, “Security and Privacy in Emerging Wireless Networks [Invited Paper],” IEEE Wireless Communications, 2010; 17(5): 12–21

Koskela, T., Hakola, S., Chen, T., Lehtomaki, J., “Clustering concept using device to-device communication in cellular system” In: Proceedings of the IEEE Wireless Communications and Networking Conference, 2016.

R. Alkurd, R. M. Shubair, and I. Abualhaol, “Survey on Device to-Device Communications: Challenges and Design Issues,” in Proceedings of the IEEE 12th International New Circuits and Systems Conference (NEWCAS), 2014; 361–364,.

F. Stajano and R. Anderson, “The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks,” in Proceedings of the 7th International Workshop on Security Protocols, 1999; 172–182,.

D. Feng, L. Lu, Y. Yuan-Wu, G. Y. Li, S. Li, and G. Feng, “Device-to Device Communications in Cellular Networks,” IEEE Communications Magazine, 2014; 52(4): 49–55,.

Arash Asadi, Qing Wang and Vincenzo Mancuso, “A Survey on Device-to-Device Communication in Cellular Network”, IEEE Communications Surveys & Tutorials, 2014; 16(4): 1801 - 1819.

Militano, L., “Device-to-Device Communications for 5G Internet of Things.", IOT, EAI, 2015

Asadi, A., Wang, Q., & Mancuso, V. (2014). A Survey on Device-to-Device Communication in Cellular Networks. IEEE Communications Surveys & Tutorials, 16, 1801-1819

Zhang, A., Wang, L., Ye, X., & Lin, X. (2017). Light-Weight and Robust Security-Aware D2DAssist Data Transmission Protocol for Mobile-Health Systems. IEEE Transactions on Information Forensics and Security, 12(3), 662–675

Su, N., Zhang, Y., & Li, M. (2019). Research on Data Encryption Standard Based on AES Algorithm in Internet of Things Environment. 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 2071- 2075.

Santis, F.D., Schauer, A., & Sigl, G. (2017). Cha-Cha20-Poly1305 authenticated encryption for high-speed embedded IoT applications. Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, 692 697.

Fukushima, K., Xu, R., Kiyomoto, S., & Homma, N. (2017). Fault Injection Attack on Salsa20 and Cha-Cha and a Lightweight Countermeasure. 2017 IEEE Trustcom/BigDataSE/ICESS.

Goll, M., & Gueron, S. (2014). Vectorization on Cha-Cha Stream Cipher. 2014 11th International Conference on Information Technology: New Generations.