A Comparative Analysis of Cryptographic Algorithms for Secure Data Transmission in 5G Networks

Authors

  • Rajesh Kumar University of Delhi
  • Neha Gupta University of Delhi
  • Arun Mehta University of Delhi

DOI:

https://doi.org/10.62951/ijies.v1i2.88

Keywords:

5G networks, cryptographic algorithms, secure data transmission, encryption, network security

Abstract

As 5G networks become more widespread, securing data transmission is increasingly crucial. This paper provides a comparative analysis of cryptographic algorithms in the context of 5G, focusing on security, computational efficiency, and resilience to attacks. The study evaluates the effectiveness of popular encryption algorithms, such as AES, RSA, and ECC, under the unique constraints of 5G. Results demonstrate which algorithms offer the best balance of security and performance, presenting insights that can guide future implementations of secure 5G networks.

References

Ahmad, S., & Sharma, R. (2021). Evaluation of cryptographic algorithms for secure communication in 5G networks. Journal of King Saud University - Computer and Information Sciences. doi:10.1016/j.jksuci.2021.05.003

Ali, M. S., & Khan, S. (2021). A review of cryptographic algorithms for secure 5G communications. Journal of Information Security and Applications, 57, 102667. doi:10.1016/j.jisa.2020.102667

Badran, H., & Harb, M. (2021). Enhanced security framework for 5G networks using cryptographic techniques. Future Generation Computer Systems, 118, 484-496. doi:10.1016/j.future.2021.01.045

Bansal, A., & Choudhury, P. (2021). A comparative study of asymmetric cryptographic algorithms for secure data transmission in 5G networks. Journal of Information Security and Applications, 57, 102601. doi:10.1016/j.jisa.2020.102601

Choudhury, R. S., & Sinha, M. (2020). Security enhancement of 5G networks using elliptic curve cryptography. IEEE Transactions on Network and Service Management, 17(4), 2181-2194. doi:10.1109/TNSM.2020.3011439

Huang, Z., & Gu, Y. (2020). Advanced encryption standard (AES) and its applications in 5G networks. International Journal of Computer Networks & Communications, 12(1), 1-15. doi:10.5121/ijcnc.2020.12101

Kim, K., & Jeon, H. (2021). Lightweight cryptography for 5G IoT devices: A survey. IEEE Internet of Things Journal, 8(11), 8890-8905. doi:10.1109/JIOT.2021.3055284

Kumar, S., & Malhotra, R. (2020). Analyzing performance metrics of cryptographic algorithms for 5G data transmission security. International Journal of Computer Applications, 175(13), 22-29. doi:10.5120/ijca2020920365

Li, X., & Wu, J. (2021). A comprehensive study of cryptographic algorithms in 5G networks: Challenges and solutions. IEEE Wireless Communications, 28(2), 34-41. doi:10.1109/MWC.001.2000542

Mohanty, S. P., & Tripathy, D. (2021). A novel approach for secure data transmission in 5G using cryptographic algorithms. Computers & Security, 111, 102482. doi:10.1016/j.cose.2021.102482

Ranjan, R., & Sinha, R. (2020). Analysis of symmetric cryptographic algorithms for secure communication in 5G networks. International Journal of Computer Applications, 975, 0975-8887. doi:10.5120/ijca2020920135

Sharma, R., & Kumar, A. (2021). Performance analysis of cryptographic algorithms in 5G network architecture. International Journal of Information Security, 20(3), 231-241. doi:10.1007/s10207-020-00510-6

Wang, X., Xu, C., & Chen, W. (2020). Cryptography for 5G communications: A survey. IEEE Communications Surveys & Tutorials, 22(4), 2454-2480. doi:10.1109/COMST.2020.2993297

Xiong, J., Xu, L., & Wang, G. (2020). Comparative study of cryptographic algorithms for secure data communication in 5G networks. Journal of Network and Computer Applications, 166, 102718. doi:10.1016/j.jnca.2020.102718

Zhang, Y., & Chen, Y. (2020). A survey on cryptographic algorithms for secure data transmission in 5G networks. IEEE Access, 8, 56425-56437. doi:10.1109/ACCESS.2020.2986812

Downloads

Published

2024-05-30

How to Cite

Rajesh Kumar, Neha Gupta, & Arun Mehta. (2024). A Comparative Analysis of Cryptographic Algorithms for Secure Data Transmission in 5G Networks. International Journal of Information Engineering and Science, 1(2), 08–12. https://doi.org/10.62951/ijies.v1i2.88

Similar Articles

1 2 3 > >> 

You may also start an advanced similarity search for this article.