International Journal of
Physical Sciences

  • Abbreviation: Int. J. Phys. Sci.
  • Language: English
  • ISSN: 1992-1950
  • DOI: 10.5897/IJPS
  • Start Year: 2006
  • Published Articles: 2557

Full Length Research Paper

Securing peer-to-peer mobile communications using public key cryptography: New security strategy

Sameer Hasan Al-Bakri1, 4, M. L. Mat Kiah1, 4, A. A. Zaidan2, 4, B. B. Zaidan2,4 and Gazi Mahabubul Alam3*
  1Faculty of Computer Science and Information Technology, University Malaysia, 50603, Kuala Lumpur, Malaysia. 2Faculty of Engineering, Multimedia University, 63100, Selangor Darul Ehsan Cyberjaya, Malaysia. 3 Faculty of Education, University of Malaya, 50603, Kuala Lumpur, Malaysia. 4Network and Communication Security Group, ICT and Computational Science Research Cluster, University of Malaya, 50603 Kuala Lumpur, Malaysia.
Email: [email protected], [email protected]

  •  Accepted: 17 January 2011
  •  Published: 18 February 2011



Mobile phones are considered to be the most common communication devices in history.  Recently, mobile phones are not only used for casual greetings but also, sending and receiving important data such as, social security numbers, bank account details and passwords. Public key cryptography is a proven security solution, which can be used to secure the mobile communications. Several researchers have proposed server-based architectures public key cryptography solution to secure the mobile communications. Third party servers were used to check the certificates, authenticating the communicating parties, key distribution, etc. This paper proposes and implements a non-server (that is, P2P), architecture public key cryptography to secure the mobile communications. The proposed implementation of public key cryptography can provide confidentiality, authentication, integrity and non-repudiation security services needed for mobile communication. Compared with server based architecture, non-server based architecture has lower risk and the security has been improved, to avoid many kinds of attacks.


Key words: Public key cryptography, NTRU, peer to peer, confidentiality, authentication, integrity and non-repudiation, mobile communication security.