{"id":"https://openalex.org/W4313549860","doi":"https://doi.org/10.1109/itnac55475.2022.9998367","title":"Architectural Implementation of AES based 5G Security Protocol on FPGA","display_name":"Architectural Implementation of AES based 5G Security Protocol on FPGA","publication_year":2022,"publication_date":"2022-11-30","ids":{"openalex":"https://openalex.org/W4313549860","doi":"https://doi.org/10.1109/itnac55475.2022.9998367"},"language":"en","primary_location":{"id":"doi:10.1109/itnac55475.2022.9998367","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itnac55475.2022.9998367","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057192033","display_name":"Usva Rahim","orcid":null},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Usva Rahim","raw_affiliation_strings":["COMSATS University,Department of Electrical and Computer Engineering,Islamabad,Pakistan","Department of Electrical and Computer Engineering, COMSATS University, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"COMSATS University,Department of Electrical and Computer Engineering,Islamabad,Pakistan","institution_ids":["https://openalex.org/I16076960"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, COMSATS University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030955599","display_name":"Muhammad Faisal Siddiqui","orcid":"https://orcid.org/0000-0003-0847-4940"},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Faisal Siddiqui","raw_affiliation_strings":["COMSATS University,Department of Electrical and Computer Engineering,Islamabad,Pakistan","Department of Electrical and Computer Engineering, COMSATS University, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"COMSATS University,Department of Electrical and Computer Engineering,Islamabad,Pakistan","institution_ids":["https://openalex.org/I16076960"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, COMSATS University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054250222","display_name":"Muhammad Awais Javed","orcid":"https://orcid.org/0000-0001-5816-097X"},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Awais Javed","raw_affiliation_strings":["COMSATS University,Department of Electrical and Computer Engineering,Islamabad,Pakistan","Department of Electrical and Computer Engineering, COMSATS University, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"COMSATS University,Department of Electrical and Computer Engineering,Islamabad,Pakistan","institution_ids":["https://openalex.org/I16076960"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, COMSATS University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085570788","display_name":"Nazmus Shaker Nafi","orcid":"https://orcid.org/0000-0001-6244-6073"},"institutions":[{"id":"https://openalex.org/I2801120396","display_name":"Boeing (Australia)","ror":"https://ror.org/0346ase89","country_code":"AU","type":"company","lineage":["https://openalex.org/I1295339012","https://openalex.org/I2801120396"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Nazmus Nafi","raw_affiliation_strings":["Boeing Defense,Australia","Boeing Defense, Australia"],"affiliations":[{"raw_affiliation_string":"Boeing Defense,Australia","institution_ids":["https://openalex.org/I2801120396"]},{"raw_affiliation_string":"Boeing Defense, Australia","institution_ids":["https://openalex.org/I2801120396"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5057192033"],"corresponding_institution_ids":["https://openalex.org/I16076960"],"apc_list":null,"apc_paid":null,"fwci":0.7954,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.77397487,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8154397010803223},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.7617306709289551},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.721893310546875},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5834601521492004},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5409984588623047},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.5402706265449524},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4716742932796478},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.45663267374038696},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.44502708315849304},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2900676131248474},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.18760648369789124},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18571069836616516},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09224730730056763}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8154397010803223},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.7617306709289551},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.721893310546875},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5834601521492004},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5409984588623047},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.5402706265449524},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4716742932796478},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.45663267374038696},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.44502708315849304},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2900676131248474},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.18760648369789124},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18571069836616516},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09224730730056763}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itnac55475.2022.9998367","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itnac55475.2022.9998367","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W591465112","https://openalex.org/W2102550826","https://openalex.org/W2145809545","https://openalex.org/W2149793686","https://openalex.org/W2572399654","https://openalex.org/W2907688180","https://openalex.org/W2970951763","https://openalex.org/W2987190436","https://openalex.org/W3021462936","https://openalex.org/W3037931769","https://openalex.org/W3088416892","https://openalex.org/W3126675331","https://openalex.org/W3136794940","https://openalex.org/W3144186108","https://openalex.org/W3172803077","https://openalex.org/W3180501244","https://openalex.org/W4280607664","https://openalex.org/W6793084540"],"related_works":["https://openalex.org/W2294670702","https://openalex.org/W2913264063","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W2093529019","https://openalex.org/W1982325601","https://openalex.org/W4240432851","https://openalex.org/W154233216","https://openalex.org/W2626486901","https://openalex.org/W1988007309"],"abstract_inverted_index":{"Confidentiality":[0],"and":[1,18,44,65,84,99,111],"integrity":[2],"security":[3,34],"are":[4,22,46,119],"the":[5,54,68,75,89,97,129,132],"key":[6,19],"challenges":[7],"in":[8,25,67],"future":[9],"5G":[10,26,49],"networks.":[11],"To":[12],"encounter":[13],"these":[14,52],"challenges,":[15],"various":[16],"signature":[17],"agreement":[20],"protocols":[21],"being":[23],"implemented":[24,120],"systems":[27],"to":[28,60,94,127],"secure":[29],"high-speed":[30],"mobile-to-mobile":[31],"communication.":[32],"Many":[33],"ciphers":[35],"such":[36,107],"as":[37,108],"SNOW":[38],"3G,":[39],"Advanced":[40],"Encryption":[41],"Standard":[42],"(AES),":[43],"ZUC":[45],"used":[47],"for":[48],"security.":[50],"Among":[51],"protocols,":[53],"AES":[55,76,90],"algorithm":[56,77,91],"has":[57],"been":[58],"shown":[59],"achieve":[61],"higher":[62],"hardware":[63],"efficiency":[64],"throughput":[66,130],"literature.":[69],"In":[70,103],"this":[71],"paper,":[72],"we":[73],"implement":[74],"on":[78,121],"Field":[79],"Programmable":[80],"Gate":[81],"Array":[82],"(FPGA)":[83],"real-time":[85],"performance":[86],"factors":[87],"of":[88,101,131],"were":[92],"exploited":[93],"best":[95],"fit":[96],"needs":[98],"requirements":[100],"5G.":[102],"addition,":[104],"several":[105],"modifications":[106],"partial":[109],"pipelining":[110,113,115],"deep":[112],"(partial":[114],"with":[116],"sub-module":[117],"pipelining)":[118],"Virtex":[122],"6":[123],"FPGA":[124],"ML60S":[125],"board":[126],"improve":[128],"proposed":[133],"design.":[134]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
