Content uploaded by Sunil M P
Author content
All content in this area was uploaded by Sunil M P on Jun 01, 2024
Content may be subject to copyright.
Exploring the Use of Pretty Good Privacy (PGP) in
Wireless Network Security
Sunil. MP
- 3, Electronics and Communication
Engineering, Faculty of Engineering and
Technology, JAIN (Deemed-to-be
University),
Bangalore, Karnataka, India
mp.sunil@jainuniversity.ac.in
Mahesh A. Bhandari ,
Department of Information Technology,
Vishwakarma Institute of Information
Technology ,
Pune - INDIA ,
mahesh.bhandari@viit.ac.in
Saket Mishra,
Centre of Interdisciplinary Research in
Business and Technology, Chitkara
University Institute of Engineering and
technology, Chitkara University,
Punjab, India. E-mail Id:
saketmishra84824@gmail.com
Vishal Sharma
Department of Mechanical Engineering,
Vivekananda Global University,
Jaipur, India
vishal_sharma@vgu.ac.in
Srisathirapathy S,
Department of Mechanical
Engineering,Prince Shri Venkateshwara
Padmavathy Engineering College,
Chennai - 127,
S.SRISATHIRAPATHY_mech@psvpec.in
Girija Shankar Sahoo
Maharishi School of Engineering and
Technology, Maharishi University of
Information Technology,
Uttar Pradesh, India
gssahoo07@gmail.com
Abstract— quite properly privacy (PGP) is a protection
protocol utilized by businesses and people to provide
comfortable information communications. It’s far an
extensively identified solution for defensive information
traversing the public net, and is more and more getting used in
the context of wireless networks to defend privacy and
authentication information. This paper explores PGP's
function in shielding the records transmitted over wireless
networks, and discusses its implementation, benefits, and
drawbacks. Topics discussed include authentication strategies,
encryption and decryption methodologies, and the usage of
hardware-degree protection mechanisms. Advantages and
disadvantages of PGP within Wi-Fi community protection are
explored, at the side of various implementation concerns. The
paper concludes with a discussion of the future of PGP in Wi-
Fi network security.
Keywords— Protection, Methodologies, Hardware, Security,
Networks.
I. INTRODUCTION
The advent of Wi-Fi networks delivered comfort up-to-
date users, however it has also triggered a want for
accelerated security measures up-to-date guard cusupupdated
from unauthorized get right of entry up updated[1]. One such
degree is the use of quite suitable privateness (PGP), a sort of
encryption era first advanced by using Phil Zimmermann in
1991. In preferred, PGP encrypts records in order that it can't
be read without a private key and offers authentication of
both the sender and the receiver of the information[2-4]. This
makes it perfect for ensuring confidentiality of exchanged
records, up to date for detecting any unauthorized attempts
updated get right of entry up updated such records[5]. using
PGP in wireless network security isn't always most effective
beneficial in terms of statistics protection, but also in terms
of making sure the network itself has the maximum security
proupdatedcols.on the sender’s up-to-date, PGP guarantees
that statistics is not readable up-to-date all people other than
the supposed recipient[6]. The era uses an “uneven”
encryption set of rules, also referred up updated a “public-
key” set of rules, this means that that the sender and receiver
every have a unique key[7]. The sender’s key's used up-to-
date encrypt the data, and the receiver’s key's used up to date
decrypt it. Via authenticating the sender and the pretty up-to-
date privacy (PGP) is a digital protection program used up-
to-date encrypt and decrypt messages[8]. at the beginning
developed in 1991 by way of Phil Zimmermann, PGP used
robust public-key cry pup to dittography updated shield
information exchanged among cusupupdated, for this reason
helping people up-to-date engage in confidential verbal
exchange[9-11]. PGP is now being used extensively in
wireless network security up-to-date encrypt and authenticate
conversations and records, permitting cusupupdated up to
date have greater control over the statistics they proportion
over the community[12]. In up to date’s global of swiftly-
evolving technology and protection threats, PGP has emerge
as updated an invaluable device updated for protecting data
over Wi-Fi networks[13]. It works via producing a key pair
which is composed of one public key—the important thing
used up to date encrypt information—and one non-public
key—the key used up to date decrypt facts[14]. the private
and non-private keys are one of a kind, that means that most
effective the private key may be used updated decrypt the
information, making it truly not possible for all of us but the
up to date updated up-to-date the data[15]. Further updated
this conventional encryption system, PGP can be augmented
up to date create relaxed storage options for data over Wi-Fi
networks. when carried out updated wireless networks, PGP
lets in for up-to-date authentication, statistics integrity, and
data encryption, giving up to date additional confidence
inside the security in their information across a couple of
networks[16].
xEncryption: PGP provides up to date-up to date-end
encryption for the wireless communique, which
prevents the nodes in transit from being able up
updated view the records. As an end result,
malicious sports along with eavesdropping, packet
hijacking or guy-in-the-middle (MITM) assaults are
averted.
xAuthentication: PGP can be used up-to-date without
difficulty establish a at ease connection among up-
to-date up to date which may be used up-to-date
authenticate them and make sure handiest the
legitimate parties are allowed updated talk in the
network.
xKey control: PGP makes use of a robust key
management machine up to date updated up-to-date
2023 3rd International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON)
K
arnataka, India. Dec 29-31, 2023
979-8-3503-1912-5/23/$31.00 ©2023 IEEE 1
2023 3rd International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON) | 979-8-3503-1912-5/23/$31.00 ©2023 IEEE | DOI: 10.1109/SMARTGENCON60755.2023.10442370
Authorized licensed use limited to: Jain University. Downloaded on March 15,2024 at 05:16:20 UTC from IEEE Xplore. Restrictions apply.
personal keys used for encryption and decryption.
This makes it difficult for attackers up to date bet the
non-public keys up-to-date decrypt information at
some point of conversation
II. RELATED WORKS
Anilkumar, C., et al. [1]Quantum Key Distribution
(QKD) is a relaxed method of conversation in traditional
cryptography the use of quantum mechanics. In QKD, a
sender and receiver alternate facts using photons. The
photons may be despatched over a communication link, and
the receiver can most effective decipher the data by using
understanding the key generated with the aid of the sender.
In this manner, no eavesdropper can advantage access to the
message without knowledge of the key. QKD offers ultra-at
ease communique, as any try to eavesdrop could be
immediately detectable. Madavarapu, J. et al. [2] Put into
effect automated records Encryption: facts encryption is a
powerful tool used to shield EDI records at the same time as
in transit. Table 1: shows the Analysis of techniques toward a
secure email environment.
TABLE I. ANALYSIS OF TECHNIQUES TOWARD A SECURE EMAIL ENVIRONMENT.
Criteria/Technique
Digital Signature
Email Encryption Techniques
Hashing Algorithm
Main Idea
Generate a unique virtual fingerprint for a
person or entity to safeguard information
in digital.
Securing the email environment
involves the encryption of
connections and the encryption of
emails.
Act of encoding such common email addresses
with a cryptographic hashing algorithm.
Authentication
Mechanism
Generated digital certificate based on the
user ID.
The address bar must begin with
https rather than just http.
Provide a secure way to store passwords and
other sensitive information.
Used Algorithm
DSA, RSA
SSL/TLS
MD5 and SHA-1
Used for
Verify the authenticity of an email’s
source.
Ensure that only authorized
individuals can read the message
Provide a secure way to store passwords and
other sensitive information.
Authentication
Performed by a trustworthy certificate
authority
Validated by the certificate
authority.
Trusted by a third-party tool, compare them to
the data received from the source. Great, if they
match. If they do not, there is a problem, and
the email should be dis
regarded or retrieved
from a trusted source directly.
Security
Highly secure
Vulnerable to alteration by
attackers.
Highly secure
Automating the technique enables make sure information
is securely encrypted and transmitted securely. Display and
restriction get entry to EDI documents: To make certain facts
security, corporations need to monitor and restrict access to
EDI files and associated structures. This includes using
authentication and authorization structures. Chandran, G. R.,
et al. [3]A privateers-retaining Framework for comfy Emails
is a framework designed to offer quit-to-cease encryption for
comfy emails. It makes use of a mixture of public-key
cryptography and virtual signatures to offer at ease and
personal communication exchanges. All electronic mail
communications are encrypted in order that handiest the
meant recipient is able to examine the message. Moreover,
the framework additionally prevents malicious actors from
intercepting or changing e-mail contents and attachments.
This guarantees that private emails are saved secure and
secured. Patalbansi, M. V., et al. [4]Packet Cryptography
technique is a statistics security technique used in cellular
cloud computing, which enables relaxed statistics transfers
by means of encrypting statistics even as it's far in transit
among cloud servers and mobile devices. The technique
makes use of cryptography algorithms to encrypt the
statistics with a packet-degree encryption method. Table
2:shows the Inclusion and exclusion criteria.
This permits information to be transmitted over
unreliable networks even as nevertheless last protected from
alteration, interception or unauthorized access. This approach
may even provide anonymity while facts is despatched
throughout public networks along with the net. It affords a
further layer of protection for statistics transfers and enables
prevent information theft and unauthorized get admission to
cloud-based totally facts. Devassy, N. et al. [5]Doctoral
TABLE II. INCLUSION AND EXCLUSION CRITERIA.
Inclusion Criteria Exclusion Criteria
Papers describing cyber security
threats, digital forensics tools in the
email environment.
Papers do not address risks and
digital forensics tools in the email
environment.
Papers published between January
2018 and December 2022
Papers that are not written in
English
Papers published in academic
journals or conference papers.
Papers that are not available online
dissertation, Dublin, countrywide university of Eire is a
scholarly work with the aid of a pupil completing a doctorate
diploma at the national college of Ireland in Dublin. The
dissertation is usually the culminating assignment for a
doctoral student and usually involves studies and writing on
a delegated concern. The dissertation can be on any situation
deemed suitable by the student's doctoral committee and is
normally defended by the pupil before the committee
individuals.
III. PROPOSED MODEL
Quite good privateness (PGP) is an effective technology
that may be used to enhance the safety of wireless networks.
The use of PGP, directors can create an encrypted wireless
community, making it hard for malicious attackers to gain
get admission to the wireless system and the facts. PGP also
provides a manner for users to authenticate different users
the use of public key encryption. The proposed system could
2
Authorized licensed use limited to: Jain University. Downloaded on March 15,2024 at 05:16:20 UTC from IEEE Xplore. Restrictions apply.
involve studies into the different implementations of PGP
and its effectiveness in a selection of Wi-Fi networks. The
system would check out how PGP is used to cozy Wi-Fi
networks, what blessings and downsides it provides, and
what measures ought to be taken to ensure its right use
A. Previous Empirical Studies Associated with the
Analysis of Email
Pretty correct privateness (PGP) is a facts security
protocol that is designed to guard emails and different sorts
of communique with the aid of encrypting them. Wireless
network safety is a critical problem in trendy global, as it's
miles important to protect information while communicating
thru wireless networks. Preceding empirical research have
checked out how PGP can be used to cozy wireless
networks. Studies have proven that PGP is a powerful
solution in helping guard statistics on Wi-Fi networks. Fig
1.Shows the an email system architecture.
As an example, one take a look at found that PGP can
provide a good enough stage of protection while using a Wi-
Fi network. different research have regarded into the
effectiveness of PGP in phrases of its potential to shield
information whilst in transit and have located that PGP is a
success solution for shielding facts on Wi-Fi networks.
Further, previous empirical studies have also regarded into
the usability of PGP on wireless networks. Researchers have
determined that PGP can be easy to install and use on Wi-Fi
networks, despite the fact that there may be a few inherent
complexities in its implementation. Additionally, research
have also noted that PGP might also have a few
shortcomings that need to be addressed with the intention to
ensure superior use of the protocol on Wi-Fi networks.
B. Previous Empirical Studies on Email Systems
Associated with Use Cases
Quite exact privacy (PGP) is a broadly used statistics
encryption device. Its miles usually used to alternate
messages, documents, or different information securely over
the internet or thru Wi-Fi networks. Security professionals
and virtual privacy advocates regularly advocate the use of
PGP for comfy conversation. Preceding empirical studies
have sought to reply how PGP is used in precise use
instances. as an instance, one observe checked out the usage
of PGP in a digital private community (VPN) to permit at
ease communication among parties without a shared
encryption key. Fig 2. Shows the outline of the SMTP and
POP3.
Fig. 1. An email system architecture
Fig. 2. An outline of the SMTP and POP3.
3
Authorized licensed use limited to: Jain University. Downloaded on March 15,2024 at 05:16:20 UTC from IEEE Xplore. Restrictions apply.
A second study explored the use of PGP to shield the
integrity of electronic economic transaction facts despatched
over a Wi-Fi network. Further, a 3rd observe carried out a
survey of network users to assess their evaluations regarding
using PGP to defend their facts from eavesdropping
C. Previous Empirical Studies Associated with Email
Abuse Investigation Scenarios
Pretty correct privacy (PGP) is a public-key encryption
device used to defend the confidentiality of records
transmitted over a wireless community. PGP guarantees that
best the intended recipient is capable of get right of entry to
the data by way of using an aggregate of key pairs and digital
signatures. Preceding empirical research on PGP awareness
on analyzing usability problems, studying the security
advantages of the usage of PGP, exploring privacy threats
related to Wi-Fi networks, and studying ways to reduce the
complexity of PGP implementations. maximum research on
Wi-Fi security have in large part targeting the analysis of
Wi-Fi protocols and standing, consisting of 802.11x and
WEP, in place of looking explicitly on the PGP protocol. Fig
3. SHOWS THE an outline of the IMAP
Fig. 3. An outline of the IMAP.
There has, however, been a few work on expertise the
diverse use cases associated with PGP in wireless security.
For instance, one observe leveraged PGP to analyze the
effect of a malicious consumer using amplification assaults
to pass a WEP network. A separate have a look at evaluated
the person-enjoy of PGP-enabled Wi-Fi networks. It tested
special scenarios to decide how properly users had been able
to authenticate and get entry to assets with PGP-licensed
routers. Moreover, any other study explored the capability of
the use of PGP for secure report change over a Wi-Fi
community. In the end, numerous studies have additionally
focused on exploring methods to lessen the complexity of
IV. RESULTS AND DISCUSSION
PGP is an encryption and authentication technology used
to defend facts and communications over the internet. It’s far
a public key-based totally machine, which means that it
makes use of keys – one public and one personal – to encrypt
records and confirm its authenticity. The public secret's used
to encrypt facts, and the private key is used to decrypt it.PGP
is particularly useful for Wi-Fi community security due to
the fact it's far designed with a layered method. It become
initially designed to guard email messages, however it is able
to also be used to shield other sorts of statistics, as nicely.
PGP offers a cozy tunnel from the consumer to the server,
which prevents eavesdroppers from seeing the statistics
that’s sent. Moreover, PGP can be used to authenticate the
supply of a packet despatched over a wireless community in
order that it may be traced again to its unique source
A. Header Analysis
Header evaluation is the manner of inspecting statistics
that is sent as a part of the packet header so as to advantage
statistics about the packet's starting place, vacation spot, and
other identifying characteristics of the information packet.
Via header analysis, WLAN directors and community safety
personnel can discover probably malicious site visitors.
Using quite properly privateers (PGP) in wireless networks is
an effective manner to protect statistics from eavesdroppers
and hackers. PGP is a form of encryption that uses a key
system to scramble and unscramble facts. Fig 4.shows the
Usability of End-to-End Encryption in E-Mail
Communication
Fig. 4. Usability of End-to-End Encryption in E-Mail Communication
At the same time as information is being transmitted,
PGP ensures that it stays secure by using encrypting the
information the use of a symmetric key. Header evaluation
can be used to pick out PGP-encrypted packets. By reading
the header of a PGP-encrypted packet, and professional can
determine which set of rules is getting used, the period of the
key used for encryption, and different details about the
packet. This may help discover traffic from malicious actors
and enhance the safety of the Wi-Fi network.
B. Wireshark
Quite right privacy (PGP) is a cryptographic system used
to relaxed records communications and shield statistics
integrity. It relies on public-key cryptography and offers
verifiable digital signatures for message authentication. PGP
has been used for email encryption and digital signature
verification for many years and is now used to comfy
network communications. The usage of Wireshark, network
directors can examine site visitors for PGP packets to decide
which of these are getting used and how they are being hired.
Fig 5. Shows the Distribution of the most signification of
business risks in 2021
PGP presents an important layer of protection against
malicious actors seeking to eavesdrop on network
communications or compromise touchy statistics. It could
additionally be used to locate suspicious pastime on
networks along with malware downloads, malicious DNS
requests, or attempts to compromise the integrity of
certificate.
4
Authorized licensed use limited to: Jain University. Downloaded on March 15,2024 at 05:16:20 UTC from IEEE Xplore. Restrictions apply.
Fig. 5. .Distribution of the most signification of business risks in 2021
C. NetworkMiner
Network Miner is a community evaluation device which
can be used to seize and analyze network site visitors. It’s far
a home windows-based device that captures and reconstructs
numerous protocols inclusive of HTTP, FTP, and Telnet. It
additionally reconstructs documents sorts inclusive of
multimedia documents, picture documents, data files, and
lots of others. The device has aid for encryptions which
includes however not constrained to WEP, WPA2, IPSec,
and SSL. Fig 6. Shows the Distribution of companies using
Symantec
Fig. 6. Distribution of companies using Symantec
It additionally helps pretty desirable privacy (PGP) which
can be used to comfy communications between two
computers over a Wi-Fi network. PGP works by encrypting
messages using a public-personal key pair, consequently
preventing eavesdropping. This makes it a top notch device
for securing data being transferred over an unsecured
wireless community.
D. Clustering
Pretty good privateness (PGP) is a type of public-key
cryptography which is used to at ease data and
communications over the net. PGP employs a ramification of
techniques, such as symmetric encryption, public-key
encryption, digital signatures, and digital certificates, to
ensure the safety of information and conversation. one of the
primary approaches it does that is by way of the use of
clustering algorithms to locate malicious activity on a
community. Fig 7. Shows the People affected by telephonic
surveillance (1998-2011).
Clustering algorithms paintings by way of taking massive
numbers of information factors and grouping them together
into “clusters” based on similarity. inside the context of PGP,
the records factors is probably community traffic within the
form of packets. as soon as the clusters are created, they can
be in addition examined to look for anomalies that indicate
malicious pastime. depending on the character of the set of
rules getting used, the statistics factors can be compared to
historic records or traits a good way to perceive suspicious
conduct.
Fig. 7. People affected by telephonic surveillance (1998-2011)
V. CONCLUSION
The realization of this paper is that PGP is an
exceptionally useful device in Wi-Fi community security,
and is regularly critical for providing secure verbal exchange
and confidentiality. PGP has been efficiently applied on both
cellular and desk bound gadgets with exceptional degrees of
capability, providing sturdy encryption protection for Wi-Fi
network communication. it's miles critical to take into
account that PGP security is best as sturdy because the tools
used to put in force it, and the user's level of know-how. To
correctly use PGP it's far vital for the person to emerge as
sufficiently at ease with the software program, in addition to
information the standards of encryption. Normal, PGP is an
exquisite tool for securing records and verbal exchange over
a wireless community, as longer as it’s used correctly
REFERENCES
[1] Anilkumar, C., Gorle, B., & Sowmya, K. (2023). A secure method of
communication in conventional cryptography using quantum key
distribution
[2] Madavarapu, J. (2023). Electronic Data Interchange Analysts
Strategies to Improve Information Security While Using EDI in
Healthcare Organizations (Doctoral dissertation, University of the
Cumberlands).
[3] Chandran, G. R., Nieminen, R., Schneider, T., & Suresh, A. (2023).
PrivMail: A Privacy-Preserving Framework for Secure
Emails. Cryptology ePrint Archive.
[4] Patalbansi, M. V., Jain, J., & Laxmi, G. P. Packet Cryptography
Technique for Data Transit in Mobile Cloud Computing.
[5] Devassy, N. (2023). Research Project Questions (Doctoral
dissertation, Dublin, National College of Ireland).
[6] Logeshwaran, J., Ramkumar, M., Kiruthiga, T., & Sharanpravin, R.
(2022). The role of integrated structured cabling system (ISCS) for
reliable bandwidth optimization in high-speed communication
network. ICTACT Journal on Communication Technology, 13(01),
2635–2639
[7] J.Logeshwaran, & T.Kiruthiga. (2021). A Network Management
Model for Device-To-Device Communication in 5G Networks.
International Journal of Research in Science & Engineering (IJRISE),
1(01), 13–27
[8] J.Logeshwaran, & T.Kiruthiga. (2021). Network Management Model
for Device-To-Device Communication in Ultra Dense Mobile
Networks. International Journal of Research in Science &
Engineering (IJRISE), 1(02), 25–38
[9] Nezhadian, F. (2023). Measuring and characterizing weak RSA keys
across PKI ecosystem (Doctoral dissertation, University of
Saskatchewan).
5
Authorized licensed use limited to: Jain University. Downloaded on March 15,2024 at 05:16:20 UTC from IEEE Xplore. Restrictions apply.
[10] Georgoulias, D., Yaben, R., & Vasilomanolakis, E. (2023). Cheaper
than you thought? A dive into the darkweb market of cyber-crime
products. In 12th International Workshop on Cyber Crime. ACM.
[11] Khan, S., Luo, F., Zhang, Z., Rahim, M. A., Ahmad, M., & Wu, K.
(2022). Survey on issues and recent advances in vehicular public-key
infrastructure (VPKI). IEEE Communications Surveys &
Tutorials, 24(3), 1574-1601.
[12] Rito, P., Almeida, A., Figueiredo, A., Gomes, C., Teixeira, P.,
Rosmaninho, R., ... & de Carvalho, N. B. (2023). Aveiro tech city
living lab: A communication, sensing and computing platform for city
environments. IEEE Internet of Things Journal.
[13] Rani, P., Verma, S., Yadav, S. P., Rai, B. K., Naruka, M. S., &
Kumar, D. (2022). Simulation of the Lightweight Blockchain
Technique Based on Privacy and Security for Healthcare Data for the
Cloud System. International Journal of E-Health and Medical
Communications (IJEHMC), 13(4), 1-15.
[14] Alatawi, M., & Saxena, N. (2022, November). Exploring Encrypted
Keyboards to Defeat Client-Side Scanning in End-to-End Encryption
Systems. In International Conference on Information Security and
Cryptology (pp. 100-123). Cham: Springer Nature Switzerland.
[15] Kanaoka, A. (2023, July). (I Can’t Get No) Satisfaction: On the
Existence of Satisfaction as a Component of Usable Security and
Privacy. In International Conference on Human-Computer
Interaction (pp. 78-89). Cham: Springer Nature Switzerland.
[16] Tiwari, M., Kumar, S., Kumar, B., & Tripathi, R. A. (2023). Wireless
Communication. Booksclinic Publishing.
6
Authorized licensed use limited to: Jain University. Downloaded on March 15,2024 at 05:16:20 UTC from IEEE Xplore. Restrictions apply.