Secure mobile network handover with neural cryptography

被引:0
|
作者
Hu, Dong [1 ]
机构
[1] Zhongshan Torch Polytech, Zhongshan, Peoples R China
关键词
D O I
10.1109/ISCIT.2007.4392205
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile Node in Mobile IPv6 network communicating with Correspond Node could freely roam into different Access Routers. But when a Mobile Node from Previous access router roams into a New Access Router, the Fast Handover protocol will be applied. Attackers could use the combination of Denial of Service with Masquerading to compromise the network. Some papers have discussed the problem and proposed two solutions to the problem. But the two sulutions may be too complicated and with too much CPU consumption. This paper proposes a new solution: introduce neural cryptography into the Fast Handover protocol.
引用
收藏
页码:1231 / 1234
页数:4
相关论文
共 50 条
  • [41] Threshold Cryptography & Genetic Algorithm Based Secure Key Exchange for Mobile Hosts
    Sahoo, D.
    Rai, S. Champati
    Pradhan, S.
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1297 - +
  • [42] A Trust Holding Based Secure Seamless Handover in Space Information Network
    Yi, Zhuo
    Du, Xuehui
    Liao, Ying
    Cao, Lifeng
    SPACE INFORMATION NETWORKS (SINC 2016), 2017, 688 : 137 - 150
  • [43] Lightweight and Secure Elliptical Curve Cryptography (ECC) Key Exchange for Mobile Phones
    Dar M.A.
    Askar A.
    Alyahya D.
    Bhat S.A.
    International Journal of Interactive Mobile Technologies, 2021, 15 (23) : 89 - 103
  • [44] A neural-network approach for visual cryptography and authorization
    Yue, TW
    Chiang, SC
    DESIGN AND APPLICATION OF HYBRID INTELLIGENT SYSTEMS, 2003, 104 : 993 - 1002
  • [45] Secure Prediction of Neural Network in the Cloud
    Li, Minghui
    Yan, Yuejing
    Wang, Qian
    Du, Minxin
    Qin, Zhan
    Wang, Cong
    IEEE NETWORK, 2021, 35 (01): : 251 - 257
  • [46] Neural Network Approach to Locating Cryptography in Object Code
    Wright, Jason L.
    Manic, Milos
    2009 IEEE CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION (EFTA 2009), 2009,
  • [47] Handover Strategies in Beacon-Enabled Mobile Sensor Network
    Sthapit, Pranesh
    Pyun, Jae-Young
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [48] Research on neural network-based cryptography applications
    Zhang, Meiyu
    Jiang, Rongrong
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 170 - 174
  • [49] CREMON: Cryptography Embedded on the Convolutional Neural Network Accelerator
    Choi, Yeongjae
    Sim, Jaehyeong
    Kim, Lee-Sup
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2020, 67 (12) : 3337 - 3341
  • [50] A construction of cryptography system based on quantum neural network
    To Tran Anh
    Nam Vu Thanh
    The Dung Luong
    2016 EIGHTH INTERNATIONAL CONFERENCE ON KNOWLEDGE AND SYSTEMS ENGINEERING (KSE), 2016, : 298 - 303