Usage of Genetic Algorithms in cryptography for mobile devices

被引:0
|
作者
Gelev, Saso [1 ]
Sokolovska, Ana [2 ]
Curcic, Dusica
Sokolovski, Aleksandar [3 ]
机构
[1] Univ Goce Delcev Stip, Fac Elect Engn, Krste Misirkov 10-A,PO 201, Stip 2000, North Macedonia
[2] Ss Cyril & Methodius Univ, Skopje, North Macedonia
[3] Sci Business Intelligence GmbH, Sci Innovat & Dev Dept, Hamburg, Germany
关键词
genetic programming; cryptograp; datasets; neural networks; mobile security; e-payment; (bitcoins);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper attempts to investigate the methods of cryptography and strong authentication for mobile phones (and tablets), by using genetic programming. This is nowadays one of the main challenges having into account the increased number of internet enabled mobile phones and the increased usage of the everyday activities in the scope of mobile e-payments (or bitcoins). The primary objective is to investigate and verify if the usage of modern authentication of mobile users with the use of modern methods of cryptography like: Strong Authentication (HTTS), Mobile Authentication, NFC (NearFeldCommuniucaton), OBC (On-Board Credentials), SMS-OTP (SMS - One Time Password) in combination with genetic programming algorithms (based on real biological reproductive generational models for generational building) will increase the security of the mobile phones and tablets.The main aim is to determine the best combination of cryptography tools and with genetic programming algorithms to achieve increased security over the authentication of the mobile phones users. This will be achieved with testing the cryptographic methods and the proposed genetic programming algorithms, using the NS-3 Network Simulator, Python SciPy Library under BSD / Linux. The results and conclusions of the analyses may serve as a guide for using the improved next generation of internet enabled mobile phones.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] A Study on the Power Consumption of Using Cryptography Algorithms in Mobile Devices
    Wu, Jiehong
    Detchenkov, Ilia
    Cao, Yang
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 957 - 959
  • [2] Usage Analysis of Mobile Devices
    Singh, Aman Kr.
    Prajapati, Ashish Kr.
    Kumar, Vikash
    Mishra, Subhankar
    5TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT, ITQM 2017, 2017, 122 : 657 - 662
  • [3] ICIGA: Improved cryptography inspired by genetic algorithms
    Tragha, A.
    Omary, F.
    Mouloudi, A.
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 335 - +
  • [4] Energy Efficient Lightweight Cryptography Algorithms for IoT Devices
    Goyal, Tarun Kumar
    Sahula, Vineet
    Kumawat, Deepak
    IETE JOURNAL OF RESEARCH, 2022, 68 (03) : 1722 - 1735
  • [5] The mobile devices and its mobile learning usage analysis
    Jacob, S. M.
    Issac, B.
    IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 782 - 787
  • [6] Usage Optimization of Mobile Devices Resources in Mobile Web
    Ilijoski, Nebojsha
    Trajkovik, Vladimir
    ADVANCES IN INTERNET, DATA & WEB TECHNOLOGIES, 2018, 17 : 315 - 325
  • [7] Understanding Usage States on Mobile Devices
    Jesdabodi, Chakajkla
    Maalej, Walid
    PROCEEDINGS OF THE 2015 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING (UBICOMP 2015), 2015, : 1221 - 1225
  • [8] Analysis of Cryptography Algorithms Implemented in Android Mobile Application
    Salkanovic, Alen
    Ljubic, Sandi
    Stankovic, Ljubisa
    Lerga, Jonatan
    INFORMATION TECHNOLOGY AND CONTROL, 2021, 50 (04): : 786 - 807
  • [9] New usage of SOM for genetic algorithms
    Kim, JH
    Moon, BR
    GENETIC AND EVOLUTIONARY COMPUTATION - GECCO 2003, PT I, PROCEEDINGS, 2003, 2723 : 1101 - 1111
  • [10] Parallel algorithms development for programmable devices with application from cryptography
    Damaj, Issam W.
    INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING, 2007, 35 (06) : 529 - 572