Usage of Genetic Algorithms in cryptography for mobile devices

被引:0
|
作者
Gelev, Saso [1 ]
Sokolovska, Ana [2 ]
Curcic, Dusica
Sokolovski, Aleksandar [3 ]
机构
[1] Univ Goce Delcev Stip, Fac Elect Engn, Krste Misirkov 10-A,PO 201, Stip 2000, North Macedonia
[2] Ss Cyril & Methodius Univ, Skopje, North Macedonia
[3] Sci Business Intelligence GmbH, Sci Innovat & Dev Dept, Hamburg, Germany
关键词
genetic programming; cryptograp; datasets; neural networks; mobile security; e-payment; (bitcoins);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper attempts to investigate the methods of cryptography and strong authentication for mobile phones (and tablets), by using genetic programming. This is nowadays one of the main challenges having into account the increased number of internet enabled mobile phones and the increased usage of the everyday activities in the scope of mobile e-payments (or bitcoins). The primary objective is to investigate and verify if the usage of modern authentication of mobile users with the use of modern methods of cryptography like: Strong Authentication (HTTS), Mobile Authentication, NFC (NearFeldCommuniucaton), OBC (On-Board Credentials), SMS-OTP (SMS - One Time Password) in combination with genetic programming algorithms (based on real biological reproductive generational models for generational building) will increase the security of the mobile phones and tablets.The main aim is to determine the best combination of cryptography tools and with genetic programming algorithms to achieve increased security over the authentication of the mobile phones users. This will be achieved with testing the cryptographic methods and the proposed genetic programming algorithms, using the NS-3 Network Simulator, Python SciPy Library under BSD / Linux. The results and conclusions of the analyses may serve as a guide for using the improved next generation of internet enabled mobile phones.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] Practical Issues of Wireless Mobile Devices Usage with Downlink Optimization
    Krejcar, Ondrej
    Janckulik, Dalibor
    Motalova, Leona
    COMMUNICATIONS INFRASTRUCTURE: SYSTEMS AND APPLICATIONS IN EUROPE, 2009, 16 : 294 - +
  • [32] Security Analysis of Authentication Protocol for Mobile Devices Using Hyperelliptic Curve Cryptography
    Kordy, Turki
    Noor, Fazal
    Benrhouma, Oussama
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (10): : 91 - 100
  • [33] IMPACT OF MOBILE DEVICES AND USAGE LOCATION ON PERCEIVED MULTIMEDIA QUALITY
    Catellier, Andrew
    Pinson, Margaret
    Ingram, William
    Webster, Arthur
    2012 FOURTH INTERNATIONAL WORKSHOP ON QUALITY OF MULTIMEDIA EXPERIENCE (QOMEX), 2012, : 39 - 44
  • [34] Leveraging Battery Usage from Mobile Devices for Active Authentication
    Spooren, Jan
    Preuveneers, Davy
    Joosen, Wouter
    MOBILE INFORMATION SYSTEMS, 2017, 2017
  • [35] Mobile devices usage in retail settings: gender and generation preferences
    Cavalinhos, Silvia
    Salgueiro, Maria de Fatima
    Marques, Susana Henriques
    INTERNATIONAL JOURNAL OF RETAIL & DISTRIBUTION MANAGEMENT, 2023, 51 (13) : 64 - 80
  • [36] Mobile Devices in the Classroom: Emirati Students' Perceptions of Usage and Policies
    Santos, Ieda M.
    Bocheco, Otavio
    2014 INTERNATIONAL CONFERENCE ON INTERACTIVE COLLABORATIVE LEARNING (ICL), 2014, : 956 - 962
  • [37] Benchmarking Resource Usage for Spectrum Sensing on Commodity Mobile Devices
    Chakraborty, Ayon
    Gupta, Udit
    Das, Samir R.
    PROCEEDINGS OF THE 3RD WORKSHOP ON HOT TOPICS IN WIRELESS (HOTWIRELESS '16), 2016, : 7 - 11
  • [38] Usage Frequency and User-Friendliness of Mobile Devices in Assembly
    Vernim, Susanne
    Reinhart, Gunther
    FACTORIES OF THE FUTURE IN THE DIGITAL ENVIRONMENT, 2016, 57 : 510 - 515
  • [39] Mantis: Efficient Predictions of Execution Time, Energy Usage, Memory Usage and Network Usage on Smart Mobile Devices
    Kwon, Yongin
    Lee, Sangmin
    Yi, Hayoon
    Kwon, Donghyun
    Yang, Seungjun
    Chun, Byung-gon
    Huang, Ling
    Maniatis, Petros
    Naik, Mayur
    Paek, Yunheung
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2015, 14 (10) : 2059 - 2072
  • [40] From algorithms to cryptography
    Luccio, F
    Pagli, L
    LATIN 2002: THEORETICAL INFORMATICS, 2002, 2286 : 15 - 15