Usage of Genetic Algorithms in cryptography for mobile devices

被引:0
|
作者
Gelev, Saso [1 ]
Sokolovska, Ana [2 ]
Curcic, Dusica
Sokolovski, Aleksandar [3 ]
机构
[1] Univ Goce Delcev Stip, Fac Elect Engn, Krste Misirkov 10-A,PO 201, Stip 2000, North Macedonia
[2] Ss Cyril & Methodius Univ, Skopje, North Macedonia
[3] Sci Business Intelligence GmbH, Sci Innovat & Dev Dept, Hamburg, Germany
关键词
genetic programming; cryptograp; datasets; neural networks; mobile security; e-payment; (bitcoins);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper attempts to investigate the methods of cryptography and strong authentication for mobile phones (and tablets), by using genetic programming. This is nowadays one of the main challenges having into account the increased number of internet enabled mobile phones and the increased usage of the everyday activities in the scope of mobile e-payments (or bitcoins). The primary objective is to investigate and verify if the usage of modern authentication of mobile users with the use of modern methods of cryptography like: Strong Authentication (HTTS), Mobile Authentication, NFC (NearFeldCommuniucaton), OBC (On-Board Credentials), SMS-OTP (SMS - One Time Password) in combination with genetic programming algorithms (based on real biological reproductive generational models for generational building) will increase the security of the mobile phones and tablets.The main aim is to determine the best combination of cryptography tools and with genetic programming algorithms to achieve increased security over the authentication of the mobile phones users. This will be achieved with testing the cryptographic methods and the proposed genetic programming algorithms, using the NS-3 Network Simulator, Python SciPy Library under BSD / Linux. The results and conclusions of the analyses may serve as a guide for using the improved next generation of internet enabled mobile phones.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] Cryptography: Algorithms and standards
    Desoky, A
    2005 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Vols 1 and 2, 2005, : 924 - 929
  • [42] Cryptography with Streaming Algorithms
    Papakonstantinou, Periklis A.
    Yang, Guang
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 55 - 70
  • [43] Application of genetic algorithms for electronic devices placement
    Felczak, Mariusz
    Wiecek, Boguslaw
    QIRT JOURNAL, 2008, 5 (02): : 195 - 209
  • [44] Modeling Microwave Devices Using Genetic Algorithms
    Souza, S. R. O.
    de Melo, M. T.
    de Oliveira, M. R. T.
    Barbin, S. E.
    2014 INTERNATIONAL CONFERENCE ON ELECTROMAGNETICS IN ADVANCED APPLICATIONS (ICEAA), 2014, : 345 - 348
  • [45] PEARL: A PErformance evaluAtor of cRyptographic aLgorithms for mobile devices
    Filho, B
    Viana, W
    Andrade, R
    Monteiro, AJ
    MOBILITY AWARE TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2004, 3284 : 275 - 284
  • [46] Energy Characterization of Data Mining Algorithms on Mobile Devices
    Comito, Carmela
    Talia, Domenico
    ENERGY EFFICIENCY IN LARGE SCALE DISTRIBUTED SYSTEMS, EE-LSDS 2013, 2013, 8046 : 98 - 113
  • [47] Algorithms for Automatic Generation of Logical Questions on Mobile Devices
    Wang, Kun
    Li, Tao
    Han, Jungang
    Lei, Yani
    INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SUPPORTED EDUCATION, 2012, 2 : 258 - 263
  • [48] Identification of NAND flash ECC algorithms in mobile devices
    Zhang, Li
    Tan, Yu-an
    Zhang, Qi-kun
    DIGITAL INVESTIGATION, 2012, 9 (01) : 34 - 48
  • [49] Servocontrol of a Mobile Robot by Using Genetic Algorithms
    Tang, Jun
    Watanabe, Keigo
    Kuribayashi, Katsutoshi
    Journal of Robotics and Mechatronics, 1999, 11 (02): : 140 - 147
  • [50] Optimization of path of mobile robot by genetic algorithms
    Vaupotic, B.
    Brezocnik, M.
    Ficko, M.
    Balic, J.
    Annals of DAAAM for 2006 & Proceedings of the 17th International DAAAM Symposium: INTELLIGENT MANUFACTURING & AUTOMATION: FOCUS ON MECHATRONICS AND ROBOTICS, 2006, : 425 - 426