Usage of Genetic Algorithms in cryptography for mobile devices

被引:0
|
作者
Gelev, Saso [1 ]
Sokolovska, Ana [2 ]
Curcic, Dusica
Sokolovski, Aleksandar [3 ]
机构
[1] Univ Goce Delcev Stip, Fac Elect Engn, Krste Misirkov 10-A,PO 201, Stip 2000, North Macedonia
[2] Ss Cyril & Methodius Univ, Skopje, North Macedonia
[3] Sci Business Intelligence GmbH, Sci Innovat & Dev Dept, Hamburg, Germany
来源
2018 23RD INTERNATIONAL SCIENTIFIC-PROFESSIONAL CONFERENCE ON INFORMATION TECHNOLOGY (IT) | 2018年
关键词
genetic programming; cryptograp; datasets; neural networks; mobile security; e-payment; (bitcoins);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper attempts to investigate the methods of cryptography and strong authentication for mobile phones (and tablets), by using genetic programming. This is nowadays one of the main challenges having into account the increased number of internet enabled mobile phones and the increased usage of the everyday activities in the scope of mobile e-payments (or bitcoins). The primary objective is to investigate and verify if the usage of modern authentication of mobile users with the use of modern methods of cryptography like: Strong Authentication (HTTS), Mobile Authentication, NFC (NearFeldCommuniucaton), OBC (On-Board Credentials), SMS-OTP (SMS - One Time Password) in combination with genetic programming algorithms (based on real biological reproductive generational models for generational building) will increase the security of the mobile phones and tablets.The main aim is to determine the best combination of cryptography tools and with genetic programming algorithms to achieve increased security over the authentication of the mobile phones users. This will be achieved with testing the cryptographic methods and the proposed genetic programming algorithms, using the NS-3 Network Simulator, Python SciPy Library under BSD / Linux. The results and conclusions of the analyses may serve as a guide for using the improved next generation of internet enabled mobile phones.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] Usage of Genetic Algorithms for Educational Tests Adaptation
    Prokopyev, Nikolai
    PROCEEDINGS OF 2018 IEEE EAST-WEST DESIGN & TEST SYMPOSIUM (EWDTS 2018), 2018,
  • [22] On the practical usage of genetic algorithms in ecology and evolution
    Hamblin, Steven
    METHODS IN ECOLOGY AND EVOLUTION, 2013, 4 (02): : 184 - 194
  • [23] Public Key Cryptography using Neural Networks and Genetic Algorithms
    Jhajharia, Smita
    Mishra, Swati
    Bali, Siddharth
    2013 SIXTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2013, : 137 - 142
  • [24] Inspection and Characterization of App File Usage in Mobile Devices
    Ji, Cheng
    Pan, Riwei
    Chang, Li-Pin
    Shi, Liang
    Zhu, Zongwei
    Liang, Yu
    Kuo, Tei-Wei
    Xue, Chun Jason
    ACM TRANSACTIONS ON STORAGE, 2020, 16 (04)
  • [25] Stateful Data Usage Control for Android Mobile Devices
    Lazouski, Aliaksandr
    Martinelli, Fabio
    Mori, Paolo
    Saracino, Andrea
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (04) : 345 - 369
  • [26] Stateful Data Usage Control for Android Mobile Devices
    Aliaksandr Lazouski
    Fabio Martinelli
    Paolo Mori
    Andrea Saracino
    International Journal of Information Security, 2017, 16 : 345 - 369
  • [27] An Asymmetric Authentication Protocol for Mobile Devices Using Elliptic Curve Cryptography
    Ganesan, S. Prasanna
    2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 107 - 109
  • [28] Comparison of Face Detection Algorithms on Mobile Devices
    Guo, Yishi
    Wunsche, Burkhard C.
    2020 35TH INTERNATIONAL CONFERENCE ON IMAGE AND VISION COMPUTING NEW ZEALAND (IVCNZ), 2020,
  • [29] Performance Analysis of Encryption Algorithms on Mobile Devices
    Montoya, Alber O. B.
    Munoz, Mario A. G.
    Kofuji, Sergio T.
    2013 47TH INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2013,
  • [30] Energy Consumption of Cryptographic Algorithms in Mobile Devices
    Toldinas, J.
    Damasevicius, R.
    Venckauskas, A.
    Blazauskas, T.
    Ceponis, J.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2014, 20 (05) : 158 - 161