Mutual Authentication Technique with Four Entities Using Fuzzy Neural Network in 4-G Mobile Communications
نویسندگان
چکیده
4-G mobile communications system is offering high speed data communications technology having connectivity to all sorts of the networks including 2-G and 3-G mobile networks. Authentication of a mobile subscriber (MS) or a sub network and a main network are an important issue to check and minimize security threats or attacks. An advanced artificial intelligence based mutual authentication system applying fuzzy neural network with four entities is proposed. Voice frequency of the salutation or the selective words used by a subscriber like Hello, Good Morning etc. is taken as first entity. Second entity is chosen as thumb fingerprint matching of the calling subscriber. Then third entity is taken as face image matching of the calling subscriber. Fourth entity is granted as probability of the salutation or the greeting word from subscriber’s talking habit while initializing a call. These four entities such as probability of particular range of frequencies for the salutation word, the thumb fingerprint matching, the face image matching of the subscriber by pixel cluster indexing , using particular salutation or greeting word at the time of starting a call are used with most frequently, more frequently and less frequently by the calling subscriber like uncertainty in Artificial Intelligence (AI). Now different relative grades are assigned for most frequently, more frequently and less frequently used parameters. Fuzzy operations like intersection or minimum and union or maximum are computed taking three membership functions at a time out of four membership functions to adopt fuzzy neural network. Thereafter the optimum or the final fuzzy operations are computed according to the assumed weightages. Lastly the optimized fuzzy operations are defuzzified by Composite Maxima method and the results are tested according to the invented fuzzy neural rule. If the results are satisfactory, the subscriber or the sub network and the network (the switch or the server) are mutually authenticated in 4-G mobile communications.
منابع مشابه
Mutual Authentication Technique with Four Entities Implemented by Fuzzy Neural Network in 4-G Mobile Communications
4-G mobile communications system is offering high speed data communications technology having connectivity to all sorts of the networks including 2-G and 3-G mobile networks. Authentication of a mobile subscriber (MS) or a sub network and a main network are an important issue to check and minimize security threats or attacks. An advanced artificial intelligence based mutual authentication techn...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملHigh Secure And Secret Nested One-Time Mechanism for Quick Validations and Accessing of Data in Mobile Interactions
Many security mechanisms for mobile communications have been introduced in the literature. Among these mechanisms, a simple authentication technique for use in the global mobility network (GLOMONET) is proposed. Specifically, the wireless medium introduces new opportunities for eavesdropping of wireless data communications. Anyone with the appropriate wireless receiver can eavesdrop and this ki...
متن کامل