Mutual Authentication Technique with Four Entities Implemented by Fuzzy Neural Network in 4-G Mobile Communications

نویسندگان

  • Pijush Kanti Bhattacharjee
  • Rajat Kumar Pal
چکیده

4-G mobile communications system is offering high speed data communications technology having connectivity to all sorts of the networks including 2-G and 3-G mobile networks. Authentication of a mobile subscriber (MS) or a sub network and a main network are an important issue to check and minimize security threats or attacks. An advanced artificial intelligence based mutual authentication technique executed by fuzzy neural network with four entities is proposed. Voice frequency of the salutation or the selective words used by a subscriber like Hello, Good Morning, etc. is taken as first entity. Second entity is chosen as thumb fingerprint matching of the calling subscriber with his / her stored thumb fingerprint. Then third entity is taken as face image matching of the calling subscriber. Fourth entity is granted as probability of the salutation word from subscriber‟s talking habit while initializing a call. These four entities such as probability of particular range of frequencies for the salutation word, the thumb fingerprint matching, the face image matching of the subscriber, using particular salutation or greeting word at the time of starting a call are used with most frequently, more frequently and less frequently by the calling subscriber like uncertainty in Artificial Intelligence. Now different relative grades are assigned to most frequently, more frequently and less frequently used parameters. Fuzzy operations such as intersection and union are computed taking three membership functions at a time out of four membership functions to adopt fuzzy neural network. Thereafter, the optimum or the final fuzzy operations are computed according to the assumed weightages. Lastly, the optimized fuzzy operations are defuzzified by the Composite Maxima method, and the results are tested according to the invented fuzzy neural rule. If the results are satisfactory, the subscriber or the sub network and the network (the switch or the server) are mutually authenticated in 4-G mobile communications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mutual Authentication Technique with Four Entities Using Fuzzy Neural Network in 4-G Mobile Communications

4-G mobile communications system is offering high speed data communications technology having connectivity to all sorts of the networks including 2-G and 3-G mobile networks. Authentication of a mobile subscriber (MS) or a sub network and a main network are an important issue to check and minimize security threats or attacks. An advanced artificial intelligence based mutual authentication syste...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

High Secure And Secret Nested One-Time Mechanism for Quick Validations and Accessing of Data in Mobile Interactions

Many security mechanisms for mobile communications have been introduced in the literature. Among these mechanisms, a simple authentication technique for use in the global mobility network (GLOMONET) is proposed. Specifically, the wireless medium introduces new opportunities for eavesdropping of wireless data communications. Anyone with the appropriate wireless receiver can eavesdrop and this ki...

متن کامل

A Novel Approach for Authentication Technique in Mobile Communications

216 Abstract—Authentication of mobile subscriber is a challenge of future researchers due to increasing security threats and attacks with the enhanced population of wireless traffic. 3G mobile communication system has been developed to speed up the data communication. In general the authentication technique in 2G mobile communication is solely dependent on checking the authenticity of MS (Mobil...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015