Secure mobile network handover with neural cryptography

被引:0
|
作者
Hu, Dong [1 ]
机构
[1] Zhongshan Torch Polytech, Zhongshan, Peoples R China
关键词
D O I
10.1109/ISCIT.2007.4392205
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile Node in Mobile IPv6 network communicating with Correspond Node could freely roam into different Access Routers. But when a Mobile Node from Previous access router roams into a New Access Router, the Fast Handover protocol will be applied. Attackers could use the combination of Denial of Service with Masquerading to compromise the network. Some papers have discussed the problem and proposed two solutions to the problem. But the two sulutions may be too complicated and with too much CPU consumption. This paper proposes a new solution: introduce neural cryptography into the Fast Handover protocol.
引用
收藏
页码:1231 / 1234
页数:4
相关论文
共 50 条
  • [1] A Secure Routing Cryptography Algorithm In Mobile Ad Hoc Network
    Kim, Do-Moon
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (07): : 121 - 128
  • [2] Secure authorization on WiMAX with neural cryptography
    Hu, Dong
    Wang, YuYan
    [J]. ADVANCING SCIENCE THROUGH COMPUTATION, 2008, : 359 - 361
  • [3] Secure authentication on WiMAX with neural cryptography
    Hu, Dong
    Wang, YuYan
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 366 - 369
  • [4] Secure Handover Protocol for Mobile WiMAX Networks
    Lee, Song-Hee
    Park, Nam-Sup
    Choi, Jin-Young
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (12) : 2875 - 2879
  • [5] A Novel Approach for Anonymous Secure Routing in Mobile Ad Hoc Network Using Cryptography
    Aghaie, Sirvan
    Adibnia, Fazlollah
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (01): : 63 - 71
  • [6] Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography
    Coutinho, Murilo
    Albuquerque, Robson de Oliveira
    Borges, Fabio
    Garcia Villalba, Luis Javier
    Kim, Tai-Hoon
    [J]. SENSORS, 2018, 18 (05)
  • [7] A secure asynchronous handover scheme for network mobility
    Zhao, Lei
    Dong, Qingkuan
    Li, Xiaoping
    Shil, Lei
    [J]. ICIC Express Letters, 2013, 7 (12): : 3355 - 3360
  • [8] NEURAL NETWORK BASED CRYPTOGRAPHY
    Yayik, Apdullah
    Kutlu, Yakup
    [J]. NEURAL NETWORK WORLD, 2014, 24 (02) : 177 - 192
  • [9] Using neural network in cryptography
    Volná, E
    [J]. STATE OF THE ART IN COMPUTATIONAL INTELLIGENCE, 2000, : 262 - 267
  • [10] CRYPTOGRAPHY BASED ON NEURAL NETWORK
    Volna, Eva
    Kotyrba, Martin
    Kocian, Vaclav
    Janosek, Michal
    [J]. PROCEEDINGS 26TH EUROPEAN CONFERENCE ON MODELLING AND SIMULATION ECMS 2012, 2012, : 386 - +