2021
DOI: 10.11591/ijeecs.v24.i1.pp357-366
|View full text |Cite
|
Sign up to set email alerts
|

Evolutionary approach to secure mobile telecommunication networks

Abstract: A series of encryption algorithms called A5 is used to secure mobile telephone communications, producing a pseudo-random sequence that will be exclusive OR (XORed) with the data flowing in the air interface in order to secure them. These algorithms are essentially composed of shift registers with linear feedback, controlled generally by a function or with another register in order to favor the randomness character of the keystream generated. Evolutionary algorithms are bioinspired calculation methods, whose pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Additionally, we've saved the model in widely used formats such as joblib (.sav) and pickle (.pkl), making it ready for integration into any Android application. This step is driven by the fact that mobile phones are the most ubiquitous communication devices in history [34], and mobile networks enjoy global coverage and are currently the most widely used network type [35]. Moreover, the vast majority of people now possess a mobile phone equipped with internet or network connectivity [36].…”
Section: Methodsmentioning
confidence: 99%
“…Additionally, we've saved the model in widely used formats such as joblib (.sav) and pickle (.pkl), making it ready for integration into any Android application. This step is driven by the fact that mobile phones are the most ubiquitous communication devices in history [34], and mobile networks enjoy global coverage and are currently the most widely used network type [35]. Moreover, the vast majority of people now possess a mobile phone equipped with internet or network connectivity [36].…”
Section: Methodsmentioning
confidence: 99%
“…The introduction of new spectrum access policy also brings numerous technical challenges for  ISSN: 2302-9285 real-world implementation. Since SC technology aims to operate in the best available spectrum, existing RF hardware must be upgraded with the capability of multi-band operation as mentioned in [8]. Smart software models must relate to the physical RF model with learning capabilities.…”
Section: Introductionmentioning
confidence: 99%
“…Figure 1. Secure communications as a mean of communication with enhanced with enhanced spectrumincluding dynamic access environment components of SC[8] …”
mentioning
confidence: 99%