Manuscript Number : IJSRST15128
Mutual Authentication Technique with Four Entities Implemented by Fuzzy Neural Network in 4-G Mobile Communications
Authors(3) :-Pijush Kanti Bhattacharjee, Sudipta Roy, Rajat Kumar Pal 4-G mobile communications system is offering high speed data communications technology having connectivity to all sorts of the networks including 2-G and 3-G mobile networks. Authentication of a mobile subscriber (MS) or a sub network and a main network are an important issue to check and minimize security threats or attacks. An advanced artificial intelligence based mutual authentication technique executed by fuzzy neural network with four entities is proposed. Voice frequency of the salutation or the selective words used by a subscriber like Hello, Good Morning, etc. is taken as first entity. Second entity is chosen as thumb fingerprint matching of the calling subscriber with his / her stored thumb fingerprint. Then third entity is taken as face image matching of the calling subscriber. Fourth entity is granted as probability of the salutation word from subscriber’s talking habit while initializing a call. These four entities such as probability of particular range of frequencies for the salutation word, the thumb fingerprint matching, the face image matching of the subscriber, using particular salutation or greeting word at the time of starting a call are used with most frequently, more frequently and less frequently by the calling subscriber like uncertainty in Artificial Intelligence. Now different relative grades are assigned to most frequently, more frequently and less frequently used parameters. Fuzzy operations such as intersection and union are computed taking three membership functions at a time out of four membership functions to adopt fuzzy neural network. Thereafter, the optimum or the final fuzzy operations are computed according to the assumed weightages. Lastly, the optimized fuzzy operations are defuzzified by the Composite Maxima method, and the results are tested according to the invented fuzzy neural rule. If the results are satisfactory, the subscriber or the sub network and the network (the switch or the server) are mutually authenticated in 4-G mobile communications.
Pijush Kanti Bhattacharjee Biometric scheme, Face image matching, Fuzzy neural network, Fuzzy operation, Identifier, Mutual authentication, Salutation word, Thumb fingerprint matching. Publication Details
Published in : Volume 1 | Issue 4 | September-October 2015 Article Preview
Department of Information Technology, Triguna Sen School of Technology, Assam University, Silchar, Assam, India.
Sudipta Roy
Department of Computer Science Engineering, Calcutta University, Kolkata, India
Rajat Kumar Pal
Date of Publication : 2015-11-30
License: This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 330-339
Manuscript Number : IJSRST15128
Publisher : Technoscience Academy
Journal URL : https://ijsrst.com/IJSRST15128
Citation Detection and Elimination |
|
| BibTeX | RIS | CSV