Implementation of a novel secured authentication protocol for cyber security applications

被引:0
|
作者
Suresh Kumar, V. [1 ]
Ibrahim Khalaf, Osamah [2 ]
Raman Chandan, Radha [3 ]
Bsoul, Qusay [4 ]
Kant Gupta, Shashi [5 ,6 ]
Zawaideh, Firas [7 ]
Mohammed Alsekait, Deema [8 ]
Salama AbdElminaam, Diaa [9 ,10 ]
机构
[1] Jaya Engn Coll, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] Al Nahrain Univ, Al Nahrain Res Ctr Renewable Energy, Dept Solar, Jadriya, Baghdad, Iraq
[3] Sch Management Sci SMS, Dept Comp Sci, Varanasi 221011, Uttar Pradesh, India
[4] Amman Arab Univ, Coll Comp Sci & Informat, Cybersecur Dept, Amman 11953, Jordan
[5] Eudoxia Res Univ, Dept Comp Sci & Engn, New Castle, DE 19808 USA
[6] Chitkara Univ, Chitkara Univ Inst Engn & Technol, Ctr Res Impact & Outcome, Rajpura 140401, Punjab, India
[7] Jadara Univ, Fac Sci & Informat Technol, Irbid, Jordan
[8] Princess Nourah Bint Abdulrahman Univ, Appl Coll, Dept Comp Sci & Informat Technol, PO Box 84428, Riyadh 11671, Saudi Arabia
[9] Middle East Univ, MEU Res Unit, Amman 11831, Jordan
[10] Jadara Univ, Jadara Res Ctr, Irbid 21110, Jordan
来源
SCIENTIFIC REPORTS | 2024年 / 14卷 / 01期
关键词
Authentication protocol; Attacks; Security; Spiking neural network with fuzzy logic (SNN-FL); Digital Age; Cybersecurity applications;
D O I
10.1038/s41598-024-76306-z
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Robust verification protocols are crucial for maintaining the security and reliability of sensitive information due to the increasing complexity of cyber-attacks. This paper introduces a novel 5G Secure Handover Protocol aimed at addressing security and effectiveness issues encountered in existing systems. The proposed protocol is robust against various attacks, including de-synchronization, replay, man-in-the-middle (MITM), denial of services (DoS), and jamming, ensures perfect forward key secrecy, safeguarding communication confidentiality. The proposed protocol utilizes a combination of spiking neural network and fuzzy logic (SNN-FL) techniques that must choose the goal cell as carefully as possible before initiating the transfer process. By combining fuzzy logic and spiking neural networks to reduce handover latency and thwart several types of cyberattacks, the proposed 5G Secure Handover Protocol improves security. Extensive simulations show its efficacy and emphasize its potential for safe communication in large-scale cybersecurity applications. The paper presents a novel secure authentication protocol that significantly reduces handover delays and improves efficiency. Simulations show its resilience against common security threats, protecting sensitive information and maintaining secure communication channels. The protocol, with low communication expenses, complex spatial, and latency for changeover verification, is ideal for large-scale cybersecurity applications, contributing to the development of secure digital authentication mechanisms.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Design and Implementation of A RFID Security Authentication Protocol
    Zhang, Lei
    Xiao, Zicong
    2013 2ND INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION AND MEASUREMENT, SENSOR NETWORK AND AUTOMATION (IMSNA), 2013, : 102 - 105
  • [2] A novel authentication protocol for wireless access security
    Wan C.
    Hu A.
    Zhang J.
    Journal of Convergence Information Technology, 2010, 5 (08) : 22
  • [3] BSAPM: BlockChain based secured authentication protocol for large scale WSN with FPGA implementation
    Abdussami, Mohammad
    Amin, Ruhul
    Saravanan, P.
    Vollala, Satyanarayana
    COMPUTER COMMUNICATIONS, 2023, 209 : 63 - 77
  • [4] FPGA Implementation of Mutual Authentication Protocol for Medication Security System
    Lin, Wei-Chen
    Huang, Po-Kai
    Pan, Chung-Long
    Huang, Yu-Jung
    JOURNAL OF LOW POWER ELECTRONICS AND APPLICATIONS, 2021, 11 (04)
  • [5] A Novel Authentication and Security Protocol for Wireless Adhoc Networks
    Amin, Umair
    Shah, Munam Ali
    2018 24TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC' 18), 2018, : 567 - 571
  • [6] User authentication by secured graphical password implementation
    Bandyopadhyay, Samir Kumar
    Bhattacharyya, Debnath
    Das, Poulami
    2008 7TH ASIA-PACIFIC SYMPOSIUM ON INFORMATION AND TELECOMMUNICATION TECHNOLOGIES, 2008, : 7 - +
  • [7] A Novel Authentication Protocol with Soundness and High Efficiency for Security Problems
    Li Xuefeng
    Bai Enjian
    Xie Yinghua
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4560 - 4562
  • [8] A Secured MultiParty Computational Protocol to Protect Cyber Space
    Mishra, Durgesh Kumar
    Chandwani, Manohar
    INFORMATION SECURITY JOURNAL, 2010, 19 (04): : 175 - 181
  • [9] Secured Authentication and Signature Routing Protocol for WMN (SASR)
    Rathee, Geetanjali
    Saini, Hemraj
    Ghrera, Satya Prakash
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 2, 2016, 380 : 327 - 336
  • [10] Novel Authentication Mechanisms for Hash Code, CAPTCHA and OTP in Cyber Security Domain
    Devi, R. Kanniga
    Muthukannan, M.
    Babu, S. S. Harish
    Sivadasan, Adith
    Abinivesh, S.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 62 - 68