Implementation of a novel secured authentication protocol for cyber security applications

被引:0
|
作者
Suresh Kumar, V. [1 ]
Ibrahim Khalaf, Osamah [2 ]
Raman Chandan, Radha [3 ]
Bsoul, Qusay [4 ]
Kant Gupta, Shashi [5 ,6 ]
Zawaideh, Firas [7 ]
Mohammed Alsekait, Deema [8 ]
Salama AbdElminaam, Diaa [9 ,10 ]
机构
[1] Jaya Engn Coll, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] Al Nahrain Univ, Al Nahrain Res Ctr Renewable Energy, Dept Solar, Jadriya, Baghdad, Iraq
[3] Sch Management Sci SMS, Dept Comp Sci, Varanasi 221011, Uttar Pradesh, India
[4] Amman Arab Univ, Coll Comp Sci & Informat, Cybersecur Dept, Amman 11953, Jordan
[5] Eudoxia Res Univ, Dept Comp Sci & Engn, New Castle, DE 19808 USA
[6] Chitkara Univ, Chitkara Univ Inst Engn & Technol, Ctr Res Impact & Outcome, Rajpura 140401, Punjab, India
[7] Jadara Univ, Fac Sci & Informat Technol, Irbid, Jordan
[8] Princess Nourah Bint Abdulrahman Univ, Appl Coll, Dept Comp Sci & Informat Technol, PO Box 84428, Riyadh 11671, Saudi Arabia
[9] Middle East Univ, MEU Res Unit, Amman 11831, Jordan
[10] Jadara Univ, Jadara Res Ctr, Irbid 21110, Jordan
来源
SCIENTIFIC REPORTS | 2024年 / 14卷 / 01期
关键词
Authentication protocol; Attacks; Security; Spiking neural network with fuzzy logic (SNN-FL); Digital Age; Cybersecurity applications;
D O I
10.1038/s41598-024-76306-z
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Robust verification protocols are crucial for maintaining the security and reliability of sensitive information due to the increasing complexity of cyber-attacks. This paper introduces a novel 5G Secure Handover Protocol aimed at addressing security and effectiveness issues encountered in existing systems. The proposed protocol is robust against various attacks, including de-synchronization, replay, man-in-the-middle (MITM), denial of services (DoS), and jamming, ensures perfect forward key secrecy, safeguarding communication confidentiality. The proposed protocol utilizes a combination of spiking neural network and fuzzy logic (SNN-FL) techniques that must choose the goal cell as carefully as possible before initiating the transfer process. By combining fuzzy logic and spiking neural networks to reduce handover latency and thwart several types of cyberattacks, the proposed 5G Secure Handover Protocol improves security. Extensive simulations show its efficacy and emphasize its potential for safe communication in large-scale cybersecurity applications. The paper presents a novel secure authentication protocol that significantly reduces handover delays and improves efficiency. Simulations show its resilience against common security threats, protecting sensitive information and maintaining secure communication channels. The protocol, with low communication expenses, complex spatial, and latency for changeover verification, is ideal for large-scale cybersecurity applications, contributing to the development of secure digital authentication mechanisms.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] A Novel Self-certified Security Access Authentication Protocol in the Space Network
    Zhang, ChuanFu
    Wang, XueNing
    Li, BingLong
    Sun, WanZhong
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 635 - 639
  • [32] A Novel Approach to Automatic Security Protocol Analysis Based on Authentication Event Logic
    Xiao Meihua
    Ma Chenglin
    Deng Chunyan
    Zhu Ke
    CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (01) : 187 - 192
  • [33] Security Implementation for Authentication in IoT Environments
    Rattanalerdnusorn, Ekkachan
    Thaenkaew, Phithak
    Vorakulpipat, Chalee
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 678 - 681
  • [34] Global and Secured UAV Authentication System based on Hardware-Security
    Pirker, Dominic
    Fischer, Thomas
    Lesjak, Christian
    Steger, Christian
    2020 8TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILE CLOUD 2020), 2020, : 84 - 89
  • [36] Authentication and Authorization in Cyber-Security Frameworks: a Novel Approach for Securing Digital Service Chains
    Grieco, Giovanni
    Striccoli, Domenico
    Piro, Giuseppe
    Bolla, Raffaele
    Boggia, Gennaro
    Grieco, Luigi Alfredo
    PROCEEDINGS OF THE 2022 IEEE 8TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2022): NETWORK SOFTWARIZATION COMING OF AGE: NEW CHALLENGES AND OPPORTUNITIES, 2022, : 468 - 473
  • [37] Secured Routing in VANETs Using Lightweight Authentication and Key Agreement Protocol
    Sandou, D. Kiruba
    Jothy, N.
    Jayanthi, K.
    2018 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2018,
  • [38] Maille authentication - A novel protocol for distributed authentication
    Fritz, A
    Paris, JF
    SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 309 - 322
  • [39] Lifting Network Protocol Implementation to Precise Format Specification with Security Applications
    Shi, Qingkai
    Shao, Junyang
    Ye, Yapeng
    Zheng, Mingwei
    Zhang, Xiangyu
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1287 - 1301
  • [40] Security analysis and implementation of JUIT-Image Based Authentication system using Kerberos protocol
    Nitin, Del
    Chauhan, Durg Singh
    Sehgal, Vivek Kumar
    Mahanot, Ankit
    Singh, Pallavi
    Ahuja, Sohit
    Shrivastava, Utkarsh
    Rana, Manisha
    Punjabi, Vineet
    Vinay, Shivam
    Sharma, Nakul
    7TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE IN CONJUNCTION WITH 2ND IEEE/ACIS INTERNATIONAL WORKSHOP ON E-ACTIVITY, PROCEEDINGS, 2008, : 575 - +