Implementation of a novel secured authentication protocol for cyber security applications

被引:0
|
作者
Suresh Kumar, V. [1 ]
Ibrahim Khalaf, Osamah [2 ]
Raman Chandan, Radha [3 ]
Bsoul, Qusay [4 ]
Kant Gupta, Shashi [5 ,6 ]
Zawaideh, Firas [7 ]
Mohammed Alsekait, Deema [8 ]
Salama AbdElminaam, Diaa [9 ,10 ]
机构
[1] Jaya Engn Coll, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] Al Nahrain Univ, Al Nahrain Res Ctr Renewable Energy, Dept Solar, Jadriya, Baghdad, Iraq
[3] Sch Management Sci SMS, Dept Comp Sci, Varanasi 221011, Uttar Pradesh, India
[4] Amman Arab Univ, Coll Comp Sci & Informat, Cybersecur Dept, Amman 11953, Jordan
[5] Eudoxia Res Univ, Dept Comp Sci & Engn, New Castle, DE 19808 USA
[6] Chitkara Univ, Chitkara Univ Inst Engn & Technol, Ctr Res Impact & Outcome, Rajpura 140401, Punjab, India
[7] Jadara Univ, Fac Sci & Informat Technol, Irbid, Jordan
[8] Princess Nourah Bint Abdulrahman Univ, Appl Coll, Dept Comp Sci & Informat Technol, PO Box 84428, Riyadh 11671, Saudi Arabia
[9] Middle East Univ, MEU Res Unit, Amman 11831, Jordan
[10] Jadara Univ, Jadara Res Ctr, Irbid 21110, Jordan
来源
SCIENTIFIC REPORTS | 2024年 / 14卷 / 01期
关键词
Authentication protocol; Attacks; Security; Spiking neural network with fuzzy logic (SNN-FL); Digital Age; Cybersecurity applications;
D O I
10.1038/s41598-024-76306-z
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Robust verification protocols are crucial for maintaining the security and reliability of sensitive information due to the increasing complexity of cyber-attacks. This paper introduces a novel 5G Secure Handover Protocol aimed at addressing security and effectiveness issues encountered in existing systems. The proposed protocol is robust against various attacks, including de-synchronization, replay, man-in-the-middle (MITM), denial of services (DoS), and jamming, ensures perfect forward key secrecy, safeguarding communication confidentiality. The proposed protocol utilizes a combination of spiking neural network and fuzzy logic (SNN-FL) techniques that must choose the goal cell as carefully as possible before initiating the transfer process. By combining fuzzy logic and spiking neural networks to reduce handover latency and thwart several types of cyberattacks, the proposed 5G Secure Handover Protocol improves security. Extensive simulations show its efficacy and emphasize its potential for safe communication in large-scale cybersecurity applications. The paper presents a novel secure authentication protocol that significantly reduces handover delays and improves efficiency. Simulations show its resilience against common security threats, protecting sensitive information and maintaining secure communication channels. The protocol, with low communication expenses, complex spatial, and latency for changeover verification, is ideal for large-scale cybersecurity applications, contributing to the development of secure digital authentication mechanisms.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] A novel protocol for software authentication
    He R.
    Qin Z.
    Wu S.
    Information Technology Journal, 2010, 9 (02) : 395 - 398
  • [42] New provable security fast authentication protocol
    Zhu, Hui
    Li, Hui
    Pang, Liao-Jun
    Wang, Yu-Min
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2009, 38 (01): : 55 - 58
  • [43] Security Enhancement of the Authentication Protocol for RFID Systems
    Lee, Yung-Cheng
    Kuo, Wen-Chung
    Hsieh, Y. -C
    Chen, T-C
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 521 - +
  • [44] On the Security of an ECC Based RFID Authentication Protocol
    Babaheidarian, Parisa
    Delavar, Mahshid
    Mohajeri, Javad
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 111 - 114
  • [45] An Authentication Protocol Applied to RFID Security Systems
    Gong, Xiaoqing
    Wang, Yi
    Li, Hui
    He, Jian
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 307 - +
  • [46] Security protocol analysis with improved authentication tests
    Li, Xiehua
    Yang, Shutang
    Li, Jianhua
    Zhu, Hongwen
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2006, 3903 : 123 - 133
  • [47] On the security of an enhanced authentication key exchange protocol
    Hwang, MS
    Chang, TY
    Lin, SC
    Tsai, CS
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 160 - 163
  • [48] An improvement of authentication test for security protocol analysis
    Li, Xiangdong
    Wang, Qingxian
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 745 - 748
  • [49] Security protocol design via authentication tests
    Guttman, JD
    15TH IEEE COMPUTER SECURITY FOUNDATION WORKSHOP, PROCEEDINGS, 2002, : 92 - 103
  • [50] A Lightweight Authentication Protocol Scheme for RFID Security
    WEI Guoheng
    ZHANG Huanguo
    Wuhan University Journal of Natural Sciences, 2013, 18 (06) : 504 - 510