A symmetric neural cryptographic key generation scheme for Iot security

被引:1
|
作者
Sarkar, Arindam [1 ]
机构
[1] Ramakrishna Mission Vidyamandira, Dept Comp Sci & Elect, Howrah 711202, W Bengal, India
关键词
Triple layer vector-valued neural network (TLVVNN); Internet-of-things (IoT); Critical energy infrastructures (CEI); Harris Hawk optimization (HHO); AGREEMENT; PROTOCOL;
D O I
10.1007/s10489-022-03904-7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The use of CMOS technology to generate neural session keys is presented in this research for incorporation with the Internet of Things (IoT) to improve security. Emerging technology advancements in the IoT era have enabled better tactics to exacerbate energy efficiency and security difficulties. Current safety solutions do not effectively address the security of IoT. Regarding IoT integration, a tiny logic area ASIC design of a re-keying enabled Triple Layer Vector-Valued Neural Network (TLVVNN) is presented utilizing CMOS designs with measurements of 65 and 130 nanometers. There hasn't been much study into optimizing the value of neural weights for faster neural synchronization. Harris' Hawks is used in this instance to optimize the neural network's weight vector for faster coordination. Once this process is completed, the synchronized weight becomes the session key. This method offers several advantages, namely (1) production of the session key by mutual neural synchronization over the public channel is one of the advantages of this technology. (2) It facilitates Hawks-based neural weight vector optimization for faster neural synchronization across public channels. (3) As per behavioral modeling, the synchronization duration might be reduced from 1.25 ms to less than 0.7 ms for a 20% weight imbalance in the re-keying phase. (4) Geometric, brute force, and majority attacks are all prohibited. Experiments to validate the suggested method's functionality are carried out, and the results show that the proposed approach outperforms current similar techniques in terms of efficiency.
引用
收藏
页码:9344 / 9367
页数:24
相关论文
共 50 条
  • [1] A symmetric neural cryptographic key generation scheme for Iot security
    Arindam Sarkar
    Applied Intelligence, 2023, 53 : 9344 - 9367
  • [2] Towards A Scalable Symmetric Key Cryptographic Scheme: Performance Evaluation and Security Analysis
    Kholidy, Hisham A.
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [3] A Key Generation Scheme from Sensing Data for IoT Security
    Ye, Xiaokai
    Lv, Tao
    Sun, Xiaohan
    2023 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS, 2023,
  • [4] Classical and Physical Security of Symmetric Key Cryptographic Algorithms
    Baksi, Anubhab
    PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 186 - 187
  • [5] On the round security of symmetric-key cryptographic primitives
    Ramzan, Z
    Reyzin, L
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 376 - 393
  • [6] A Generic Security API for Symmetric Key Management on Cryptographic Devices
    Cortier, Veronique
    Steel, Graham
    COMPUTER SECURITY - ESORICS 2009, PROCEEDINGS, 2009, 5789 : 605 - +
  • [7] A generic security API for symmetric key management on cryptographic devices
    Cortier, Veronique
    Steel, Graham
    INFORMATION AND COMPUTATION, 2014, 238 : 208 - 232
  • [8] Cryptographic Key Generation Scheme from Cancellable Biometrics
    Sarkar, Arpita
    Singh, Binod Kr
    Bhaumik, Ujjayanta
    PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 265 - 272
  • [9] Security in Opportunistic Sensor Network and IoT having Sensors using Light Weight Key Generation and Cryptographic Algorithm
    Arafath, Mohammed Salman
    Khan, Khaleel Ur Rahman
    Sunitha, K. V. N.
    2018 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN ELECTRICAL, ELECTRONICS & COMMUNICATION ENGINEERING (ICRIEECE 2018), 2018, : 3427 - 3433
  • [10] The Novel Cryptographic Key Generation and Distribution Scheme for Smart Grid
    Wang, Zhidong
    Liu, Piao
    Lin, Peixia
    Yang, Zhibin
    Liang, Mei
    Zuo, Hanmu
    2015 5TH INTERNATIONAL CONFERENCE ON ELECTRIC UTILITY DEREGULATION AND RESTRUCTURING AND POWER TECHNOLOGIES (DRPT 2015), 2015, : 873 - 875