A symmetric neural cryptographic key generation scheme for Iot security

被引:1
|
作者
Sarkar, Arindam [1 ]
机构
[1] Ramakrishna Mission Vidyamandira, Dept Comp Sci & Elect, Howrah 711202, W Bengal, India
关键词
Triple layer vector-valued neural network (TLVVNN); Internet-of-things (IoT); Critical energy infrastructures (CEI); Harris Hawk optimization (HHO); AGREEMENT; PROTOCOL;
D O I
10.1007/s10489-022-03904-7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The use of CMOS technology to generate neural session keys is presented in this research for incorporation with the Internet of Things (IoT) to improve security. Emerging technology advancements in the IoT era have enabled better tactics to exacerbate energy efficiency and security difficulties. Current safety solutions do not effectively address the security of IoT. Regarding IoT integration, a tiny logic area ASIC design of a re-keying enabled Triple Layer Vector-Valued Neural Network (TLVVNN) is presented utilizing CMOS designs with measurements of 65 and 130 nanometers. There hasn't been much study into optimizing the value of neural weights for faster neural synchronization. Harris' Hawks is used in this instance to optimize the neural network's weight vector for faster coordination. Once this process is completed, the synchronized weight becomes the session key. This method offers several advantages, namely (1) production of the session key by mutual neural synchronization over the public channel is one of the advantages of this technology. (2) It facilitates Hawks-based neural weight vector optimization for faster neural synchronization across public channels. (3) As per behavioral modeling, the synchronization duration might be reduced from 1.25 ms to less than 0.7 ms for a 20% weight imbalance in the re-keying phase. (4) Geometric, brute force, and majority attacks are all prohibited. Experiments to validate the suggested method's functionality are carried out, and the results show that the proposed approach outperforms current similar techniques in terms of efficiency.
引用
下载
收藏
页码:9344 / 9367
页数:24
相关论文
共 50 条
  • [21] ELQI-Key: Symmetric Key Generation Scheme for Internet-of-Things (IoT) Devices Using Wireless Channel Link Quality
    Kuruwatti, Nandini
    Nayana, Y. N.
    Sarole, Nikhita
    Revadigar, Girish
    Javali, Chitra
    2018 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRONICS, COMPUTERS AND COMMUNICATIONS (ICAECC), 2018,
  • [22] Chaos coordinated neural key synchronization for enhancing security of IoT
    Ahmed h. Alahmadi
    Complex & Intelligent Systems, 2022, 8 : 1619 - 1637
  • [23] Chaos coordinated neural key synchronization for enhancing security of IoT
    Alahmadi, Ahmed H.
    COMPLEX & INTELLIGENT SYSTEMS, 2022, 8 (02) : 1619 - 1637
  • [24] A Multi-Factors Security Key Generation Mechanism for IoT
    Leong, Kan Siew
    Chze, Paul Loh Ruen
    Wee, Ang Khoon
    Sim, Elizabeth
    May, Kan Ee
    2017 NINTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2017), 2017, : 1019 - 1021
  • [25] Evaluating Cryptographic Security Requirements in IoT Gateways
    Felix, Eduardo F.
    Lins, Fernando A. A.
    Gomes, Diego R.
    Nobrega, Obionor O.
    Jesus, Bruno A.
    Vieira, Marco
    2023 IEEE 9TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2023,
  • [26] A DYNAMIC CRYPTOGRAPHIC KEY GENERATION AND INFORMATION BROADCASTING SCHEME IN INFORMATION-SYSTEMS
    LIAW, HT
    COMPUTERS & SECURITY, 1994, 13 (07) : 601 - 610
  • [27] A Multivariate Public Key Cryptographic Scheme
    Yuan Feng
    Sun Ying
    Jiang Jijun
    Zhao Shangwei
    Xu Shengwei
    CHINA COMMUNICATIONS, 2014, 11 (12) : 120 - 124
  • [28] A cryptographic key assignment scheme for access control in poset ordered hierarchies with enhanced security
    Giri, Debasis
    Srivastava, Parmeshwary Dayal
    International Journal of Network Security, 2008, 7 (02) : 223 - 234
  • [29] A New Public Key Cryptographic Scheme
    Yuan, Feng
    Ou, Haiwen
    Xu, Shengwei
    SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 1944 - 1947
  • [30] Comments on a cryptographic key assignment scheme
    Tang, Q
    Mitchell, CJ
    COMPUTER STANDARDS & INTERFACES, 2005, 27 (03) : 323 - 326