A symmetric neural cryptographic key generation scheme for Iot security

被引:1
|
作者
Sarkar, Arindam [1 ]
机构
[1] Ramakrishna Mission Vidyamandira, Dept Comp Sci & Elect, Howrah 711202, W Bengal, India
关键词
Triple layer vector-valued neural network (TLVVNN); Internet-of-things (IoT); Critical energy infrastructures (CEI); Harris Hawk optimization (HHO); AGREEMENT; PROTOCOL;
D O I
10.1007/s10489-022-03904-7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The use of CMOS technology to generate neural session keys is presented in this research for incorporation with the Internet of Things (IoT) to improve security. Emerging technology advancements in the IoT era have enabled better tactics to exacerbate energy efficiency and security difficulties. Current safety solutions do not effectively address the security of IoT. Regarding IoT integration, a tiny logic area ASIC design of a re-keying enabled Triple Layer Vector-Valued Neural Network (TLVVNN) is presented utilizing CMOS designs with measurements of 65 and 130 nanometers. There hasn't been much study into optimizing the value of neural weights for faster neural synchronization. Harris' Hawks is used in this instance to optimize the neural network's weight vector for faster coordination. Once this process is completed, the synchronized weight becomes the session key. This method offers several advantages, namely (1) production of the session key by mutual neural synchronization over the public channel is one of the advantages of this technology. (2) It facilitates Hawks-based neural weight vector optimization for faster neural synchronization across public channels. (3) As per behavioral modeling, the synchronization duration might be reduced from 1.25 ms to less than 0.7 ms for a 20% weight imbalance in the re-keying phase. (4) Geometric, brute force, and majority attacks are all prohibited. Experiments to validate the suggested method's functionality are carried out, and the results show that the proposed approach outperforms current similar techniques in terms of efficiency.
引用
收藏
页码:9344 / 9367
页数:24
相关论文
共 50 条
  • [31] A Lightweight Cryptographic Scheme with Dynamic Key
    Wu, Yuxin
    Wang, Jing
    2018 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2018, : 232 - 236
  • [32] OTP-Based Symmetric Group Key Establishment Scheme for IoT Networks
    Naskar, Sujash
    Zhang, Tingting
    Hancke, Gerhard
    Gidlund, Mikael
    IECON 2021 - 47TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2021,
  • [33] Performance Analysis of Symmetric Key Cryptographic Algorithms
    Vyakaranal, Shashidhara
    Kengond, Shivaraj
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2018, : 411 - 415
  • [34] Implementation and characterization of flash-based hardware security primitives for cryptographic key generation
    Oh, Mi-Kyung
    Lee, Sangjae
    Kang, Yousung
    Choi, Dooho
    ETRI JOURNAL, 2023, 45 (02) : 346 - 357
  • [35] Evaluation of a Cryptographic Security Scheme for Air Traffic Control's Next Generation Upgrade
    Finke, Cindy
    Butts, Jonathan
    Mills, Robert
    Grimaila, Michael
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY (ICIW-2013), 2013, : 259 - 264
  • [36] On the Security of a Secure and Lightweight Authentication Scheme for Next Generation IoT Infrastructure
    Das, Ashok Kumar
    Bera, Basudeb
    Wazid, Mohammad
    Jamal, Sajjad Shaukat
    Park, Youngho
    IEEE ACCESS, 2021, 9 : 71856 - 71867
  • [37] PhD Forum Abstract: Key Generation Scheme for LPWAN IoT devices
    Gao, Jiayao
    2020 19TH ACM/IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS (IPSN 2020), 2020, : 375 - 376
  • [38] Compliance Evaluation of Cryptographic Security Requirements on IoT Gateways
    Felix, Eduardo F.
    Lins, Fernando A. A.
    Nobrega, Obionor O.
    Gomes, Diego R.
    Jesus, Bruno A.
    Vieira, Marco
    PROCEEDINGS OF 2022 11TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING, LADC 2022, 2022, : 67 - 72
  • [39] Cryptographic key generation from voice
    Monrose, F
    Reiter, MK
    Li, Q
    Wetzel, S
    2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, : 202 - 213
  • [40] A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security
    Mihaljevic, Miodrag J.
    ENTROPY, 2019, 21 (07)