A symmetric neural cryptographic key generation scheme for Iot security

被引:1
|
作者
Sarkar, Arindam [1 ]
机构
[1] Ramakrishna Mission Vidyamandira, Dept Comp Sci & Elect, Howrah 711202, W Bengal, India
关键词
Triple layer vector-valued neural network (TLVVNN); Internet-of-things (IoT); Critical energy infrastructures (CEI); Harris Hawk optimization (HHO); AGREEMENT; PROTOCOL;
D O I
10.1007/s10489-022-03904-7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The use of CMOS technology to generate neural session keys is presented in this research for incorporation with the Internet of Things (IoT) to improve security. Emerging technology advancements in the IoT era have enabled better tactics to exacerbate energy efficiency and security difficulties. Current safety solutions do not effectively address the security of IoT. Regarding IoT integration, a tiny logic area ASIC design of a re-keying enabled Triple Layer Vector-Valued Neural Network (TLVVNN) is presented utilizing CMOS designs with measurements of 65 and 130 nanometers. There hasn't been much study into optimizing the value of neural weights for faster neural synchronization. Harris' Hawks is used in this instance to optimize the neural network's weight vector for faster coordination. Once this process is completed, the synchronized weight becomes the session key. This method offers several advantages, namely (1) production of the session key by mutual neural synchronization over the public channel is one of the advantages of this technology. (2) It facilitates Hawks-based neural weight vector optimization for faster neural synchronization across public channels. (3) As per behavioral modeling, the synchronization duration might be reduced from 1.25 ms to less than 0.7 ms for a 20% weight imbalance in the re-keying phase. (4) Geometric, brute force, and majority attacks are all prohibited. Experiments to validate the suggested method's functionality are carried out, and the results show that the proposed approach outperforms current similar techniques in terms of efficiency.
引用
收藏
页码:9344 / 9367
页数:24
相关论文
共 50 条
  • [41] ON THE SECURITY OF THE MERKLE-HELLMAN CRYPTOGRAPHIC SCHEME
    SHAMIR, A
    ZIPPEL, RE
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1980, 26 (03) : 339 - 340
  • [42] Random key encryption a new cryptographic scheme
    Shafeeq, Muhammad
    Durrani, Mehr Yahya
    Afzal, Ifraseab
    ICIET 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND EMERGING TECHNOLOGIES, 2007, : 59 - +
  • [43] Cryptographic Extraction and Key Derivation: The HKDF Scheme
    Krawczyk, Hugo
    ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 631 - 648
  • [44] Secured Key Distribution Scheme for Cryptographic Key Management System
    Khaing, Kyawt Kyawt
    Aung, Khin Mi Mi
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 481 - 486
  • [45] Cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme
    Wen, JH
    Sheu, JS
    Chen, TS
    IEE PROCEEDINGS-COMMUNICATIONS, 2001, 148 (04): : 260 - 264
  • [46] SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHM BASED ON LOGARITHMIC FUNCTION
    Nema, Preksha
    Rizvi, M. A.
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 757 - 762
  • [47] Efficient key management methods for symmetric cryptographic algorithm
    Sreehari, K. N.
    2018 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC 2018), 2018, : 377 - 380
  • [48] Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key
    Ghani, Anwar
    Mansoor, Khwaja
    Mehmood, Shahid
    Chaudhry, Shehzad Ashraf
    Rahman, Arif Ur
    Saqib, Malik Najmus
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (16)
  • [49] Deep learning-based biometric cryptographic key generation with post-quantum security
    Kuznetsov, Oleksandr
    Zakharov, Dmytro
    Frontoni, Emanuele
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (19) : 56909 - 56938
  • [50] Iot Data Security Authentication and Key Negotiation Scheme Based on Edge Computing and Blockchain
    Wang, Sheng
    Zhou, Xiangzhen
    Journal of Network Intelligence, 2023, 8 (02): : 364 - 380