A symmetric neural cryptographic key generation scheme for Iot security

被引:0
|
作者
Arindam Sarkar
机构
[1] Ramakrishna Mission Vidyamandira,Department of Computer Science and Electronics
来源
Applied Intelligence | 2023年 / 53卷
关键词
Triple layer vector-valued neural network (TLVVNN); Internet-of-things (IoT); Critical energy infrastructures (CEI); Harris Hawk optimization (HHO);
D O I
暂无
中图分类号
学科分类号
摘要
The use of CMOS technology to generate neural session keys is presented in this research for incorporation with the Internet of Things (IoT) to improve security. Emerging technology advancements in the IoT era have enabled better tactics to exacerbate energy efficiency and security difficulties. Current safety solutions do not effectively address the security of IoT. Regarding IoT integration, a tiny logic area ASIC design of a re-keying enabled Triple Layer Vector-Valued Neural Network (TLVVNN) is presented utilizing CMOS designs with measurements of 65 and 130 nanometers. There hasn’t been much study into optimizing the value of neural weights for faster neural synchronization. Harris’ Hawks is used in this instance to optimize the neural network’s weight vector for faster coordination. Once this process is completed, the synchronized weight becomes the session key. This method offers several advantages, namely (1) production of the session key by mutual neural synchronization over the public channel is one of the advantages of this technology. (2) It facilitates Hawks-based neural weight vector optimization for faster neural synchronization across public channels. (3) As per behavioral modeling, the synchronization duration might be reduced from 1.25 ms to less than 0.7 ms for a 20% weight imbalance in the re-keying phase. (4) Geometric, brute force, and majority attacks are all prohibited. Experiments to validate the suggested method’s functionality are carried out, and the results show that the proposed approach outperforms current similar techniques in terms of efficiency.
引用
收藏
页码:9344 / 9367
页数:23
相关论文
共 50 条
  • [1] A symmetric neural cryptographic key generation scheme for Iot security
    Sarkar, Arindam
    APPLIED INTELLIGENCE, 2023, 53 (08) : 9344 - 9367
  • [2] On the Security of a Secure and Lightweight Authentication Scheme for Next Generation IoT Infrastructure
    Das, Ashok Kumar
    Bera, Basudeb
    Wazid, Mohammad
    Jamal, Sajjad Shaukat
    Park, Youngho
    IEEE ACCESS, 2021, 9 : 71856 - 71867
  • [3] ReOPUF: Relaxation Oscillator Physical Unclonable Function for Reliable Key Generation in IoT Security
    Podeti, Raveendra
    Patri, Srihari Rao
    Katkoori, Srinivas
    Pullakandam, Muralidhar
    INTERNET OF THINGS: TECHNOLOGY AND APPLICATIONS, 2022, 641 : 163 - 179
  • [4] Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT
    Suomalainen, Jani
    Kotelba, Adrian
    Kreku, Jari
    Lehtonen, Sami
    CRYPTOGRAPHY, 2018, 2 (01) : 1 - 20
  • [5] A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application
    Eltayieb, Nabeil
    Elhabob, Rashad
    Liao, Yongjian
    Li, Fagen
    Zhou, Shijie
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83
  • [6] Privacy and Security: Key Requirements for Sustainable IoT Growth
    Assaderaghi, Fari
    Chindalore, Gowri
    Ibrahim, Brima
    de Jong, Hans
    Joye, Marc
    Nassar, Sami
    Steinbauer, Wolfgang
    Wagner, Mathias
    Wille, Thomas
    2017 SYMPOSIUM ON VLSI TECHNOLOGY, 2017, : T8 - T13
  • [7] Analysis of the NTRU Post-Quantum Cryptographic Scheme in Constrained IoT Edge Devices
    Senor, Jaime
    Portilla, Jorge
    Mujica, Gabriel
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (19) : 18778 - 18790
  • [8] A Lightweight Key Generation Scheme for the Internet of Things
    Guo, Dengke
    Cao, Kuo
    Xiong, Jun
    Ma, Dongtang
    Zhao, Haitao
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (15) : 12137 - 12149
  • [9] Security Analysis of a User Authentication Scheme for IoT-Based Healthcare
    Wang, Shengbao
    Zhou, Xin
    Wen, Kang
    Weng, Bosen
    Zeng, Peng
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (07) : 6527 - 6530
  • [10] Resource Management and Security Scheme of ICPSs and IoT Based on VNE Algorithm
    Zhang, Peiying
    Wang, Chao
    Jiang, Chunxiao
    Kumar, Neeraj
    Lu, Qinghua
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (22) : 22071 - 22080