A symmetric neural cryptographic key generation scheme for Iot security

被引:0
|
作者
Arindam Sarkar
机构
[1] Ramakrishna Mission Vidyamandira,Department of Computer Science and Electronics
来源
Applied Intelligence | 2023年 / 53卷
关键词
Triple layer vector-valued neural network (TLVVNN); Internet-of-things (IoT); Critical energy infrastructures (CEI); Harris Hawk optimization (HHO);
D O I
暂无
中图分类号
学科分类号
摘要
The use of CMOS technology to generate neural session keys is presented in this research for incorporation with the Internet of Things (IoT) to improve security. Emerging technology advancements in the IoT era have enabled better tactics to exacerbate energy efficiency and security difficulties. Current safety solutions do not effectively address the security of IoT. Regarding IoT integration, a tiny logic area ASIC design of a re-keying enabled Triple Layer Vector-Valued Neural Network (TLVVNN) is presented utilizing CMOS designs with measurements of 65 and 130 nanometers. There hasn’t been much study into optimizing the value of neural weights for faster neural synchronization. Harris’ Hawks is used in this instance to optimize the neural network’s weight vector for faster coordination. Once this process is completed, the synchronized weight becomes the session key. This method offers several advantages, namely (1) production of the session key by mutual neural synchronization over the public channel is one of the advantages of this technology. (2) It facilitates Hawks-based neural weight vector optimization for faster neural synchronization across public channels. (3) As per behavioral modeling, the synchronization duration might be reduced from 1.25 ms to less than 0.7 ms for a 20% weight imbalance in the re-keying phase. (4) Geometric, brute force, and majority attacks are all prohibited. Experiments to validate the suggested method’s functionality are carried out, and the results show that the proposed approach outperforms current similar techniques in terms of efficiency.
引用
收藏
页码:9344 / 9367
页数:23
相关论文
共 50 条
  • [21] A robust and efficient vector-based key management scheme for IoT networks
    Bettayeb, Sami
    Messai, Mohamed-Lamine
    Hemam, Sofiane Mounine
    AD HOC NETWORKS, 2023, 149
  • [22] Recryptor: A Reconfigurable Cryptographic Cortex-MO Processor With In-Memory and Near-Memory Computing for IoT Security
    Zhang, Yiqun
    Xu, Li
    Dong, Qing
    Wang, Jingcheng
    Blaauw, David
    Sylvester, Dennis
    IEEE JOURNAL OF SOLID-STATE CIRCUITS, 2018, 53 (04) : 995 - 1005
  • [23] An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy
    Shamshad, Shuhab
    Riaz, Farina
    Riaz, Rabia
    Rizvi, Sanam Shahla
    Abdulla, Shahab
    SENSORS, 2022, 22 (21)
  • [24] Energy-efficient dynamic homomorphic security scheme for fog computing in IoT networks
    Gupta, Sejal
    Garg, Ritu
    Gupta, Nitin
    Alnumay, Waleed S.
    Ghosh, Uttam
    Sharma, Pradip Kumar
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [25] Unconventional Security for IoT: Hardware and Software Implementation of a Digital Chaotic Encrypted Communication Scheme
    Karagiorgos, Nikolaos F.
    Stavrinides, Stavros G.
    de Benito, Carol
    Nikolaidis, Spyridon
    Picos, Rodrigo
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (11): : 19914 - 19925
  • [26] Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
    Challa, Sravani
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumar, Neeraj
    Reddy, Alavalapati Goutham
    Yoon, Eun-Jun
    Yoo, Kee-Young
    IEEE ACCESS, 2017, 5 : 3028 - 3043
  • [27] Anonymous mutual IoT interdevice authentication and key agreement scheme based on the ZigBee technique
    Alshahrani, Mohammed
    Traore, Issa
    Woungang, Isaac
    INTERNET OF THINGS, 2019, 7
  • [28] A Channel Magnitude Based Key Generation Scheme for Static and Dynamic Environments
    Usman, Muhammad
    Althunibat, Saud
    Qaraqe, Marwa
    2021 IEEE 26TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2021,
  • [29] Age-of-Information-Oriented Security Transmission Scheme for UAV-Aided IoT Networks
    Wang, Jiaxing
    Guo, Shao
    Wang, Jingjing
    Bai, Lin
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (08): : 9570 - 9582
  • [30] Enhancing the security in IoT and IIoT networks: An intrusion detection scheme leveraging deep transfer learning
    Ahmad, Basharat
    Wu, Zhaoliang
    Huang, Yongfeng
    Rehman, Sadaqat Ur
    KNOWLEDGE-BASED SYSTEMS, 2024, 305