A symmetric neural cryptographic key generation scheme for Iot security

被引:0
作者
Arindam Sarkar
机构
[1] Ramakrishna Mission Vidyamandira,Department of Computer Science and Electronics
来源
Applied Intelligence | 2023年 / 53卷
关键词
Triple layer vector-valued neural network (TLVVNN); Internet-of-things (IoT); Critical energy infrastructures (CEI); Harris Hawk optimization (HHO);
D O I
暂无
中图分类号
学科分类号
摘要
The use of CMOS technology to generate neural session keys is presented in this research for incorporation with the Internet of Things (IoT) to improve security. Emerging technology advancements in the IoT era have enabled better tactics to exacerbate energy efficiency and security difficulties. Current safety solutions do not effectively address the security of IoT. Regarding IoT integration, a tiny logic area ASIC design of a re-keying enabled Triple Layer Vector-Valued Neural Network (TLVVNN) is presented utilizing CMOS designs with measurements of 65 and 130 nanometers. There hasn’t been much study into optimizing the value of neural weights for faster neural synchronization. Harris’ Hawks is used in this instance to optimize the neural network’s weight vector for faster coordination. Once this process is completed, the synchronized weight becomes the session key. This method offers several advantages, namely (1) production of the session key by mutual neural synchronization over the public channel is one of the advantages of this technology. (2) It facilitates Hawks-based neural weight vector optimization for faster neural synchronization across public channels. (3) As per behavioral modeling, the synchronization duration might be reduced from 1.25 ms to less than 0.7 ms for a 20% weight imbalance in the re-keying phase. (4) Geometric, brute force, and majority attacks are all prohibited. Experiments to validate the suggested method’s functionality are carried out, and the results show that the proposed approach outperforms current similar techniques in terms of efficiency.
引用
收藏
页码:9344 / 9367
页数:23
相关论文
共 50 条
  • [31] Age-of-Information-Oriented Security Transmission Scheme for UAV-Aided IoT Networks
    Wang, Jiaxing
    Guo, Shao
    Wang, Jingjing
    Bai, Lin
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (08): : 9570 - 9582
  • [32] Enhancing IoT Security: Novel Mechanisms for Malware Detection using HPCs and Neural Networks
    Adhikari, Shashwat
    Asad, Hafizul
    Jones, Kevin
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1455 - 1463
  • [33] Efficient and Secure Group Key Management Scheme Based on Factorial Trees for Dynamic IoT Settings
    Sudheeradh, K.
    Jahnavi, N. Neha
    Chine, Pramod N.
    Kasbekar, Gaurav S.
    IEEE ACCESS, 2024, 12 : 5659 - 5671
  • [34] Edge-Computing-Based Scheme for Post-Quantum IoT Security for e-Health
    Minhas, Noman Nasir
    Mansoor, Khwaja
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (19): : 31331 - 31337
  • [35] CS-LAKA: A Lightweight Authenticated Key Agreement Protocol With Critical Security Properties for IoT Environments
    Guo, Yimin
    Guo, Yajun
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 4102 - 4114
  • [36] Performance Evaluation and Comparison of Default and Small Private Key Rainbow Digital Signature Scheme for IoT Devices
    Dornelles, Matheus da F.
    Lara, Pedro Carlos da S.
    Henriques, Felipe da R.
    WEBMEDIA 2019: PROCEEDINGS OF THE 25TH BRAZILLIAN SYMPOSIUM ON MULTIMEDIA AND THE WEB, 2019, : 93 - 96
  • [37] Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication
    Mabodi, Kobra
    Yusefi, Mehdi
    Zandiyan, Shahram
    Irankhah, Leili
    Fotohi, Reza
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (09) : 7081 - 7106
  • [38] Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication
    Kobra Mabodi
    Mehdi Yusefi
    Shahram Zandiyan
    Leili Irankhah
    Reza Fotohi
    The Journal of Supercomputing, 2020, 76 : 7081 - 7106
  • [39] Navigating IoT Security: Insights into Architecture, Key Security Features, Attacks, Current Challenges and AI-Driven Solutions Shaping the Future of Connectivity
    Hassan, Ali
    Nizam-Uddin, N.
    Quddus, Asim
    Hassan, Syed Rizwan
    Rehman, Ateeq Ur
    Bharany, Salil
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 81 (03): : 3499 - 3559
  • [40] A Scalable Key Pre-distribution Scheme based on the Unital Design for the Internet of Things Security
    Chegeni, V.
    Haj Seyyed Javadi, H.
    Moazami Goudarzi, M. R.
    Rezakhani, A.
    IETE JOURNAL OF RESEARCH, 2023, 69 (06) : 3406 - 3417