A symmetric neural cryptographic key generation scheme for Iot security

被引:0
作者
Arindam Sarkar
机构
[1] Ramakrishna Mission Vidyamandira,Department of Computer Science and Electronics
来源
Applied Intelligence | 2023年 / 53卷
关键词
Triple layer vector-valued neural network (TLVVNN); Internet-of-things (IoT); Critical energy infrastructures (CEI); Harris Hawk optimization (HHO);
D O I
暂无
中图分类号
学科分类号
摘要
The use of CMOS technology to generate neural session keys is presented in this research for incorporation with the Internet of Things (IoT) to improve security. Emerging technology advancements in the IoT era have enabled better tactics to exacerbate energy efficiency and security difficulties. Current safety solutions do not effectively address the security of IoT. Regarding IoT integration, a tiny logic area ASIC design of a re-keying enabled Triple Layer Vector-Valued Neural Network (TLVVNN) is presented utilizing CMOS designs with measurements of 65 and 130 nanometers. There hasn’t been much study into optimizing the value of neural weights for faster neural synchronization. Harris’ Hawks is used in this instance to optimize the neural network’s weight vector for faster coordination. Once this process is completed, the synchronized weight becomes the session key. This method offers several advantages, namely (1) production of the session key by mutual neural synchronization over the public channel is one of the advantages of this technology. (2) It facilitates Hawks-based neural weight vector optimization for faster neural synchronization across public channels. (3) As per behavioral modeling, the synchronization duration might be reduced from 1.25 ms to less than 0.7 ms for a 20% weight imbalance in the re-keying phase. (4) Geometric, brute force, and majority attacks are all prohibited. Experiments to validate the suggested method’s functionality are carried out, and the results show that the proposed approach outperforms current similar techniques in terms of efficiency.
引用
收藏
页码:9344 / 9367
页数:23
相关论文
共 50 条
  • [41] CASE: A Context-Aware Security Scheme for Preserving Data Privacy in IoT-Enabled Society 5.0
    Ghosh, Timam
    Roy, Arijit
    Misra, Sudip
    Raghuwanshi, Narendra Singh
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) : 2497 - 2504
  • [42] A Secure Privacy Preserving Proxy re-encryption Scheme for IoT Security using Near-ring
    Krishnamoorthy, S.
    Muthukumara, V
    Yu, J.
    Balamurugan, B.
    PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE (PRAI 2019), 2019, : 27 - 32
  • [43] Design Prototype and Security Analysis of a Lightweight Joint Compression and Encryption Scheme for Resource-Constrained IoT Devices
    Kuldeep, Gajraj
    Zhang, Qi
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (01) : 165 - 181
  • [44] Secure user authentication and key agreement scheme for IoT device access control based smart home communications
    Uppuluri, Sirisha
    Lakshmeeswari, G.
    WIRELESS NETWORKS, 2023, 29 (03) : 1333 - 1354
  • [45] Secure user authentication and key agreement scheme for IoT device access control based smart home communications
    Sirisha Uppuluri
    G. Lakshmeeswari
    Wireless Networks, 2023, 29 : 1333 - 1354
  • [46] RIATA: A Reinforcement Learning-Based Intelligent Routing Update Scheme for Future Generation IoT Networks
    Nain, Zulqar
    Musaddiq, Arslan
    Qadri, Yazdan Ahmad
    Nauman, Ali
    Afzal, Muhammad Khalil
    Kim, Sung Won
    IEEE ACCESS, 2021, 9 : 81161 - 81172
  • [47] CMOS technology-based energy efficient artificial neural session key synchronization for securing IoT
    Sarkar, Arindam
    Khan, Mohammad Zubair
    Noorwali, Abdulfattah
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 95
  • [48] DKGAuth: Blockchain-Assisted Distributed Key Generation and Authentication for Cross-Domain Intelligent IoT
    Liu, Kexian
    Guan, Jianfeng
    Yao, Su
    Wang, Lili
    Zhang, Hongke
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (15): : 25663 - 25673
  • [49] Security Analysis on a Three-Factor Authentication Scheme of 5G Wireless Sensor Networks for IoT System
    Xie, Qingyun
    Xie, Qi
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 15038 - 15042
  • [50] An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing
    Uddalak Chatterjee
    Sangram Ray
    Muhammad Khurram Khan
    Mou Dasgupta
    Chien-Ming Chen
    Computing, 2022, 104 : 1359 - 1395