Chaos coordinated neural key synchronization for enhancing security of IoT
نویسندگان
چکیده
Abstract The key exchange mechanism in this paper is built utilizing neural network coordination and a hyperchaotic (or chaotic) nonlinear dynamic complex system. This approach used to send receive sensitive data between Internet-of-Things (IoT) nodes across public network. Using phishing, Man-In-The-Middle (MITM), or spoofing attacks, an attacker can easily target information during the process. Furthermore, minimal research has been made on of input seed values for creating identical at both ends networks. proposed method uses 5D chaotic structure ensure sharing value two networks, resulting ends. study discusses ways coordination. first system with all real variables, whereas second least one variable. Each its own random weight vector, outputs are exchanged. It achieves full some stages by altering neuronal weights according mutual learning law. coordinated utilized as after technique. network’s core up triple concealed layers. So, determining inner configuration will be tough intruder. efficiency suggested model validated simulations, findings reveal that strategy outperforms current equivalent techniques.
منابع مشابه
Neural Network Design for Chaos Synchronization
This chapter presents an application of neural networks to chaos synchronization. The two main methodologies, on which the approach is based, are recurrent neural networks and inverse optimal control for nonlinear systems. On the basis of the last technique, chaos is first produced by a stable recurrent neural network; an adaptive recurrent neural controller is then developed for chaos synchron...
متن کاملEncryption key distribution via chaos synchronization
We present a novel encryption scheme, wherein an encryption key is generated by two distant complex nonlinear units, forced into synchronization by a chaotic driver. The concept is sufficiently generic to be implemented on either photonic, optoelectronic or electronic platforms. The method for generating the key bitstream from the chaotic signals is reconfigurable. Although derived from a deter...
متن کاملIot-1-pass-security: 1(one)-pass Authenticated Key Agreement Protocol for Energy Constraint Iot Applications
IoT data security is one of the core unresolved challenges in IoT community. Lack of resource-efficient authenticated secure key exchange methods among resourceconstrained IoT devices makes man-in-the-middle attacks a serious vulnerability. In this regard, we propose 1(One) pass Authenticated Key Agreement (AKA) protocol for IoT applications. This protocol requires only one round of communicati...
متن کاملEnhancing Grid Security using Quantum Key Distribution
Quantum Key Distribution (QKD) is a secure key distribution technology, which provides information theoretic or unconditional security. BBN DARPA quantum network and SECOQC network of secrets are the examples of such networks. Research is also in progress for the integration of QKD with the protocols in different layers of OSI model. Integration of QKD in point-to-point protocol (PPP) OSI layer...
متن کاملSecurity middleware for enhancing interoperability of Public Key Infrastructure
This paper describes a security middleware for enhancing the interoperability of public key infrastructure (PKI). Security is a key concern in e-commerce and is especially critical in cross-enterprise transactions. Public key cryptography is widely accepted as an important mechanism for addressing the security needs of e-commerce transactions because of its ability to implement nonrepudiation. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Complex & Intelligent Systems
سال: 2022
ISSN: ['2198-6053', '2199-4536']
DOI: https://doi.org/10.1007/s40747-021-00616-2