Abstract
In this study, a method for securing neural key exchange over public channels by synchronizing a set of neural networks is presented. To share the key through a public network, two artificial neural networks (ANNs) are coordinated via mutual learning. The most crucial component of neural cooperation is establishing how effectively two parties’ ANNs coordinate without the other’s weights. Furthermore, research on the mutual training of a cluster of ANNs is limited. This research proposes a collaborative learning technique for measuring the perfect coordination of a collection of ANNs quickly and efficiently. Collaboration is determined by the frequency by which the two networks have had identical results in prior sessions. A full binary tree framework is required to organize the ANNs. In the tree architecture, each ANN is a component. A leaf node is a component that has no successors. This technique has numerous benefits such as (1) the session key is generated via full binary tree-based group mutual neural coordination of ANNs over the public channel. (2) The presented scheme, in contrast to prior methods, allows two communicating entities to identify complete coordination more rapidly. (3) In addition, the suggested approach allows for simultaneous coordination and authentication. The adversary has a hard time distinguishing between coordination and authentication stages. As a result, the adversary has no idea yet if the presently visible output bit is utilized for coordination or authentication. (4) The group’s coordinated shared weights act as a key for the session for the whole group to exchange data. (5) The proposed approach takes brute force, geometry, and majority attacks into account. The performance of the suggested methodology is tested, and the results show that it outperforms similar strategies already in use.
Similar content being viewed by others
References
Teodoro A, Gomes O, Saadi M, et al. 2021 An FPGA-based performance evaluation of artificial neural network architecture algorithm for IoT. Wirel. Pers. Commun.https://doi.org/10.1007/s11277-021-08566-1
Jeong S, Park C, Hong D, Seo C, Jho N 2021 Neural cryptography based on generalized tree parity machine for real-life systems. Secur. Commun. Netw. 2021. https://doi.org/10.1155/2021/6680782
Sarkar A 2021 Deep learning guided double hidden layer neural synchronization through mutual learning. Neural Process. Lett. 53: 1355–1384. https://doi.org/10.1007/s11063-021-10443-8
Liu P, Zeng Z, Wang J 2019 Global synchronization of coupled fractional-order recurrent neural networks. IEEE Trans. Neural Netw. Learn. Syst. 30(8): 2358–2368
Dong T, Huang T 2020 Neural cryptography based on complex-valued neural network. IEEE Trans. Neural Netw. Learn. Syst. 31(11): 4999–5004.https://doi.org/10.1109/TNNLS.2019.2955165
Dolecki M, Kozera R 2015 The impact of the TPM weights distribution on network synchronization time. Comput. Inf. Syst. Ind. Manag. 9339: 451–460
Yan L, Zhang S, Chang Y, Sun Z, Sheng Z 2020 Quantum secure direct communication protocol with mutual authentication based on single photons and bell states. Comput. Mater. Contin. 63(3): 1297–1307. https://doi.org/10.32604/cmc.2020.09873
Kou J, He M, Xiong L, Ge Z, Xie G 2020 Efficient hierarchical multi-server authentication protocol for mobile cloud computing. Comput. Mater. Contin. 64(1): 297–312. https://doi.org/10.32604/cmc.2020.09758
Waqas M, Tu S, Rehman SU, Halim Z, Anwar S, Abbas G, Abbas Z H, Rehman O U 2020 Authentication of vehicles and road side units in intelligent transportation system. Comput. Mater. Contin. 64(1): 359–371. https://doi.org/10.32604/cmc.2020.09821
Jiang X, Liu M, Yang C, Liu Y, Wang R 2019 A blockchain-based authentication protocol for WLAN mesh security access. Comput. Mater. Contin. 58(1): 45–59. https://doi.org/10.32604/cmc.2019.03863
Kou L, Shi Y, Zhang L, Liu D, Yang Q 2019 A lightweight three-factor user authentication protocol for the information perception of IoT. Comput. Mater. Contin. 58(2): 545–565. https://doi.org/10.32604/cmc.2019.03760
Wang Y, Chen Y, Ahmad H, Wei Z 2019 Message authentication with a new quantum hash function. Comput. Mater. Contin. 59(2): 635–648. https://doi.org/10.32604/cmc.2019.05251
Choi G H, Jung J H, Moon H M, Kim Y T, Pn S B 2019 User authentication system based on baseline-corrected ECG for biometrics. Intell. Autom. Soft Comput. 25(1): 193–204. https://doi.org/10.31209/2018.100000055
Gu Y, Xie X, Gu C 2019 A new NTRU-type public-key cryptosystem over the binary field. Comput. Mater. Contin. 60(1): 305–316. https://doi.org/10.32604/cmc.2019.04121
Ruttor A, Kinzel W, Naeh R, Kanter I 2006 Genetic attack on neural cryptography. Phys. Rev. E. https://doi.org/10.1103/physreve.73.036121
Protic D 2016 Neural cryptography. Vojnotehnicki Glasnik 64(2): 483–495. https://doi.org/10.5937/vojtehg64-8877
Ruttor A, Kinzel W, Kanter I 2007 Dynamics of neural cryptography. Phys. Rev. E. https://doi.org/10.1103/physreve.75.056104
Rosen-Zvi M, Kanter I, Kinzel W 2002 Cryptography based on neural networks analytical results. J. Phys. A Math. Gen. 35(47): L707–L713. https://doi.org/10.1088/0305-4470/35/47/104
Shacham L N, Klein E, Mislovaty R, Kanter I, Kinzel W 2004 Cooperating attackers in neural cryptography. Phys. Rev. E. https://doi.org/10.1103/physreve.69.066137
Niemiec M, Mehic M, Voznak 2018 Security verification of artificial neural networks used to error correction in quantum cryptography. In: Proceedings of the 26th Tele- communications Forum (TELFOR), pp. 1–4
Abdalrdha Z K, AL-Qinani I H, Abbas F N 2019 Subject review: key generation in different cryptography algorithm. Int. J. Sci. Res. Sci. Eng. Technol. 6(5): 230–240. https://doi.org/10.32628/ijsrset196550
Hadke P P, Kale S G 2016 Use of neural networks in cryptography: a review. In: Proceedings of the 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave), pp 1–4
Lu Y, Huang X, Dai Y, Maharjan S, Zhang Y 2020 Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. IEEE Trans. Ind. Inform. 16(6): 4177–4186. https://doi.org/10.1109/TII.2019.2942190
Édgar S D, Fuertes W, Lascano E 2019 On the development of an optimal structure of tree parity machine for the establishment of a cryptographic key. Secur. Commun. Netw. 2019: 1–10. https://doi.org/10.1155/2019/8214681
Niemiec 2019 Error correction in quantum cryptography based on artificial neural networks. Quantum Inf. Process. 18: 174–174. https://doi.org/10.1007/s11128-019-2296-4
Pal S K, Mishra S, Mishra S 2019 An TPM based approach for generation of secret key. Int. J. Comput. Netw. Inf. Secur. 11(10): 45–50. https://doi.org/10.5815/ijcnis.2019.10.06
Chourasia S, Bharadwaj H C, Das Q, Agarwal K, Lavanya K 2019 Vectorized neural key exchange using tree parity machine. Secur. Commun. Netw. 2021: 3140–3145. https://doi.org/10.1155/2021/6680782
Sarkar A 2019 Multilayer neural network synchronized secured session key based encryption in wireless communication. Int. J. Artif. Intell. 8(1): 44–53. https://doi.org/10.11591/ijeecs.v14.i1.pp169-177
Sarkar A, Mandal J 2012 Swarm intelligence based faster public-key cryptography in wireless communication (SIFPKC). Int. J. Comput. Sci. Eng. Technol. (IJCSET) 3(7): 267–273
Jo M, Jangirala S, Das A K, Li X, Khan M K 2020 Designing anonymous signature-based authenticated key exchange scheme for IoT-enabled smart grid systems. IEEE Trans. Ind. Inform.https://doi.org/10.1109/TII.2020.3011849
Makkar A, Garg S, Kumar N, Hossain M S, Ghoneim A, Alrashoud M 2021 An efficient spam detection technique for IoT devices using machine learning. IEEE Trans. Ind. Inform. 17(2): 903–912. https://doi.org/10.1109/TII.2020.2968927
Gao J, Yang X, Jiang Y, Song H, Choo K K R, Sun J 2021 Semantic learning based cross-platform binary vulnerability search for IoT devices. IEEE Trans. Ind. Informatics 17(2): 971–979. https://doi.org/10.1109/TII.2019.2947432
Shishniashvili E, Mamisashvili L, Mirtskhulava L 2020 Enhancing IoT security using multi-layer feedforward neural network with tree parity machine elements. Int. J. Simul. Syst. Sci. Technol. 21(2): 371–383. https://doi.org/10.5013/ijssst.a.21.02.37
Mehic M, Niemiec H, Siljak M, Voznak 2020 Error reconciliation in quantum key distribution protocols. In: Proceedings of the International Conference on Reversible Computation, pp. 222–236
NIST 2020 NIST Statistical Test. http://csrc.nist.gov/groups/ST/toolkit/rng/stats_tests.html
Karakaya B, Gülten A, Frasca M 2019 A true random bit generator based on a memristive chaotic circuit: analysis, design and FPGA implementation. Chaos Solitons Fractals 119: 143–149
Patidar V, Sud K K, Pareek N K 2009 A pseudo random bit generator based on chaotic logistic map and its statistical testing. Informatica 33: 441–452
Liu L, Miao S, Hu H, Deng Y 2016 Pseudo-random bit generator based on non-stationary logistic maps. IET Inf. Secur. 10: 87–94
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
No conflict of interest.
Rights and permissions
About this article
Cite this article
Sarkar, A., Khan, M.Z. & Alahmadi, A. Mutual learning-based group synchronization of neural networks. Sādhanā 47, 243 (2022). https://doi.org/10.1007/s12046-022-02010-1
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s12046-022-02010-1