Skip to main content
Log in

Mutual learning-based group synchronization of neural networks

  • Published:
Sādhanā Aims and scope Submit manuscript

Abstract

In this study, a method for securing neural key exchange over public channels by synchronizing a set of neural networks is presented. To share the key through a public network, two artificial neural networks (ANNs) are coordinated via mutual learning. The most crucial component of neural cooperation is establishing how effectively two parties’ ANNs coordinate without the other’s weights. Furthermore, research on the mutual training of a cluster of ANNs is limited. This research proposes a collaborative learning technique for measuring the perfect coordination of a collection of ANNs quickly and efficiently. Collaboration is determined by the frequency by which the two networks have had identical results in prior sessions. A full binary tree framework is required to organize the ANNs. In the tree architecture, each ANN is a component. A leaf node is a component that has no successors. This technique has numerous benefits such as (1) the session key is generated via full binary tree-based group mutual neural coordination of ANNs over the public channel. (2) The presented scheme, in contrast to prior methods, allows two communicating entities to identify complete coordination more rapidly. (3) In addition, the suggested approach allows for simultaneous coordination and authentication. The adversary has a hard time distinguishing between coordination and authentication stages. As a result, the adversary has no idea yet if the presently visible output bit is utilized for coordination or authentication. (4) The group’s coordinated shared weights act as a key for the session for the whole group to exchange data. (5) The proposed approach takes brute force, geometry, and majority attacks into account. The performance of the suggested methodology is tested, and the results show that it outperforms similar strategies already in use.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9

Similar content being viewed by others

References

  1. Teodoro A, Gomes O, Saadi M, et al. 2021 An FPGA-based performance evaluation of artificial neural network architecture algorithm for IoT. Wirel. Pers. Commun.https://doi.org/10.1007/s11277-021-08566-1

    Article  Google Scholar 

  2. Jeong S, Park C, Hong D, Seo C, Jho N 2021 Neural cryptography based on generalized tree parity machine for real-life systems. Secur. Commun. Netw. 2021. https://doi.org/10.1155/2021/6680782

  3. Sarkar A 2021 Deep learning guided double hidden layer neural synchronization through mutual learning. Neural Process. Lett. 53: 1355–1384. https://doi.org/10.1007/s11063-021-10443-8

    Article  Google Scholar 

  4. Liu P, Zeng Z, Wang J 2019 Global synchronization of coupled fractional-order recurrent neural networks. IEEE Trans. Neural Netw. Learn. Syst. 30(8): 2358–2368

    Article  MathSciNet  Google Scholar 

  5. Dong T, Huang T 2020 Neural cryptography based on complex-valued neural network. IEEE Trans. Neural Netw. Learn. Syst. 31(11): 4999–5004.https://doi.org/10.1109/TNNLS.2019.2955165

  6. Dolecki M, Kozera R 2015 The impact of the TPM weights distribution on network synchronization time. Comput. Inf. Syst. Ind. Manag. 9339: 451–460

    Google Scholar 

  7. Yan L, Zhang S, Chang Y, Sun Z, Sheng Z 2020 Quantum secure direct communication protocol with mutual authentication based on single photons and bell states. Comput. Mater. Contin. 63(3): 1297–1307. https://doi.org/10.32604/cmc.2020.09873

  8. Kou J, He M, Xiong L, Ge Z, Xie G 2020 Efficient hierarchical multi-server authentication protocol for mobile cloud computing. Comput. Mater. Contin. 64(1): 297–312. https://doi.org/10.32604/cmc.2020.09758

  9. Waqas M, Tu S, Rehman SU, Halim Z, Anwar S, Abbas G, Abbas Z H, Rehman O U 2020 Authentication of vehicles and road side units in intelligent transportation system. Comput. Mater. Contin. 64(1): 359–371. https://doi.org/10.32604/cmc.2020.09821

  10. Jiang X, Liu M, Yang C, Liu Y, Wang R 2019 A blockchain-based authentication protocol for WLAN mesh security access. Comput. Mater. Contin. 58(1): 45–59. https://doi.org/10.32604/cmc.2019.03863

  11. Kou L, Shi Y, Zhang L, Liu D, Yang Q 2019 A lightweight three-factor user authentication protocol for the information perception of IoT. Comput. Mater. Contin. 58(2): 545–565. https://doi.org/10.32604/cmc.2019.03760

  12. Wang Y, Chen Y, Ahmad H, Wei Z 2019 Message authentication with a new quantum hash function. Comput. Mater. Contin. 59(2): 635–648. https://doi.org/10.32604/cmc.2019.05251

  13. Choi G H, Jung J H, Moon H M, Kim Y T, Pn S B 2019 User authentication system based on baseline-corrected ECG for biometrics. Intell. Autom. Soft Comput. 25(1): 193–204. https://doi.org/10.31209/2018.100000055

  14. Gu Y, Xie X, Gu C 2019 A new NTRU-type public-key cryptosystem over the binary field. Comput. Mater. Contin. 60(1): 305–316. https://doi.org/10.32604/cmc.2019.04121

  15. Ruttor A, Kinzel W, Naeh R, Kanter I 2006 Genetic attack on neural cryptography. Phys. Rev. E. https://doi.org/10.1103/physreve.73.036121

  16. Protic D 2016 Neural cryptography. Vojnotehnicki Glasnik 64(2): 483–495. https://doi.org/10.5937/vojtehg64-8877

    Article  Google Scholar 

  17. Ruttor A, Kinzel W, Kanter I 2007 Dynamics of neural cryptography. Phys. Rev. E. https://doi.org/10.1103/physreve.75.056104

  18. Rosen-Zvi M, Kanter I, Kinzel W 2002 Cryptography based on neural networks analytical results. J. Phys. A Math. Gen. 35(47): L707–L713. https://doi.org/10.1088/0305-4470/35/47/104

    Article  MathSciNet  MATH  Google Scholar 

  19. Shacham L N, Klein E, Mislovaty R, Kanter I, Kinzel W 2004 Cooperating attackers in neural cryptography. Phys. Rev. E. https://doi.org/10.1103/physreve.69.066137

  20. Niemiec M, Mehic M, Voznak 2018 Security verification of artificial neural networks used to error correction in quantum cryptography. In: Proceedings of the 26th Tele- communications Forum (TELFOR), pp. 1–4

  21. Abdalrdha Z K, AL-Qinani I H, Abbas F N 2019 Subject review: key generation in different cryptography algorithm. Int. J. Sci. Res. Sci. Eng. Technol. 6(5): 230–240. https://doi.org/10.32628/ijsrset196550

  22. Hadke P P, Kale S G 2016 Use of neural networks in cryptography: a review. In: Proceedings of the 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave), pp 1–4

  23. Lu Y, Huang X, Dai Y, Maharjan S, Zhang Y 2020 Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. IEEE Trans. Ind. Inform. 16(6): 4177–4186. https://doi.org/10.1109/TII.2019.2942190

    Article  Google Scholar 

  24. Édgar S D, Fuertes W, Lascano E 2019 On the development of an optimal structure of tree parity machine for the establishment of a cryptographic key. Secur. Commun. Netw. 2019: 1–10. https://doi.org/10.1155/2019/8214681

    Article  Google Scholar 

  25. Niemiec 2019 Error correction in quantum cryptography based on artificial neural networks. Quantum Inf. Process. 18: 174–174. https://doi.org/10.1007/s11128-019-2296-4

  26. Pal S K, Mishra S, Mishra S 2019 An TPM based approach for generation of secret key. Int. J. Comput. Netw. Inf. Secur. 11(10): 45–50. https://doi.org/10.5815/ijcnis.2019.10.06

    Article  Google Scholar 

  27. Chourasia S, Bharadwaj H C, Das Q, Agarwal K, Lavanya K 2019 Vectorized neural key exchange using tree parity machine. Secur. Commun. Netw. 2021: 3140–3145. https://doi.org/10.1155/2021/6680782

    Article  Google Scholar 

  28. Sarkar A 2019 Multilayer neural network synchronized secured session key based encryption in wireless communication. Int. J. Artif. Intell. 8(1): 44–53. https://doi.org/10.11591/ijeecs.v14.i1.pp169-177

  29. Sarkar A, Mandal J 2012 Swarm intelligence based faster public-key cryptography in wireless communication (SIFPKC). Int. J. Comput. Sci. Eng. Technol. (IJCSET) 3(7): 267–273

    Google Scholar 

  30. Jo M, Jangirala S, Das A K, Li X, Khan M K 2020 Designing anonymous signature-based authenticated key exchange scheme for IoT-enabled smart grid systems. IEEE Trans. Ind. Inform.https://doi.org/10.1109/TII.2020.3011849

  31. Makkar A, Garg S, Kumar N, Hossain M S, Ghoneim A, Alrashoud M 2021 An efficient spam detection technique for IoT devices using machine learning. IEEE Trans. Ind. Inform. 17(2): 903–912. https://doi.org/10.1109/TII.2020.2968927

    Article  Google Scholar 

  32. Gao J, Yang X, Jiang Y, Song H, Choo K K R, Sun J 2021 Semantic learning based cross-platform binary vulnerability search for IoT devices. IEEE Trans. Ind. Informatics 17(2): 971–979. https://doi.org/10.1109/TII.2019.2947432

    Article  Google Scholar 

  33. Shishniashvili E, Mamisashvili L, Mirtskhulava L 2020 Enhancing IoT security using multi-layer feedforward neural network with tree parity machine elements. Int. J. Simul. Syst. Sci. Technol. 21(2): 371–383. https://doi.org/10.5013/ijssst.a.21.02.37

    Article  Google Scholar 

  34. Mehic M, Niemiec H, Siljak M, Voznak 2020 Error reconciliation in quantum key distribution protocols. In: Proceedings of the International Conference on Reversible Computation, pp. 222–236

  35. NIST 2020 NIST Statistical Test. http://csrc.nist.gov/groups/ST/toolkit/rng/stats_tests.html

  36. Karakaya B, Gülten A, Frasca M 2019 A true random bit generator based on a memristive chaotic circuit: analysis, design and FPGA implementation. Chaos Solitons Fractals 119: 143–149

  37. Patidar V, Sud K K, Pareek N K 2009 A pseudo random bit generator based on chaotic logistic map and its statistical testing. Informatica 33: 441–452

    MathSciNet  MATH  Google Scholar 

  38. Liu L, Miao S, Hu H, Deng Y 2016 Pseudo-random bit generator based on non-stationary logistic maps. IET Inf. Secur. 10: 87–94

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arindam Sarkar.

Ethics declarations

Conflict of interest

No conflict of interest.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sarkar, A., Khan, M.Z. & Alahmadi, A. Mutual learning-based group synchronization of neural networks. Sādhanā 47, 243 (2022). https://doi.org/10.1007/s12046-022-02010-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12046-022-02010-1

Keywords

Navigation