Complete Binary Tree Architecture Based Triple Layer Perceptron Synchronized Group Session Key Exchange and Authentication in Wireless Communication (CBTLP)
In this paper, Triple Layer Perceptron harmonized one time session key exchange and authentication (CBTLP) has been proposed based on the structural design of complete binary tree. In this proposed technique 3 hidden layers are used in the architecture of the TLP to enhance the security. This proposed CBTLP scheme offers structure of complete binary tree. Group of parties can participate in TLP synchronization and key switch over process. In CBTLP scheme only O(log2 N) synchronization is needed for swap over the session key among N parties.
KeywordsTriple Layer Perceptron (TLP) Session Key Wireless Communication
Unable to display preview. Download preview PDF.
- 1.Kahate, A.: Cryptography and Network Security. Tata McGraw-Hill Publishing Company Limited (2003) (Eighth reprint 2006)Google Scholar
- 2.Mislovaty, R., Perchenok, Y., Kanter, I., Kinzel, W.: Secure key-exchange protocol with an absence of injective functions. Phys. Rev. E 66, 066102 (2002)Google Scholar
- 3.Ruttor, A., Kinzel, W., Naeh, R., Kanter, I.: Genetic attack on neural cryptography. Phys. Rev. E 73(3), 036121 (2006)Google Scholar
- 4.Engel, A., Van den Broeck, C.: Statistical Mechanics of Learning. Cambridge University Press, Cambridge (2001)Google Scholar
- 5.Mandal, J.K., Arindam, S.: An Adaptive Genetic Key Based Neural Encryption For Online Wireless Communication (AGKNE). In: International Conference on Recent Trends In Information Systems (RETIS 2011), Jadavpur University, Kolkata, India, December 21-23. IEEE (2011) ISBN 978-1-4577-0791-9Google Scholar