作者
Arindam Sarkar, Mohammad Zubair Khan, Moirangthem Marjit Singh, Abdulfattah Noorwali, Chinmay Chakraborty, Subhendu Kumar Pani
发表日期
2021/1/19
期刊
IEEE Access
卷号
9
页码范围
16435-16447
出版商
IEEE
简介
In this article, a whale optimization-based neural synchronization has been proposed for the development of the key exchange protocol. At the time of exchange of sensitive information, intruders can effortlessly perform sniffing, spoofing, phishing, or Man-In-The-Middle (MITM) attack to tamper the vital information. Information needs to be secretly transmitted with high level of encryption by preserving the authentication, confidentiality, and integrity factors. Such stated requirements urge the researchers to develop a neural network-based fast and robust security protocol. A special neural network structure called Double Layer Tree Parity Machine (DLTPM) is proposed for neural synchronization. Two DLTPMs accept the common input and different weight vectors and update the weights using neural learning rules by exchanging their output. In some steps, it results in complete synchronization, and the weights of the …
引用总数
学术搜索中的文章