Skip to main content
Top
Published in: Neural Processing Letters 2/2021

22-02-2021

Deep Learning Guided Double Hidden Layer Neural Synchronization Through Mutual Learning

Author: Arindam Sarkar

Published in: Neural Processing Letters | Issue 2/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, a Double Hidden Layer Neural Networks synchronization mechanism using Generative Adversarial Network (GAN) and mutual learning is used for the development of the cryptographic key exchange protocol. This protocol is used to exchange sensitive information through a public channel. At the time of exchanging sensitive information, an intruder can easily attack the vital information/signals by sniffing, spoofing, phishing, or Man-In-The-Middle attack. There is, however, hardly some investigation to investigate the randomness of the common input vector in the synchronization of two neural networks. This proposed technique provides GAN generated random input vectors for neural synchronization which are very sensitive to the seed value. To enhance the security of the synchronization process, GAN generates the best random sequence of the input vector. Two neural networks use GAN generated input vector and different random weight vector and swap their output. In some steps, it results in complete synchronization by setting the discrete weights according to the common learning rule. The synchronized weight vector serves as a session key at the end of the neural synchronization process. An increase in the weight range increases the complexity of a successful attack exponentially but the effort to build the neural key decreases over the polynomial time. The proposed technique offers synchronization and authentication steps in parallel. It is difficult for the attacker to distinguish between synchronization and authentication steps. This proposed technique has been passed through different parametric tests. The results have shown effective and robust potential. Simulations of the process show effectiveness in terms of cited results in the paper.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
5.
go back to reference Ahmad M, Farooq O, Datta S, Sohail SS, Vyas AL, Mulvaney D (2011) Chaos-based encryption of biomedical EEG signals using random quantization technique. In: 4th International conference on biomedical engineering and informatics (BMEI), pp 1471–1475. https://doi.org/10.1109/BMEI.2011.6098594 Ahmad M, Farooq O, Datta S, Sohail SS, Vyas AL, Mulvaney D (2011) Chaos-based encryption of biomedical EEG signals using random quantization technique. In: 4th International conference on biomedical engineering and informatics (BMEI), pp 1471–1475. https://​doi.​org/​10.​1109/​BMEI.​2011.​6098594
6.
go back to reference Allam AM, Abbas HM, El-Kharashi MW (2013) Authenticated key exchange protocol using neural cryptography with secret boundaries. In: Proceedings of the 2013 international joint conference on neural networks, IJCNN 2013, pp 1–8 Allam AM, Abbas HM, El-Kharashi MW (2013) Authenticated key exchange protocol using neural cryptography with secret boundaries. In: Proceedings of the 2013 international joint conference on neural networks, IJCNN 2013, pp 1–8
12.
go back to reference Cover TM, Thomas JA (2006) Elements of information theory, 2nd edn. Wiley series in telecommunications and signal processing, Wiley, New YorkMATH Cover TM, Thomas JA (2006) Elements of information theory, 2nd edn. Wiley series in telecommunications and signal processing, Wiley, New YorkMATH
15.
go back to reference Dolecki M, Kozera R (2013) Threshold method of detecting long-time TPM synchronization. In: Saeed K, Chaki R, Cortesi A, Wierzchoń S (eds) Computer information systems and industrial management. CISIM 2013. Lecture notes in computer science, vol 8104. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40925-7_23 Dolecki M, Kozera R (2013) Threshold method of detecting long-time TPM synchronization. In: Saeed K, Chaki R, Cortesi A, Wierzchoń S (eds) Computer information systems and industrial management. CISIM 2013. Lecture notes in computer science, vol 8104. Springer, Berlin, Heidelberg. https://​doi.​org/​10.​1007/​978-3-642-40925-7_​23
16.
go back to reference Dolecki M, Kozera R (2015) The impact of the TPM weights distribution on network synchronization time. In: Saeed K, Homenda W (eds) 14th computer information systems and industrial management (CISIM). Computer information systems and industrial management, vol LNCS-9339. Springer, Warsaw, pp 451–460. https://doi.org/10.1007/978-3-319-24369-6_37 Dolecki M, Kozera R (2015) The impact of the TPM weights distribution on network synchronization time. In: Saeed K, Homenda W (eds) 14th computer information systems and industrial management (CISIM). Computer information systems and industrial management, vol LNCS-9339. Springer, Warsaw, pp 451–460. https://​doi.​org/​10.​1007/​978-3-319-24369-6_​37
26.
31.
go back to reference Lin CF (2016) Chaotic visual cryptosystem using empirical mode decomposition algorithm for clinical EEG signals. J Med Syst 40(3):1–10 Lin CF (2016) Chaotic visual cryptosystem using empirical mode decomposition algorithm for clinical EEG signals. J Med Syst 40(3):1–10
32.
go back to reference Lin CF, Shih SH, Zhu JD (2014) Chaos based encryption system for encrypting electroencephalogram signals. J Med Syst 38(5):1–10 Lin CF, Shih SH, Zhu JD (2014) Chaos based encryption system for encrypting electroencephalogram signals. J Med Syst 38(5):1–10
33.
go back to reference Lindell Y, Katz J (2014) Introduction to modern cryptography. Cryptography and network security series, Chapman and Hall/CRC, Boca RatonMATH Lindell Y, Katz J (2014) Introduction to modern cryptography. Cryptography and network security series, Chapman and Hall/CRC, Boca RatonMATH
36.
go back to reference Meneses F, Fuertes W, Sancho J (2016) RSA encryption algorithm optimization to improve performance and security level of network messages. IJCSNS 16(8):55 Meneses F, Fuertes W, Sancho J (2016) RSA encryption algorithm optimization to improve performance and security level of network messages. IJCSNS 16(8):55
39.
go back to reference Mulyadi IH, Nelmiawati N, Supriyanto E (2019) Improving accuracy of derived 12-lead electrocardiography by waveform segmentation. Indones J Electr Eng Inform IJEEI 7(1):2089–3272 Mulyadi IH, Nelmiawati N, Supriyanto E (2019) Improving accuracy of derived 12-lead electrocardiography by waveform segmentation. Indones J Electr Eng Inform IJEEI 7(1):2089–3272
41.
go back to reference Nayak J, Bhat PS, Acharya UR, Niranjan UC (2004) Simultaneous storage of medical images in the spatial and frequency domain: a comparative study. BioMed Eng OnLine 3:1–10CrossRef Nayak J, Bhat PS, Acharya UR, Niranjan UC (2004) Simultaneous storage of medical images in the spatial and frequency domain: a comparative study. BioMed Eng OnLine 3:1–10CrossRef
46.
go back to reference Patidar V, Sud KK, Pareek NK (2009) A pseudo random bit generator based on chaotic logistic map and its statistical testing. Informatica 33:441–452MathSciNetMATH Patidar V, Sud KK, Pareek NK (2009) A pseudo random bit generator based on chaotic logistic map and its statistical testing. Informatica 33:441–452MathSciNetMATH
52.
go back to reference Santhanalakshmi S, Sangeeta K, Patra GK (2015) Analysis of neural synchronization using genetic approach for secure key generation. Commun Comput Inf Sci 536:207–216 Santhanalakshmi S, Sangeeta K, Patra GK (2015) Analysis of neural synchronization using genetic approach for secure key generation. Commun Comput Inf Sci 536:207–216
53.
go back to reference Sarkar A, Mandal JK (2012) Artificial neural network guided secured communication techniques: a practical approach. LAP LAMBERT Academic Publishing, Saarbrücken Sarkar A, Mandal JK (2012) Artificial neural network guided secured communication techniques: a practical approach. LAP LAMBERT Academic Publishing, Saarbrücken
54.
go back to reference Sarkar A, Mandal JK (2012) Key generation and certification using multilayer perceptron in wireless communication (KGCMLP). Int J Secur Privacy Trust Manag IJSPTM 1(5):2319–4103 Sarkar A, Mandal JK (2012) Key generation and certification using multilayer perceptron in wireless communication (KGCMLP). Int J Secur Privacy Trust Manag IJSPTM 1(5):2319–4103
55.
go back to reference Sarkar A, Dey J, Bhowmik A (2019a) Multilayer neural network synchronized secured session key based encryption in wireless communication. Indones J Electr Eng Comput Sci 14(1):169CrossRef Sarkar A, Dey J, Bhowmik A (2019a) Multilayer neural network synchronized secured session key based encryption in wireless communication. Indones J Electr Eng Comput Sci 14(1):169CrossRef
56.
go back to reference Sarkar A, Dey J, Bhowmik A, Mandal JK, Karforma S (2019) Computational intelligence based neural session key generation on E-health system for ischemic heart disease information sharing. In: Mandal J, Sinha D, Bandopadhyay J (eds) Contemporary advances in innovative and applicable information technology. Advances in intelligent systems and computing, vol 812. Springer, Singapore. https://doi.org/10.1007/978-981-13-1540-4_3 Sarkar A, Dey J, Bhowmik A, Mandal JK, Karforma S (2019) Computational intelligence based neural session key generation on E-health system for ischemic heart disease information sharing. In: Mandal J, Sinha D, Bandopadhyay J (eds) Contemporary advances in innovative and applicable information technology. Advances in intelligent systems and computing, vol 812. Springer, Singapore. https://​doi.​org/​10.​1007/​978-981-13-1540-4_​3
57.
go back to reference Sarkar A, Dey J, Chatterjee M, Bhowmik A, Karforma S (2019c) Neural soft computing based secured transmission of intraoral gingivitis image in e-health care. Indones J Electr Eng Comput Sci 14(1):178CrossRef Sarkar A, Dey J, Chatterjee M, Bhowmik A, Karforma S (2019c) Neural soft computing based secured transmission of intraoral gingivitis image in e-health care. Indones J Electr Eng Comput Sci 14(1):178CrossRef
58.
go back to reference Steiner M, Tsudik G, Waidner M (1996) Diffie–Hellman key distribution extended to group communication. In: Proceedings of 3rd ACM Conference, pp 31–37 Steiner M, Tsudik G, Waidner M (1996) Diffie–Hellman key distribution extended to group communication. In: Proceedings of 3rd ACM Conference, pp 31–37
59.
go back to reference Wang A, Dong T, Liao X (2016) Event-triggered synchronization strategy for complex dynamical networks with the Markovian switching topologies. Neural Netw 74:52–57CrossRef Wang A, Dong T, Liao X (2016) Event-triggered synchronization strategy for complex dynamical networks with the Markovian switching topologies. Neural Netw 74:52–57CrossRef
61.
go back to reference Wang JL, Qin Z, Wu HN, Huang T (2019) Passivity and synchronization of coupled uncertain reaction-diffusion neural networks with multiple time delays. IEEE Trans Neural Netw Learn Syst 30(8):2434–2448MathSciNetCrossRef Wang JL, Qin Z, Wu HN, Huang T (2019) Passivity and synchronization of coupled uncertain reaction-diffusion neural networks with multiple time delays. IEEE Trans Neural Netw Learn Syst 30(8):2434–2448MathSciNetCrossRef
Metadata
Title
Deep Learning Guided Double Hidden Layer Neural Synchronization Through Mutual Learning
Author
Arindam Sarkar
Publication date
22-02-2021
Publisher
Springer US
Published in
Neural Processing Letters / Issue 2/2021
Print ISSN: 1370-4621
Electronic ISSN: 1573-773X
DOI
https://doi.org/10.1007/s11063-021-10443-8

Other articles of this Issue 2/2021

Neural Processing Letters 2/2021 Go to the issue