Abstract
In this paper, a group session Key Exchange multilayer Perceptron based Simulated Annealing guided Automata and Comparisonbased Metamorphosedencryption technique(GSMLPSA) has been proposedin wireless communication of data/information.Both sender and receiver uses identical multilayer perceptron and depending on the final output of the both side multilayer perceptron, weights vector of hidden layer get tuned in both ends. As a results both perceptrons generates identical weight vectors which is consider as an one time session key. In GSMLPSA technique plain textis encrypted using metamorphosed code table for producing level 1 encrypted text. Thencomparison based technique is used to f urther encerypt the level 1 encrypted text and produce level 2 encrypted text. Simulated Annealing based keystream is xored with the leve2 encrypted text and form a level 3 encrypted text. Finally level 3 encrypted text is xored with the MLP based session key and get transmitted to the receiver. GSMLPSA technique uses two keys for encryption purpose. SA based key get further encrypted using Automata based technique and finally xored with MLP based session key and transmitted to the receiver . This technique ensures that if intruders intercept the key of the keystream then also values of the key not be known t o the intruders because of the automata based encoding. Receiver will perform same operation in reverse order to get the plain text back. Two parties can swap over a common key using synchronization between their ownmultilayer perceptrons. But the problem crop up when group of N partiesdesire to swap over a key. Since in this case each communicating party has to synchronize with otherfor swapping over the key. So, if there are N parties then total number of synchronizations needed before swapping over the actual key is O(N 2 ). GSMLPSAscheme offers a novel technique in which complete binary tree structure is follows for key swapping over.Using proposed algorithm a set of N parties can be able to share a common key with only O(log 2 N) synchronization. Parametric tests have been done and results are compared with some existing classical techniques, which show comparable results for the proposedtechnique.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Wireless & Mobile Networks
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.