In this paper a novel intelligent soft computing based cryptographic technique based on synchronization of
two chaotic systems (CSCT) between sender and receiver has been proposed to generate session key using
Pecora and Caroll (PC) method. Chaotic system has some unique features like sensitive to initial
conditions, topologically mixing; and dense periodic orbits. By nature, the Lorenz system is very sensitive
to initial conditions meaning that the error between attacker and receiver is going to grow exponentially if
there is a very slight difference between their initial conditions. All these features make chaotic system as
good alternatives for session key generation. In the proposed CSCT few parameters ( , b , r , x1 ,y2 and z2 )
are being exchanged between sender and receiver. Some of the parameter which takes major roles to form
the session key does not get transmitted via public channel, sender keeps these parameters secret. This way
of handling parameter passing mechanism prevents any kind of attacks during exchange of parameters like
sniffing, spoofing or phishing.
SECURED WIRELESS COMMUNICATION THROUGH SIMULATED ANNEALING GUIDED TRAINGULARI...cscpconf
In this paper, simulated annealing guided traingularized encryption using multilayer perceptron generated session key (SATMLP) has been proposed for secured wireless ommunication. Bothsender and receiver station uses identical multilayer perceptron and depending on the final output of the both side multilayer perceptron, weights vector of hidden layer get tuned in bothends. After this tunning step both perceptrons generates identical weight vectors which is consider as an one time session key. In the 1st level of encryption process traingularized sub key1 is use to encrypt the plain text. In 2nd level of encryption simulated annealing method helps to generates sub key 2 for further encryption of 1st level generated traingularized encrypted text. Finally multilayer perceptron generated one time session key is used to perform
3rd level of encryption of 2nd level generated encrypted text. Recipient will use same identical multilayer perceptron guided session key for performing deciphering process for getting the simulated annealing guided intermediate cipher text. Then using sub key 2 deciphering technique is performed to get traingularized encrypted text. Finally sub key 1 is used to generate the plain text. In this proposed technique session key is not transmitted over public channel apart from few data transfers are needed for weight simulation process. Because after synchronization process both multilayer perceptron generates identical weight vector which acts as a session key. Parametric tests are done and results are compared in terms of ChiSquare test, response time in transmission with some existing classical techniques, which shows comparable results for the proposed system.
Secured wireless communication through simulated annealing guided traingulari...csandit
In this paper, simulated annealing guided traingularized encryption using multilayer perceptron
generated session key (SATMLP) has been proposed for secured wireless communication. Both
sender and receiver station uses identical multilayer perceptron and depending on the final
output of the both side multilayer perceptron, weights vector of hidden layer get tuned in both
ends. After this tunning step both perceptrons generates identical weight vectors which is
consider as an one time session key. In the 1st level of encryption process traingularized sub
key1 is use to encrypt the plain text. In 2nd level of encryption simulated annealing method
helps to generates sub key 2 for further encryption of 1st level generated traingularized
encrypted text. Finally multilayer perceptron generated one time session key is used to perform
3rd level of encryption of 2nd level generated encrypted text. Recipient will use same identical
multilayer perceptron guided session key for performing deciphering process for getting the
simulated annealing guided intermediate cipher text. Then using sub key 2 deciphering
technique is performed to get traingularized encrypted text. Finally sub key 1 is used to
generate the plain text. In this proposed technique session key is not transmitted over public
channel apart from few data transfers are needed for weight simulation process. Because after
synchronization process both multilayer perceptron generates identical weight vector which
acts as a session key. Parametric tests are done and results are compared in terms of Chi-
Square test, response time in transmission with some existing classical techniques, which shows
comparable results for the proposed system.
To detect network intrusions protects a computer network from unauthorized users, including perhaps insiders. The intrusion detector learning task is to build a predictive model (i.e. a classifier) capable of distinguishing between "bad" connections, called intrusions or attacks, and "good" normal connections
Secured transmission through multi layer perceptron in wireless communication...ijmnct
In this paper, a multilayer perceptron guided encryption/decryption (STMLP) in wireless communication
has been proposed for exchange of data/information. Multilayer perceptron transmitting systems at both
ends generate an identical output bit and the network are trained based on the output which is used to
synchronize the network at both ends and thus forms a secret-key at end of synchronizations of the
networks. Weights or hidden units of the hidden layer help to form a secret session key. The plain text is
encrypted through chaining , cascaded xoring of multilayer perceptron generated session key. If size of the
final block of plain text is less than the size of the key then this block is kept unaltered. Receiver will use
identical multilayer perceptron generated session key for performing deciphering process for getting the
plain text. Parametric tests have been done and results are compared in terms of Chi-Square test, response
time in transmission with some existing classical techniques, which shows comparable results for the
proposed technique. Variation numbers of input vectors and hidden layers will increase the confusion
/diffusion of the schemeand hence increase the security. As a result variable energy based techniques may
be achieved which may be applicable devices/interface of the heterogeneous sizes of the network/device.
ANALYSIS OF ELEMENTARY CELLULAR AUTOMATA CHAOTIC RULES BEHAVIORijsptm
We present detailed and in depth analysis of Elementary Cellular Automata (ECA) with periodic
cylindrical configuration. The focus is to determine whether Cellular Automata (CA) is suitable for the
generation of pseudo random number sequences (PRNs) of cryptographic strength. Additionally, we
identify the rules that are most suitable for such applications. It is found that only two sub-clusters of the
chaotic rule space are actually capable of producing viable PRNs. Furthermore, these two sub-clusters
consist of two majorly non-linear rules. Each sub-cluster of rules is derived from a cluster leader rule by
reflection or negation or the combined two transformations. It is shown that the members of each subcluster
share the same dynamical behavior. Results of testing the ECA running under these rules for
comprehensively large number of lattice lengths using the Diehard Test suite have shown that apart from
some anomaly, the whole output sequence can be potentially utilized for cryptographic strength pseudo
random sequence generation with sufficiently large number of p-values pass rates.
Secure Scan Design Using Redundant Scan RegisterIDES Editor
Cryptographic VLSI chip has a significant role to
resist the attacks which is the growing customer concern of
hardware security. Redundancy introduces a great amount of
randomness & non linearity in any kind circuitry
(combinational or sequential). We introduce a new type of
redundancy in sequential circuits to make redundant scan
registers that are indistinguishable with the original scan
registers. They are sequentially undetectable as well as
redundant, which makes it highly secured. The approach is
only to replace the original scan registers to modified
redundant scan registers called RScR.
A NOVEL SECURE COSINE SIMILARITY COMPUTATION SCHEME WITH MALICIOUS ADVERSARIESIJNSA Journal
Similarity coefficients play an important role in many aspects. Recently, several schemes were proposed, but these schemes aimed to compute the similarity coefficients of binary data. In this paper, a novel scheme
which can compute the coefficients of integer is proposed. To the best knowledge of us, this is the first scheme which canesist malicious adversaries attack.
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networkstheijes
To improve the accuracy of learning result, in practice multiple parties may collaborate through conducting joint Backpropagation neural network learning on the union of their respective data sets. During this process no party wants to disclose her/his data to others. Existing schemes supporting this kind of collaborative learning are either limited in the way of data partition or just consider two parties. There lacks a solution that allows two or more parties, each with an arbitrarily portioned data set, to collaboratively conduct the learning. this paper solves this open problem by utilizing the power of cloud computing. In our proposed scheme, each party encrypts his/her private data locally and uploads the ciphertexts into the cloud. The cloud then executes most of the operations pertaining to the learning algorithms over ciphertexts without knowing the original private data. To support flexible operations over ciphertexts, we adopt and tailor the BGN ‘doubly homomorphic’ encryption algorithm for the multi-party setting..
SECURED WIRELESS COMMUNICATION THROUGH SIMULATED ANNEALING GUIDED TRAINGULARI...cscpconf
In this paper, simulated annealing guided traingularized encryption using multilayer perceptron generated session key (SATMLP) has been proposed for secured wireless ommunication. Bothsender and receiver station uses identical multilayer perceptron and depending on the final output of the both side multilayer perceptron, weights vector of hidden layer get tuned in bothends. After this tunning step both perceptrons generates identical weight vectors which is consider as an one time session key. In the 1st level of encryption process traingularized sub key1 is use to encrypt the plain text. In 2nd level of encryption simulated annealing method helps to generates sub key 2 for further encryption of 1st level generated traingularized encrypted text. Finally multilayer perceptron generated one time session key is used to perform
3rd level of encryption of 2nd level generated encrypted text. Recipient will use same identical multilayer perceptron guided session key for performing deciphering process for getting the simulated annealing guided intermediate cipher text. Then using sub key 2 deciphering technique is performed to get traingularized encrypted text. Finally sub key 1 is used to generate the plain text. In this proposed technique session key is not transmitted over public channel apart from few data transfers are needed for weight simulation process. Because after synchronization process both multilayer perceptron generates identical weight vector which acts as a session key. Parametric tests are done and results are compared in terms of ChiSquare test, response time in transmission with some existing classical techniques, which shows comparable results for the proposed system.
Secured wireless communication through simulated annealing guided traingulari...csandit
In this paper, simulated annealing guided traingularized encryption using multilayer perceptron
generated session key (SATMLP) has been proposed for secured wireless communication. Both
sender and receiver station uses identical multilayer perceptron and depending on the final
output of the both side multilayer perceptron, weights vector of hidden layer get tuned in both
ends. After this tunning step both perceptrons generates identical weight vectors which is
consider as an one time session key. In the 1st level of encryption process traingularized sub
key1 is use to encrypt the plain text. In 2nd level of encryption simulated annealing method
helps to generates sub key 2 for further encryption of 1st level generated traingularized
encrypted text. Finally multilayer perceptron generated one time session key is used to perform
3rd level of encryption of 2nd level generated encrypted text. Recipient will use same identical
multilayer perceptron guided session key for performing deciphering process for getting the
simulated annealing guided intermediate cipher text. Then using sub key 2 deciphering
technique is performed to get traingularized encrypted text. Finally sub key 1 is used to
generate the plain text. In this proposed technique session key is not transmitted over public
channel apart from few data transfers are needed for weight simulation process. Because after
synchronization process both multilayer perceptron generates identical weight vector which
acts as a session key. Parametric tests are done and results are compared in terms of Chi-
Square test, response time in transmission with some existing classical techniques, which shows
comparable results for the proposed system.
To detect network intrusions protects a computer network from unauthorized users, including perhaps insiders. The intrusion detector learning task is to build a predictive model (i.e. a classifier) capable of distinguishing between "bad" connections, called intrusions or attacks, and "good" normal connections
Secured transmission through multi layer perceptron in wireless communication...ijmnct
In this paper, a multilayer perceptron guided encryption/decryption (STMLP) in wireless communication
has been proposed for exchange of data/information. Multilayer perceptron transmitting systems at both
ends generate an identical output bit and the network are trained based on the output which is used to
synchronize the network at both ends and thus forms a secret-key at end of synchronizations of the
networks. Weights or hidden units of the hidden layer help to form a secret session key. The plain text is
encrypted through chaining , cascaded xoring of multilayer perceptron generated session key. If size of the
final block of plain text is less than the size of the key then this block is kept unaltered. Receiver will use
identical multilayer perceptron generated session key for performing deciphering process for getting the
plain text. Parametric tests have been done and results are compared in terms of Chi-Square test, response
time in transmission with some existing classical techniques, which shows comparable results for the
proposed technique. Variation numbers of input vectors and hidden layers will increase the confusion
/diffusion of the schemeand hence increase the security. As a result variable energy based techniques may
be achieved which may be applicable devices/interface of the heterogeneous sizes of the network/device.
ANALYSIS OF ELEMENTARY CELLULAR AUTOMATA CHAOTIC RULES BEHAVIORijsptm
We present detailed and in depth analysis of Elementary Cellular Automata (ECA) with periodic
cylindrical configuration. The focus is to determine whether Cellular Automata (CA) is suitable for the
generation of pseudo random number sequences (PRNs) of cryptographic strength. Additionally, we
identify the rules that are most suitable for such applications. It is found that only two sub-clusters of the
chaotic rule space are actually capable of producing viable PRNs. Furthermore, these two sub-clusters
consist of two majorly non-linear rules. Each sub-cluster of rules is derived from a cluster leader rule by
reflection or negation or the combined two transformations. It is shown that the members of each subcluster
share the same dynamical behavior. Results of testing the ECA running under these rules for
comprehensively large number of lattice lengths using the Diehard Test suite have shown that apart from
some anomaly, the whole output sequence can be potentially utilized for cryptographic strength pseudo
random sequence generation with sufficiently large number of p-values pass rates.
Secure Scan Design Using Redundant Scan RegisterIDES Editor
Cryptographic VLSI chip has a significant role to
resist the attacks which is the growing customer concern of
hardware security. Redundancy introduces a great amount of
randomness & non linearity in any kind circuitry
(combinational or sequential). We introduce a new type of
redundancy in sequential circuits to make redundant scan
registers that are indistinguishable with the original scan
registers. They are sequentially undetectable as well as
redundant, which makes it highly secured. The approach is
only to replace the original scan registers to modified
redundant scan registers called RScR.
A NOVEL SECURE COSINE SIMILARITY COMPUTATION SCHEME WITH MALICIOUS ADVERSARIESIJNSA Journal
Similarity coefficients play an important role in many aspects. Recently, several schemes were proposed, but these schemes aimed to compute the similarity coefficients of binary data. In this paper, a novel scheme
which can compute the coefficients of integer is proposed. To the best knowledge of us, this is the first scheme which canesist malicious adversaries attack.
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networkstheijes
To improve the accuracy of learning result, in practice multiple parties may collaborate through conducting joint Backpropagation neural network learning on the union of their respective data sets. During this process no party wants to disclose her/his data to others. Existing schemes supporting this kind of collaborative learning are either limited in the way of data partition or just consider two parties. There lacks a solution that allows two or more parties, each with an arbitrarily portioned data set, to collaboratively conduct the learning. this paper solves this open problem by utilizing the power of cloud computing. In our proposed scheme, each party encrypts his/her private data locally and uploads the ciphertexts into the cloud. The cloud then executes most of the operations pertaining to the learning algorithms over ciphertexts without knowing the original private data. To support flexible operations over ciphertexts, we adopt and tailor the BGN ‘doubly homomorphic’ encryption algorithm for the multi-party setting..
This document contains a question bank with 370 questions related to digital signal processing. The questions cover topics such as signals and systems, sampling theory, analog to digital conversion, and signal properties. The questions range from definitions and short explanations to mathematical problems involving integrals, summations, and signal analysis. The document is intended as a study guide for a digital signal processing course taught by Dr. Nilesh Bhaskarrao Bahadure.
Cryptosystem An Implementation of RSA Using Verilogijcncs
This document describes an implementation of the RSA cryptosystem using Verilog for an FPGA. It presents the design of modules for key generation, encryption, and decryption. For key generation, it generates random prime numbers using an LFSR and primality tester, then calculates the public and private keys. Encryption and decryption are performed through modular exponentiation implemented with a right-to-left binary method. The modules are coded in Verilog and synthesized for an FPGA to provide a secure cryptosystem.
The document proposes a novel secure scheme for computing the cosine similarity between two integer vectors with malicious adversaries. The scheme uses distributed ElGamal encryption and zero-knowledge proofs to privately compute the cosine coefficient between two parties' vector inputs while preserving privacy. Security analysis shows the scheme can resist attacks from malicious adversaries by simulating the ideal functionality using the encryption scheme and zero-knowledge proofs.
Mobile ad hoc network (MANET) is an autonomous system of mobile nodes. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These cause extra challenges on security. In this paper, evaluation of prominent on-demand routing protocol i.e. AODV,MAODV,RAODV has been done by varying the network size. An effort has been carried out to do the performance evaluation of these protocols using random way point model. The simulator used is NS 2.34. The performance of either protocol has been studied by using a self created network scenario with respect to pause time.
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherSagun Man Singh Shrestha
This work is the software implementation of the concept of neural cryptography, which is a communication of two tree parity machines for agreement on a common key over a public channel. This key is utilized to encrypt a sensitive message to be transmitted over an insecure channel using Rijndael cipher. This is a new potential source for public key cryptography schemes which are not based on number theoretic functions, and have small time and memory complexities. This paper will give a brief introduction to artificial neural networks, cryptography and its types, which will help explain why the two communicating terminals converge to a common key in neural cryptography and will also cover the Rijndael (AES) cipher. This paper is intended to show that such neural key exchange protocol and AES encryption can be practically implemented in a high-level programming language viz. C++, which could be further extended in higher-level applications. Both CLI and GUI implementations of the software created using Visual C++ (.NET framework) are presented.
The document proposes a proactive secret sharing scheme using the dot product of linearly independent vectors. Proactive secret sharing periodically generates new shares from old shares to maintain the same secret over long periods of time. The proposed scheme uses orthogonal vectors to renew existing shares without changing the original secret. It is less complex and more secure than other proactive secret sharing schemes.
Cryptography using artificial neural networkMahira Banu
This document proposes using artificial neural networks for cryptography. It describes using a backpropagation neural network for decryption, where the network is trained on encrypted-decrypted message pairs. Boolean algebra is used for encryption, permuting messages and "doping" with additional bits. The neural network can then be used as a public key for decryption, with a private key for encryption. Simulation results showed the neural network approach weakened key guessing compared to other methods.
The document provides an overview of wireless sensor networks (WSNs), including their components, architecture, protocols, operating systems, simulators, challenges, features, and applications. It describes the basic components of a WSN including sensor nodes that contain sensors, processors, memory, transceivers, and power supplies. The document also outlines common WSN architectures like flat and hierarchical topologies. It discusses protocols, operating systems, and simulators used for WSNs like NS-2. Finally, it lists many applications of WSNs in fields such as healthcare, environment monitoring, and smart buildings.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The document proposes a system that combines cryptography and steganography for secure data transmission. It discusses using the DES algorithm for encryption and 2DDCT for data hiding in images. The encrypted message is then split, with part of the message hidden in an image using 2DDCT and the rest used to generate two secret keys. This combination of cryptography and steganography is intended to provide highly secure transmission even if the hidden data is retrieved.
This document discusses key reinstallation attacks against the WPA2 protocol. It describes how attackers can force nonce reuse during the 4-way handshake by manipulating messages, allowing them to decrypt encrypted data frames. This enables attacks such as stealing sensitive user information. The document outlines different techniques for different client implementations, including Android and macOS. It also discusses attacks against the group key handshake and 802.11r fast BSS transition handshake. The authors are researchers who discovered these vulnerabilities in the combination of encryption protocols and handshake procedures in WPA2.
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
Abstract: Elliptic Curve Cryptography (ECC) plays an important role in today’s public key based security
systems. . ECC is a faster and more secure method of encryption as compared to other Public Key
Cryptographic algorithms. This paper focuses on the performance advantages of using ECC in the wireless
network. So in this paper its algorithm has been implemented and analyzed for various bit length inputs. The
Private key is known only to sender and receiver and hence data transmission is secure.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document summarizes quantum key distribution (QKD) and its advantages over traditional cryptography. QKD uses the properties of quantum mechanics to generate a shared secret key between two parties. In QKD, single photons are used to encode and transmit encryption keys, and any attempt to intercept or measure the photons during transmission would introduce detectable errors. This allows QKD to detect eavesdropping, unlike traditional cryptography which relies on computational difficulty. The document discusses several QKD protocols including BB84 and explains the basic steps of key generation and encryption/decryption using the shared quantum key. It concludes that while experimental, QKD provides significantly stronger security compared to classical cryptography by leveraging the principles of quantum physics.
On how to change the utility curve of deep learning to make deep learning projects deliver an ROI no matter how accurate the machine learning system is - presented at the Nasscom Analytics Summit 2018.
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
This document summarizes a research paper on using elliptic curve cryptography for message authentication. It begins with an introduction to elliptic curve cryptography and how it can provide equivalent security to other public key encryption methods but with smaller key sizes. It then describes the proposed methodology which includes generating an ECC key pair, encrypting a message with the public key, transmitting the encrypted message, and decrypting it with the private key. The results show a message being encrypted and decrypted correctly using this ECC process. It concludes that ECC can provide an efficient method for authentication in systems like vehicular networks due to its lower computation and communication overhead compared to other encryption methods.
A review of soft computing techniques in materials engineeringIAEME Publication
This document provides a review of soft computing techniques that have been applied in materials engineering, with a focus on sheet metals. It discusses that soft computing methods like artificial neural networks, genetic algorithms, and other evolutionary algorithms have shown promising results when applied to problems in materials design, modeling properties, process optimization and control. The document reviews several studies that have used these techniques for materials proportion prediction, properties modeling, optimization and other applications. However, it also notes that the interface between materials engineering and intelligent systems techniques is still unclear and more work needs to be done to formalize the methodology.
Performance enhancement of shunt active power filter with fuzzy and hysteresi...Asoka Technologies
This paper proposes fuzzy and hysteresis controllers based three phase Shunt Active Power Filter
for current harmonic compensation to improve the performance of 3ɸ supply system feeding
non- linear loads. The Shunt Active Power Filter is used to eliminate current harmonics. The dc
link control strategy is based on the fuzzy logic controller. Gating pulses for the Shunt Active
Filter is generated using Hysteresis current controller based Pulse width modulation technique.
The proposed model is simulated in MATLAB/SIMULINK. Simulation results show that the
dynamic behavior is better than the conventional Proportional- Integral (PI) controller and is
found to be more robust for changes in load.
PI and fuzzy logic controllers for shunt active power filterISA Interchange
This paper presents a shunt Active Power Filter (APF) for power quality improvements in terms of harmonics and reactive power compensation in the distribution network. The compensation process is based only on source current extraction that reduces the number of sensors as well as its complexity. A Proportional Integral (PI) or Fuzzy Logic Controller (FLC) is used to extract the required reference current from the distorted line-current, and this controls the DC-side capacitor voltage of the inverter. The shunt APF is implemented with PWM-current controlled Voltage Source Inverter (VSI) and the switching patterns are generated through a novel Adaptive-Fuzzy Hysteresis Current Controller (A-F-HCC). The proposed adaptive-fuzzy-HCC is compared with fixed-HCC and adaptive-HCC techniques and the superior features of this novel approach are established. The FLC based shunt APF system is validated through extensive simulation for diode-rectifier/R–L loads.
Applying soft computing techniques to corporate mobile security systemsPaloma De Las Cuevas
Corporate workers increasingly use their own devices for work purposes, in a trend that has come to be called the "Bring Your Own Device" (BYOD) philosophy and companies are starting to include it in their policies. For this reason, corporate security systems need to be redefined and adapted, by the corporate Information Technology (IT) department, to these emerging behaviours. This work proposes applying soft-computing techniques, in order to help the Chief Security Officer (CSO) of a company (in charge of the IT department) to improve the
security policies.
The actions performed be company workers under a BYOD situation will be treated as events: an action or set of actions yielding to a response. Some of those events might cause a non compliance with some corporate policies, and then it would be necessary to define a set of security rules (action, consequence). Furthermore, the processing of the extracted knowledge will allow the rules to be adapted.
Design of shunt active power filter to mitigate harmonicsager alswed
The designed three phase SAPF based on instantaneous p-q theory was simulated in MATLAB /SIMULINK by using different load conditions i.e. R-L load, suddenly connected R-L load, and additional unbalance R load. Its application was successfully proved and the validity achieved by minimizing the harmonics and improving PF as summarized in Table 2. Consequently, the supply current is almost pure sinusoidal. THD observed was fund to be within the prescribed limits of 5% as recommended by IEEE-519 standard.
This document contains a question bank with 370 questions related to digital signal processing. The questions cover topics such as signals and systems, sampling theory, analog to digital conversion, and signal properties. The questions range from definitions and short explanations to mathematical problems involving integrals, summations, and signal analysis. The document is intended as a study guide for a digital signal processing course taught by Dr. Nilesh Bhaskarrao Bahadure.
Cryptosystem An Implementation of RSA Using Verilogijcncs
This document describes an implementation of the RSA cryptosystem using Verilog for an FPGA. It presents the design of modules for key generation, encryption, and decryption. For key generation, it generates random prime numbers using an LFSR and primality tester, then calculates the public and private keys. Encryption and decryption are performed through modular exponentiation implemented with a right-to-left binary method. The modules are coded in Verilog and synthesized for an FPGA to provide a secure cryptosystem.
The document proposes a novel secure scheme for computing the cosine similarity between two integer vectors with malicious adversaries. The scheme uses distributed ElGamal encryption and zero-knowledge proofs to privately compute the cosine coefficient between two parties' vector inputs while preserving privacy. Security analysis shows the scheme can resist attacks from malicious adversaries by simulating the ideal functionality using the encryption scheme and zero-knowledge proofs.
Mobile ad hoc network (MANET) is an autonomous system of mobile nodes. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These cause extra challenges on security. In this paper, evaluation of prominent on-demand routing protocol i.e. AODV,MAODV,RAODV has been done by varying the network size. An effort has been carried out to do the performance evaluation of these protocols using random way point model. The simulator used is NS 2.34. The performance of either protocol has been studied by using a self created network scenario with respect to pause time.
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherSagun Man Singh Shrestha
This work is the software implementation of the concept of neural cryptography, which is a communication of two tree parity machines for agreement on a common key over a public channel. This key is utilized to encrypt a sensitive message to be transmitted over an insecure channel using Rijndael cipher. This is a new potential source for public key cryptography schemes which are not based on number theoretic functions, and have small time and memory complexities. This paper will give a brief introduction to artificial neural networks, cryptography and its types, which will help explain why the two communicating terminals converge to a common key in neural cryptography and will also cover the Rijndael (AES) cipher. This paper is intended to show that such neural key exchange protocol and AES encryption can be practically implemented in a high-level programming language viz. C++, which could be further extended in higher-level applications. Both CLI and GUI implementations of the software created using Visual C++ (.NET framework) are presented.
The document proposes a proactive secret sharing scheme using the dot product of linearly independent vectors. Proactive secret sharing periodically generates new shares from old shares to maintain the same secret over long periods of time. The proposed scheme uses orthogonal vectors to renew existing shares without changing the original secret. It is less complex and more secure than other proactive secret sharing schemes.
Cryptography using artificial neural networkMahira Banu
This document proposes using artificial neural networks for cryptography. It describes using a backpropagation neural network for decryption, where the network is trained on encrypted-decrypted message pairs. Boolean algebra is used for encryption, permuting messages and "doping" with additional bits. The neural network can then be used as a public key for decryption, with a private key for encryption. Simulation results showed the neural network approach weakened key guessing compared to other methods.
The document provides an overview of wireless sensor networks (WSNs), including their components, architecture, protocols, operating systems, simulators, challenges, features, and applications. It describes the basic components of a WSN including sensor nodes that contain sensors, processors, memory, transceivers, and power supplies. The document also outlines common WSN architectures like flat and hierarchical topologies. It discusses protocols, operating systems, and simulators used for WSNs like NS-2. Finally, it lists many applications of WSNs in fields such as healthcare, environment monitoring, and smart buildings.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The document proposes a system that combines cryptography and steganography for secure data transmission. It discusses using the DES algorithm for encryption and 2DDCT for data hiding in images. The encrypted message is then split, with part of the message hidden in an image using 2DDCT and the rest used to generate two secret keys. This combination of cryptography and steganography is intended to provide highly secure transmission even if the hidden data is retrieved.
This document discusses key reinstallation attacks against the WPA2 protocol. It describes how attackers can force nonce reuse during the 4-way handshake by manipulating messages, allowing them to decrypt encrypted data frames. This enables attacks such as stealing sensitive user information. The document outlines different techniques for different client implementations, including Android and macOS. It also discusses attacks against the group key handshake and 802.11r fast BSS transition handshake. The authors are researchers who discovered these vulnerabilities in the combination of encryption protocols and handshake procedures in WPA2.
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
Abstract: Elliptic Curve Cryptography (ECC) plays an important role in today’s public key based security
systems. . ECC is a faster and more secure method of encryption as compared to other Public Key
Cryptographic algorithms. This paper focuses on the performance advantages of using ECC in the wireless
network. So in this paper its algorithm has been implemented and analyzed for various bit length inputs. The
Private key is known only to sender and receiver and hence data transmission is secure.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document summarizes quantum key distribution (QKD) and its advantages over traditional cryptography. QKD uses the properties of quantum mechanics to generate a shared secret key between two parties. In QKD, single photons are used to encode and transmit encryption keys, and any attempt to intercept or measure the photons during transmission would introduce detectable errors. This allows QKD to detect eavesdropping, unlike traditional cryptography which relies on computational difficulty. The document discusses several QKD protocols including BB84 and explains the basic steps of key generation and encryption/decryption using the shared quantum key. It concludes that while experimental, QKD provides significantly stronger security compared to classical cryptography by leveraging the principles of quantum physics.
On how to change the utility curve of deep learning to make deep learning projects deliver an ROI no matter how accurate the machine learning system is - presented at the Nasscom Analytics Summit 2018.
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
This document summarizes a research paper on using elliptic curve cryptography for message authentication. It begins with an introduction to elliptic curve cryptography and how it can provide equivalent security to other public key encryption methods but with smaller key sizes. It then describes the proposed methodology which includes generating an ECC key pair, encrypting a message with the public key, transmitting the encrypted message, and decrypting it with the private key. The results show a message being encrypted and decrypted correctly using this ECC process. It concludes that ECC can provide an efficient method for authentication in systems like vehicular networks due to its lower computation and communication overhead compared to other encryption methods.
A review of soft computing techniques in materials engineeringIAEME Publication
This document provides a review of soft computing techniques that have been applied in materials engineering, with a focus on sheet metals. It discusses that soft computing methods like artificial neural networks, genetic algorithms, and other evolutionary algorithms have shown promising results when applied to problems in materials design, modeling properties, process optimization and control. The document reviews several studies that have used these techniques for materials proportion prediction, properties modeling, optimization and other applications. However, it also notes that the interface between materials engineering and intelligent systems techniques is still unclear and more work needs to be done to formalize the methodology.
Performance enhancement of shunt active power filter with fuzzy and hysteresi...Asoka Technologies
This paper proposes fuzzy and hysteresis controllers based three phase Shunt Active Power Filter
for current harmonic compensation to improve the performance of 3ɸ supply system feeding
non- linear loads. The Shunt Active Power Filter is used to eliminate current harmonics. The dc
link control strategy is based on the fuzzy logic controller. Gating pulses for the Shunt Active
Filter is generated using Hysteresis current controller based Pulse width modulation technique.
The proposed model is simulated in MATLAB/SIMULINK. Simulation results show that the
dynamic behavior is better than the conventional Proportional- Integral (PI) controller and is
found to be more robust for changes in load.
PI and fuzzy logic controllers for shunt active power filterISA Interchange
This paper presents a shunt Active Power Filter (APF) for power quality improvements in terms of harmonics and reactive power compensation in the distribution network. The compensation process is based only on source current extraction that reduces the number of sensors as well as its complexity. A Proportional Integral (PI) or Fuzzy Logic Controller (FLC) is used to extract the required reference current from the distorted line-current, and this controls the DC-side capacitor voltage of the inverter. The shunt APF is implemented with PWM-current controlled Voltage Source Inverter (VSI) and the switching patterns are generated through a novel Adaptive-Fuzzy Hysteresis Current Controller (A-F-HCC). The proposed adaptive-fuzzy-HCC is compared with fixed-HCC and adaptive-HCC techniques and the superior features of this novel approach are established. The FLC based shunt APF system is validated through extensive simulation for diode-rectifier/R–L loads.
Applying soft computing techniques to corporate mobile security systemsPaloma De Las Cuevas
Corporate workers increasingly use their own devices for work purposes, in a trend that has come to be called the "Bring Your Own Device" (BYOD) philosophy and companies are starting to include it in their policies. For this reason, corporate security systems need to be redefined and adapted, by the corporate Information Technology (IT) department, to these emerging behaviours. This work proposes applying soft-computing techniques, in order to help the Chief Security Officer (CSO) of a company (in charge of the IT department) to improve the
security policies.
The actions performed be company workers under a BYOD situation will be treated as events: an action or set of actions yielding to a response. Some of those events might cause a non compliance with some corporate policies, and then it would be necessary to define a set of security rules (action, consequence). Furthermore, the processing of the extracted knowledge will allow the rules to be adapted.
Design of shunt active power filter to mitigate harmonicsager alswed
The designed three phase SAPF based on instantaneous p-q theory was simulated in MATLAB /SIMULINK by using different load conditions i.e. R-L load, suddenly connected R-L load, and additional unbalance R load. Its application was successfully proved and the validity achieved by minimizing the harmonics and improving PF as summarized in Table 2. Consequently, the supply current is almost pure sinusoidal. THD observed was fund to be within the prescribed limits of 5% as recommended by IEEE-519 standard.
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...pijans
In this paper, a multilayer perceptron guided key generation for encryption/decryption (MLPKG) has been
proposed through recursive replacement using mutated character code generation for wireless
communication of data/information. Multilayer perceptron transmitting systems at both ends accept an
identical input vector, generate an output bit and the network are trained based on the output bit which is
used to form a protected variable length secret-key. For each session, different hidden layer of multilayer
neural network is selected randomly and weights or hidden units of this selected hidden layer help to form
a secret session key. The plain text is encrypted using mutated character code table. Intermediate cipher
text is yet again encrypted through recursive replacement technique to from next intermediate encrypted
text which is again encrypted to form the final cipher text through chaining , cascaded xoring of multilayer
perceptron generated session key. If size of the final block of intermediate cipher text is less than the size of
the key then this block is kept unaltered. Receiver will use identical multilayer perceptron generated
session key for performing deciphering process for getting the recursive replacement encrypted cipher text
and then mutated character code table is used for decoding. Parametric tests have been done and results
are compared in terms of Chi-Square test, response time in transmission with some existing classical
techniques, which shows comparable results for the proposed technique.
Soft computing based cryptographic technique using kohonen's selforganizing m...ijfcstjournal
In this paper a novel soft computing based cryptographic technique based on synchronization of two
Kohonen's Self-Organizing Feature Map (KSOFM) between sender and receiver has been proposed. In this
proposed technique KSOFM based synchronization is performed for tuning both sender and receiver. After
the completion of the tuning identical session key get generates at the both sender and receiver end with the
help of synchronized KSOFM. This synchronized network can be used for transmitting message using any
light weight encryption/decryption algorithm with the help of identical session key of the synchronized
network. Exhaustive parametric tests are done and results are compared with some existing classical
techniques, which show comparable results for the proposed system.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes a research paper that proposes using a recurrent neural network trained with an extended Kalman filter to model the state space evolution of chaotic systems from time series output data. It applies this method to model the famous sunspot time series. The neural network is trained to minimize the error between the actual and predicted time series. Once trained, the network states generate the state space evolution. Analyzing this state space for the sunspot data, the researchers found it was similar to the Rossler chaotic system. They validated the model by calculating Lyapunov exponents from the state space evolution.
Optimal parameter selection for unsupervised neural network using genetic alg...IJCSEA Journal
K-means Fast Learning Artificial Neural Network (K-FLANN) is an unsupervised neural network requires two parameters: tolerance and vigilance. Best Clustering results are feasible only by finest parameters specified to the neural network. Selecting optimal values for these parameters is a major problem. To solve this issue, Genetic Algorithm (GA) is used to determine optimal parameters of K-FLANN for finding groups in multidimensional data. K-FLANN is a simple topological network, in which output nodes grows dynamically during the clustering process on receiving input patterns. Original K-FLANN is enhanced to select winner unit out of the matched nodes so that stable clusters are formed with in a less number of epochs. The experimental results show that the GA is efficient in finding optimal values of parameters from the large search space and is tested using artificial and synthetic data sets.
Neuro genetic key based recursive modulo 2 substitution using mutated charact...ijcsity
In this paper, a neural genetic key based technique for encryption (NGKRMSMC) has been proposed
through recursive modulo
-
2 substitution using mutated character code generation for online wireless
communication of data/information.
Both sender and receive
r get synchronized based on their final output
.
The length of the key depends on the number of input and output neurons. Coordinated matching weight
vectors assist to generate chromosomes pool. Genetic secret key is obtained using fitness function, which i
s
the hamming distance between two chromosomes. Crossover and mutation are used to add elitism of
chromosomes.
At first
mutated character code table
based encryption strategy get perform on plain text.
.
Then the intermediate cipher text is yet again encry
pted through recursive positional modulo
-
2 substitution
technique to from next level encrypted text. This 2nd level intermediate cipher text is again encrypted to
form the final cipher text through chaining and cascaded xoring of neuro genetic key with the
identical
length intermediate cipher text block.
Receiver will perform same symmetric operation to get back the plain
text using identical key
This document describes a study that developed a neuro-fuzzy system for predicting electricity consumption. The neuro-fuzzy system combines the learning capabilities of neural networks with the linguistic rule interpretation of fuzzy inference systems. It was applied to predict future electricity consumption in Northern Cyprus based on past consumption data. The system was trained using a supervised learning algorithm to determine optimal parameters. Simulation results showed the neuro-fuzzy system achieved more accurate predictions of electricity consumption than a neural network model alone, using fewer training epochs.
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...TELKOMNIKA JOURNAL
This paper shows a new technic applicable for the digital devices that are the result of the finite’s
effect precision in the chaotic dynamics used in the coupled technic and the chaotic map’s perturbation
technics used for the generation of a Pseudo-Random Number Generator (PRNGs).The use of the
pseudo- chaotic sequences coupled to the orbit perturbation method in the chaotic logistic map and the
NewPiece-Wise Linear Chaotic Map (NPWLCM). The pseudo random number generator’s originality
proposed from the perturbation of the chaotic recurrence. Furthermore the outputs of the binary sequences
with NPWLCM are reconstructed conventionally with the Bernoulli’s sequences shifts map to change the
shapes with the bitwise permetation then the results in simulation are shown in progress.After being
perturbed, the chaotic system can generate the chaotic binary sequences in uniform distribution and the
statistical properties invulnerable analysis. This generator also has many advantages in the possible useful
applications of spread spectrum digitalimages, such as sensitive secret keys, random uniform distribution
of pixels in Crypto system in secure and synchronize communication.
Implementation of Back-Propagation Neural Network using Scilab and its Conver...IJEEE
Artificial neural network has been widely used for solving non-linear complex tasks. With the development of computer technology, machine learning techniques are becoming good choice. The selection of the machine learning technique depends upon the viability for particular application. Most of the non-linear problems have been solved using back propagation based neural network. The training time of neural network is directly affected by convergence speed. Several efforts are done to improve the convergence speed of back propagation algorithm. This paper focuses on the implementation of back-propagation algorithm and an effort to improve its convergence speed. The algorithm is written in SCILAB. UCI standard data set is used for analysis purposes. Proposed modification in standard backpropagation algorithm provides substantial improvement in the convergence speed.
Encoder for (7,3) cyclic code using matlabSneheshDutta
This document provides an overview of cyclic codes including:
- What cyclic codes are and their properties of error detection and correction.
- The method of generating cyclic codes by multiplying message polynomials by a generator polynomial.
- How to systematically encode cyclic codes in three steps.
- The encoding and decoding circuits including Meggitt decoder.
- An example of a (7,3) cyclic code implemented in Matlab showing the encoding, corruption with errors, and decoding.
- How cyclic codes can detect errors through syndrome computation and lookup tables.
- Applications of cyclic codes in message identification.
Implementation of a stream cipher based on bernoulli's mapijcsit
A stream cipher was implemented on a FPGA. The keystream, for some authors the most important
element, was developed using an algorithm based on Bernoulli’s chaotic map. When dynamic systems are
digitally implemented, a normal degradation appears and disturbs their behavior; for such reason, a
mechanism was needed. The proposed mechanism gives a solution for degradation issue and its
implementation is not complicated. Finally, the implemented cipher includes 8 stages and 2 pseudo-random
number generators (PRNG), such cipher was tested using NIST testes. Once its designing stage, it was
implemented using a developing FPGA board.
The secure communication through synchronization between two identic chaotic systems have
recently gained a lot of interest. To implement a robust secure system based on synchronization, there is
always a need to generate new discrete dynamical systems and investigate their performances in terms of
amount of randomness they have and the ability to achieve synchronization smoothly. In this work, a new
chaotic system, named Nahrain, is proposed and tested for the possible use in secure transmission via
chaos synchronization as well as in cryptography applications. The performance of the proposed chaotic
system is tested using 0-1 test, while NIST suite tests are used to check the randomness statistical
properties. The nonlinear control laws are used to verify the synchronization of master-slave parts of the
proposed system. The simulation results show that Nahrain system has chaotic behavior and
synchronizable, while the equivalent binary sequence of the system has excellent randomness statistical
properties. The numerical results obtained using MATLAB for 0-1 test was 0.9864, and for frequency test
was 0.4202, while for frequency test within a block was 0.4311. As a result, the new proposed system can
be used to develop efficient encryption and synchronization algorithms for multimedia secure transmission
applications.
IRJET- Analysis of Chaotic, Hyperchaotic and DNA Sequence for Image EncryptionIRJET Journal
The document proposes a new image encryption method that uses both a hyperchaotic sequence and DNA sequence. A 4D hyperchaotic system is used to generate a pseudorandom sequence, which is then applied to almost all steps of the encryption process. The intensity values of an input image are converted to a binary digit stream and globally scrambled using the hyperchaotic sequence. DNA algebraic operations and complementation are then performed between the hyperchaotic sequence and a DNA sequence to further encrypt the image. Experimental results demonstrate the proposed method achieves better encryption performance than other state-of-the-art methods in terms of quality, security, and robustness against noise and cropping attacks.
The document describes a multilayer neural network presentation. It discusses key concepts of neural networks including their architecture, types of neural networks, and backpropagation. The key points are:
1) Neural networks are composed of interconnected processing units (neurons) that can learn relationships in data through training. They are inspired by biological neural systems.
2) Common network architectures include multilayer perceptrons and recurrent networks. Backpropagation is commonly used to train multilayer feedforward networks by propagating errors backwards.
3) Neural networks have advantages like the ability to model complex nonlinear relationships, adapt to new data, and extract patterns from imperfect data. They are well-suited for problems like classification.
Design of optimized Interval Arithmetic MultiplierVLSICS Design
Many DSP and Control applications that require the user to know how various numerical errors(uncertainty) affect the result. This uncertainty is eliminated by replacing non-interval values with intervals. Since most DSPs operate in real time environments, fast processors are required to implement interval arithmetic. The goal is to develop a platform in which Interval Arithmetic operations are performed at the same computational speed as present day signal processors. So we have proposed the design and implementation of Interval Arithmetic multiplier, which operates with IEEE 754 numbers. The proposed unit consists of a floating point CSD multiplier, Interval operation selector. This architecture implements an algorithm which is faster than conventional algorithm of Interval multiplier . The cost overhead of the proposed unit is 30% with respect to a conventional floating point multiplier. The
performance of proposed architecture is better than that of a conventional CSD floating-point multiplier, as it can perform both interval multiplication and floating-point multiplication as well as Interval comparisons
Performance analysis of transformation and bogdonov chaotic substitution base...IJECEIAES
In this article, a combined Pseudo Hadamard transformation and modified Bogdonav chaotic generator based image encryption technique is proposed. Pixel position transformation is performed using Pseudo Hadamard transformation and pixel value variation is made using Bogdonav chaotic substitution. Bogdonav chaotic generator produces random sequences and it is observed that very less correlation between the adjacent elements in the sequence. The cipher image obtained from the transformation stage is subjected for substitution using Bogdonav chaotic sequence to break correlation between adjacent pixels. The cipher image is subjected for various security tests under noisy conditions and very high degree of similarity is observed after deciphering process between original and decrypted images.
1. The document describes an encryption algorithm that uses the Lorenz chaotic system for both permutation and diffusion of pixels in an image. It iterates the Lorenz system to generate values to shuffle pixels and generate a keystream for diffusion.
2. The decryption process is similar but reversed - it uses the Lorenz system to generate the inverse permutation and remove the effects of diffusion.
3. The algorithm is concluded to address security and efficiency issues in existing image ciphers by using a single chaotic system for both permutation and diffusion, and introducing a novel pixel shuffling mechanism.
The document describes multilayer neural networks and their use for classification problems. It discusses how neural networks can handle continuous-valued inputs and outputs unlike decision trees. Neural networks are inherently parallel and can be sped up through parallelization techniques. The document then provides details on the basic components of neural networks, including neurons, weights, biases, and activation functions. It also describes common network architectures like feedforward networks and discusses backpropagation for training networks.
Chaotic Secure Communication Using Iterated Filtering Method P. Karthik -Assistant Professor,
D. Gokul Prashanth -UG Scholar,
T. Gokul - UG Scholar,
Department of Electronics and Communication Engineering,
SNS College of Engineering, Coimbatore, India.
This document proposes a new classifier based on recurrent neural networks using multiple binary-output networks. Instead of one large neural network with many outputs, it uses multiple simple recurrent neural networks, each trained on a single class and outputting a binary true/false prediction. A decision layer is added to each network to determine the final classification from the sequence of outputs. The method is tested on a database of 17,000 handwritten Iranian city names, achieving a top-1 classification rate of 83.9% and average reliability of 72.3%. Experimental results show the effectiveness of using multiple simpler networks instead of one complex network for classification.
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATIONijasa
Social media platform has greatly enhanced human interactive activities in the virtual community. Virtual
socialization has positively influenced social bonding among social media users irrespective of one’s
location in the connected global village. Human user and social bot user are the two types of social media
users. While human users personally operate their social media accounts, social bot users are developed
software that manages a social media account for the human user called the botmaster. This botmaster in
most cases are hackers with bad intention of attacking social media users through various attacking mode
using social bots. The aim of this research work is to design an intelligent framework that will prevent
attacks through social bots on social media network platforms.
DESIGN OF A MINIATURE RECTANGULAR PATCH ANTENNA FOR KU BAND APPLICATIONSijasa
A significant portion of communication devices employs microstrip antennas because of their compact size,
low profile, and ability to conform to both planar and non-planar surfaces. To achieve this, we present a
miniature inset-fed rectangular patch antenna using partial ground plane for Ku band applications. The
proposed antenna design used an operating frequency of 15.5 GHz, a FR4 substrate with a dielectric
constant of 4.3, and a thickness of 1.4 mm. It is fed by a 50 Ω inset feedline. Computer simulation
technology (CST) software is used to design, simulate, and analyze. The simulation yields the antenna
performance parameters, including return loss (S11), bandwidth, VSWR, gain, directivity, and radiation
efficiency. The simulation findings revealed that the proposed antenna resonated at 15.5 GHz, with a
return loss of -22.312 dB, a bandwidth of 2.73 GHz (2730 MHz), VSWR of 1.17, a gain of 3.843 dBi, a
directivity of 5.926 dBi, and an antenna efficiency of -2.083 dB (61.901%).
SMART SOUND SYSTEM APPLIED FOR THE EXTENSIVE CARE OF PEOPLE WITH HEARING IMPA...ijasa
We, as normal people, have access to a potent communication tool, which is sound. Although we can continuously gather, analyse, and interpret sounds thanks to our sense of hearing, it can be challenging for people with hearing impairment to perceive their surroundings through sound. Also known as PWHI (People with Hearing Impairment). Auditory/phonic impairment is one of the most prevailing sensory deficits in humans at present. Fortunately, there is room to apply a solution to this issue, given the development of technology. Our project involves capturing ambient sounds from the user’s surroundings and notifying the user through a mobile application using IoT and Deep Learning. Its architecture offers sound recognition using a tool, such as a microphone, to capture sounds from the user's surroundings. These sounds are identified and categorized as ambient sounds, like a doorbell, baby cry, and dog barking; as well as emergency-related sounds, such as alarms, sirens, et
AN INTELLIGENT AND DATA-DRIVEN MOBILE VOLUNTEER EVENT MANAGEMENT PLATFORM USI...ijasa
In Lewis and Clark High School’s Key Club, meetings are always held in a crowded classroom. The
system of event sign-up is inefficient and hinders members from joining events. This has led to students
becoming discouraged from joining Key Club and often resulted in a lack of volunteers for important
events. The club needed a more efficient way of connecting volunteers with volunteering opportunities. To
solve this problem, we developed a VolunteerMatch Mobile application using Dart and Flutter framework
for Key Club to use. The next steps will be to add a volunteer event recommendation and matching feature,
utilizing the results from the research on machine learning models and algorithms in this paper.
A STUDY OF IOT BASED REAL-TIME SOLAR POWER REMOTE MONITORING SYSTEMijasa
We have Developed an IoT-based real-time solar power monitoring system in this paper. It seeks an opensource IoT solution that can collect real-time data and continuously monitor the power output and environmental conditions of a photovoltaic panel.The Objective of this work is to continuously monitor the status of various parameters associated with solar systems through sensors without visiting manually, saving time and ensures efficient power output from PV panels while monitoring for faulty solar panels, weather conditionsand other such issues that affect solar effectiveness.Manually, the user must use a multimeter to determine what value of measurement of the system is appropriate for appliance consumers, which is difficult for the larger System. But the Solar Energy Monitoring system is designed to make it easier for users to use the solar system.This system is comprised of a microcontroller (Node MCU), a PV panel, sensors (INA219 Current Module, Digital Temperature Sensor, LDR), a Battery Charger Module, and a battery. The data from the PV panels and other appliances are sent to the cloud (Thingspeak) via the internet using IoT technology and a Wi-Fi module (NodeMCU). It also allows users in remote areas to monitor the parameters of the solar power plant using connected devices. The user can view the current, previous, and average parameters of the solar PV system, such as voltage, current, temperature, and light intensity using a Graphical User Interface. This will facilitate fault detection and maintenance of the solar power plant easier and saves time.
SENSOR BASED SMART IRRIGATION SYSTEM WITH MONITORING AND CONTROLLING USING IN...ijasa
This document presents a sensor-based smart irrigation system using IoT. The system uses soil moisture, temperature, and humidity sensors connected to a NodeMCU microcontroller. The sensor data is sent to a cloud server (ThingSpeak) and displayed as graphs on a website. A web page allows users to control a water pump remotely. The system was tested on a field over one day, recording sensor data and pump status in the morning, afternoon and night. Test results showed the pump turned on when soil moisture fell below a threshold and off when above a threshold, conserving water. The smart irrigation system allows remote monitoring and control to help farmers irrigate crops efficiently with minimal human effort or water waste.
COMPARISON OF BIT ERROR RATE PERFORMANCE OF VARIOUS DIGITAL MODULATION SCHEME...ijasa
This document compares the bit error rate (BER) performance of different digital modulation schemes (BPSK, QPSK, 16-QAM) over AWGN and Rayleigh fading channels using Simulink simulations. It finds that BPSK outperforms QPSK and 16-QAM in both channels. The BER is evaluated for these modulation schemes using two equalization techniques: constant modulus algorithm (CMA) and maximum likelihood sequence estimation (MLSE). According to the results, BPSK has better BER performance than QPSK and 16-QAM when using either equalizer, especially at lower SNR values. CMA equalization works better than MLSE equalization for all modulation schemes based on the BER values obtained.
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...ijasa
This document analyzes the performance of a 4x4 Vertical Bell Labs Layered Space-Time (V-Blast) multiple-input multiple-output multi-carrier code division multiple access (MIMO MC-CDMA) wireless communication system using different digital modulation schemes. The system uses minimum mean square error (MMSE) signal detection and 1/2-rated convolution and cyclic redundancy check (CRC) channel encoding. Simulation results show that binary phase-shift keying (BPSK) modulation outperforms differential phase-shift keying (DPSK), quadrature phase-shift keying (QPSK), and 16-quadrature amplitude modulation (QAM), achieving the lowest bit error rate (BER) especially at
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGijasa
Cloud computing is an anthology in which one or more computers are connected in a network. Cloud
computing is a cluster of lattice computing, autonomic computing and utility computing. Cloud provides an
on demand services to the users. Many numbers of users access the cloud to utilize the cloud resources.
The security is one the major problem in cloud computing. Hence security is a major issue in cloud
computing. Providing security is a major requirement of cloud computing. The study enclose all the
security issues and attack issues in cloud computing.
The International Journal of Ambient Systems and Applications (IJASA) ijasa
The International Journal of Ambient Systems and applications is a quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of ambient Systems. The journal focuses on all technical and practical aspects of ambient Systems, networks, technologies and applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced ambient Systems and establishing new collaborations in these areas.Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in ambient Systems.
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGijasa
Cloud computing is an anthology in which one or more computers are connected in a network. Cloud computing is a cluster of lattice computing, autonomic computing and utility computing. Cloud provides an on demand services to the users. Many numbers of users access the cloud to utilize the cloud resources. The security is one the major problem in cloud computing. Hence security is a major issue in cloud computing. Providing security is a major requirement of cloud computing. The study enclose all the security issues and attack issues in cloud computing.
TOWARD ORGANIC COMPUTING APPROACH FOR CYBERNETIC RESPONSIVE ENVIRONMENTijasa
The developpment of the Internet of Things (IoT) concept revives Responsive Environments (RE) technologies. Nowadays, the idea of a permanent connection between physical and digital world is technologically possible. The capillar Internet relates to the Internet extension into daily appliances such as they become actors of Internet like any hu-man. The parallel development of Machine-to-Machine
communications and Arti cial Intelligence (AI) technics start a new area of cybernetic. This paper presents an approach for Cybernetic Organism (Cyborg) for RE based on Organic Computing (OC). In such approach, each appli-ance is a part of an autonomic system in order to control a physical environment.The underlying idea is that such systems must have self-x properties in order to adapt their behavior to
external disturbances with a high-degree of autonomy.
A STUDY ON DEVELOPING A SMART ENVIRONMENT IN AGRICULTURAL IRRIGATION TECHNIQUEijasa
Maintaining a good irrigation system is a necessity in today’s water scarcity environment. This paper describes a new approach for automated Smart Irrigation (SIR) system in agricultural management. Using
various types of sensors in the crop field area, temperature and moisture value of the soil is monitored.Based on the sensed data, SIR will automatically decide about the necessary action for irrigation and also notifies the user. The system will also focus on the reduction of energy consumption by the sensors during communication.
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYijasa
Denial of Service (DoS) or Distributed-Denial of Service (DDoS) is major threat to network security.
Network is collection of nodes that interconnect with each other for exchange the Information. This
information is required for that node is kept confidentially. Attacker in network computer captures this
information that is confidential and misuse the network. Hence security is one of the major issues. There
are one or many attacks in network. One of the major threats to internet service is DDoS (Distributed
denial of services) attack. DDoS attack is a malicious attempt to suspending or interrupting services to
target node. DDoS or DoS is an attempt to make network resource or the machine is unavailable to its
intended user. Many ideas are developed for avoiding the DDoS or DoS. DDoS happen in two ways
naturally or it may due to some botnets .Various schemes are developed defense against to this attack.
Main idea of this paper is present basis of DDoS attack. DDoS attack types, DDoS attack components,
survey on different mechanism to prevent DDoS
The smart mobile terminal operator platform Android is getting popular all over the world with its wide variety of applications and enormous use in numerous spheres of our daily life. Considering the fact of increasing demand of home security and automation, an Android based control system is presented in this paper where the proposed system can maintain the security of home main entrance and also the car door lock. Another important feature of the designed system is that it can control the overall appliances in a room. The mobile to security system or home automation system interface is established through Bluetooth. The hardware part is designed with the PIC microcontroller.
The World Wide Web is booming and radically vibrant due to the well established standards and widely accountable framework which guarantees the interoperability at various levels of the application and the society as a whole. So far, the web has been functioning at the random rate on the basis of the human intervention and some manual processing but the next generation web which the researchers called semantic web, edging for automatic processing and machine-level understanding. The well set notion, Semantic Web would be turn possible if only there exists the further levels of interoperability prevails among the applications and networks. In achieving this interoperability and greater functionality among the applications, the W3C standardization has already released the well defined standards such as RDF/RDF Schema and OWL. Using XML as a tool for semantic interoperability has not achieved anything effective and failed to bring the interconnection at the larger level. This leads to the further inclusion of inference layer at the top of the web architecture and its paves the way for proposing the common design for encoding the ontology representation languages in the data models such as RDF/RDFS. In this research article, we have given the clear implication of semantic web research roots and its ontological background process which may help to augment the sheer understanding of named entities in the web.
Wireless sensor networks provide ubiquitous computing systems in various open environments. In the
environment, sensor nodes can easily be compromised by adversaries to generate injecting false data
attacks. The injecting false data attack not only consumes unnecessary energy in en-route nodes, but also
causes false alarms at the base station. To detect this type of attack, a bandwidth-efficient cooperative
authentication (BECAN) scheme was proposed to achieve high filtering probability and high reliability
based on random graph characteristics and cooperative bit-compressed authentication techniques. This
scheme may waste energy resources in en-route nodes due to the fixed number of forwarding reports. In
this paper, our proposed method effectively selects a dynamic number of forwarding reports in the source
nodes based on an evaluation function. The experimental results indicate that our proposed method
enhances the energy savings while maintaining security levels as compared to BECAN.
Artificial neural networks (ANN) consider classification as one of the most dynamic research and
application areas. ANN is the branch of Artificial Intelligence (AI). The neural network was trained by
back propagation algorithm. The different combinations of functions and its effect while using ANN as a
classifier is studied and the correctness of these functions are analyzed for various kinds of datasets. The
back propagation neural network (BPNN) can be used as a highly successful tool for dataset classification
with suitable combination of training, learning and transfer functions. When the maximum likelihood
method was compared with backpropagation neural network method, the BPNN was more accurate than
maximum likelihood method. A high predictive ability with stable and well functioning BPNN is possible.
Multilayer feed-forward neural network algorithm is also used for classification. However BPNN proves to
be more effective than other classification algorithms.
Wireless sensor networks (WSNs) are regularly deployed in harsh and unattended environments, and
sensor nodes are easily exposed to attacks due to the random arrangement of the sensor field. An attacker
can inject fabricated reports from a compromised node with false votes and false vote-based reports. The
false report attacks can waste the energy of the intermediate nodes, shortening the network lifetime.
Furthermore, false votes cause the filtering out of legitimate reports. A probabilistic voting-based filtering
scheme (PVFS) was proposed as a countermeasure against this type of attacks by Li and Wu. PVFS uses a
vote threshold, a security threshold, and a verification node. The scheme does not make additional use
energy or communications resources because the verification node and threshold values are fixed. There
needs to be a verification node selection method that considers the energy resources of the node. In this
paper, we propose a verification path election scheme based on a fuzzy logic system. In the proposed
scheme, one node transmits reports in the node with a strong state through a fuzzy logic system after which
a neighbor is selected out of two from the surroundings. Experimental results show that the proposed
scheme improves energy savings up to maximum 13% relative to the PVFS.
A black-hole attack in the Mobile Ad-hoc NETwork (MANET) is an attack occurs due to malicious nodes,
which attracts the data packets by falsely advertising a fresh route to the destination. In this paper, we
present a clustering approach in Ad-hoc On-demand Distance Vector (AODV) routing protocol for the
detection and prevention of black-hole attack in MANETs. In this approach every member of the cluster will
ping once to the cluster head, to detect the peculiar difference between the number of data packets received
and forwarded by the node. If anomalousness is perceived, all the nodes will obscure the malicious nodes
from the network.
Covid Management System Project Report.pdfKamal Acharya
CoVID-19 sprang up in Wuhan China in November 2019 and was declared a pandemic by the in January 2020 World Health Organization (WHO). Like the Spanish flu of 1918 that claimed millions of lives, the COVID-19 has caused the demise of thousands with China, Italy, Spain, USA and India having the highest statistics on infection and mortality rates. Regardless of existing sophisticated technologies and medical science, the spread has continued to surge high. With this COVID-19 Management System, organizations can respond virtually to the COVID-19 pandemic and protect, educate and care for citizens in the community in a quick and effective manner. This comprehensive solution not only helps in containing the virus but also proactively empowers both citizens and care providers to minimize the spread of the virus through targeted strategies and education.
We have designed & manufacture the Lubi Valves LBF series type of Butterfly Valves for General Utility Water applications as well as for HVAC applications.
This is an overview of my current metallic design and engineering knowledge base built up over my professional career and two MSc degrees : - MSc in Advanced Manufacturing Technology University of Portsmouth graduated 1st May 1998, and MSc in Aircraft Engineering Cranfield University graduated 8th June 2007.
College Call Girls Kolkata 🔥 7014168258 🔥 Real Fun With Sexual Girl Available...
Intelligent soft computing based
1. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.3, September 2014
INTELLIGENT SOFT COMPUTING BASED
CRYPTOGRAPHIC TECHNIQUE USING CHAOS
SYNCHRONIZATION FOR WIRELESS
COMMUNICATION (CSCT)
Arindam Sarkar1 and J. K. Mandal2
Department of Computer Science & Engineering, University of Kalyani, W.B, India
ABSTRACT
In this paper a novel intelligent soft computing based cryptographic technique based on synchronization of
two chaotic systems (CSCT) between sender and receiver has been proposed to generate session key using
Pecora and Caroll (PC) method. Chaotic system has some unique features like sensitive to initial
conditions, topologically mixing; and dense periodic orbits. By nature, the Lorenz system is very sensitive
to initial conditions meaning that the error between attacker and receiver is going to grow exponentially if
there is a very slight difference between their initial conditions. All these features make chaotic system as
good alternatives for session key generation. In the proposed CSCT few parameters ( , b , r , x1 ,y2 and z2 )
are being exchanged between sender and receiver. Some of the parameter which takes major roles to form
the session key does not get transmitted via public channel, sender keeps these parameters secret. This way
of handling parameter passing mechanism prevents any kind of attacks during exchange of parameters like
sniffing, spoofing or phishing.
KEYWORDS
chaos synchronization, soft computing, cryptography, Wireless Communication.
1. INTRODUCTION
A variety of session key generation techniques are available to secure data and
information from eavesdroppers [1, 2, 6, 10] with some merits and demerits. Most of the
key generation algorithm needs large memory and energy [3, 4, 5, 7, 8, 9]. There are few
applications where soft computing is used in key generation purpose. In recent days
cryptographic protocols are also get deployed in wireless communication. Wireless
devices have the problem of memory and energy constraints. In this paper, a novel soft
computing based technique has been proposed for energy efficient session key generation
in wireless communication to address this problem.
The organization of this paper is as follows. Section 2 of the paper deals with the proposed ACI
based key generation technique. Encryption and Decryption Process has been discussed in section
3 and 4 respectively. Example of ACI based key stream generation is discussed in section 5.
Results are described in section 6. Conclusions are drawn in section 7 and that of references at
end.
2. THE TECHNIQUE
Chaotic system has no closed form solution even though they defined by following simple
equation that makes unpredictability in chaos system.
DOI : 10.5121/ijasa.2014.2302 11
2. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.3, September 2014
12
x=s(x− y)
y=rx− y−xz
z=xy−bz
The above differential equations describing the rate of changes of parameter x, y, z respectively.
Coordination of chaos refers to a method where two (or more) chaotic systems (either identical or
non identical) regulate a given property of their motion to a similar performance owing to a
pairing or to a forcing (periodical or noisy). Chaotic systems inherently resist to harmonization,
because two identical systems having to some extent dissimilar preliminary conditions would
progress in time in an unsynchronized way (the divergence in the systems' status would cultivate
exponentially). A number of researches showed that synchronization of two chaotic systems is
possible. There are a lot of synchronization methods in chaotic systems; one of them is Pecora
and Caroll (PC) method. The PC method assume a dynamical system characterized by the state
space equations
x = f (x )
Where ( ) n x x , x ,..., x 1 2 = is the system vector and f is is an arbitrary
mapping. Further system is decomposed into two following sub system
( )
( ) driver
u =
f u v
v g u v
=
,
,
w = h (u , w )}response
Driver signal u (t ) is drives the response system.
Using Lyapunov exponents of the response system along with consideration that the actions of
the driver are negative Chaotic Synchronization can be possible between two systems.
From the Following Equations two secure sub systems i.e. initiator and responder respectively
can be defined by applying the PC method on the Lorenz system.
x=s(x− y)
y=rx− y−xz
z=xy−bz
The initiator xl, zl), can be defined by:
x = (x − y) 1 1 s
1 1 1 z= x y −bz
3. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.3, September 2014
13
The responder (Y2, z2) can be defined by:
, 2 2 2 z= xy −bz
2 2 2 y= rx− y −xz
From the above two equations it can be observed that the Lyapunov exponents of the system are
both negative. The initiator and responder response subsystems are driven by the signal y(t) and
x(t). When t trends to infinity value of 2 1 z − z trends to zero. After synchronization of both
the system a common value of both the system is obtained.
2.1 ALGORITHM OF CHAOS SYNCHRONIZATION
CHAOSSKG Algorithm
Input : Input parameters, ,
Output: Mutually tuned value of 1 to form a session key.
Method:
Step 1. Sender initializes the value of and , after that value of is send to the
receiver.
Step 2. Receiver initializes the value of .
Step 3. Sender generates the point 1 and 1
Step 4. Receiver generates the point 2and 2
Step 5. Sender sends
1to receiver.
Step 6. Receiver calculates the new value of 2and 2 with the help of and
4. using the following equations and returns the value of 2 and 2 to the
sender.
, 2 2 2 z= xy −bz
Step 7. Sender calculates the value of
1 and 1 with the help of 2,
and
5. using
following equations and sends the value of
1 to the receiver and so on.
x = (x − y) 1 1 s
1 1 1 z= x y −bz
Step 8. Sender generates a nonce. This nonce gets encrypted using a symmetric
cipher with 1as the key and sends the results of the encryption using
following equation.
En _ Nonce =
Encrypt (Nonce) Z1
Step 9. The receiver decrypts using 2 as the key, performs a defined
function on it using following equation.
De Nonce Decrypt (En Nonce ) Z _ _
2
=
Fn _ Nonce = f (De _ Nonce )
Step 10. The receiver encrypts the result of the previous step using 2 as the key and
sends the result to the sender.
En Fn Nonce Encrypt (Fn Nonce) Z _ _ _
2
=
2 2 2 y= rx− y −xz
6. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.3, September 2014
Step 11. The sender decrypts this message using 1 as the key, performs the inverse
of the pre-defined function and checks if the original nonce is obtained as
shown in following equation
Nonce f (Decrypt (En Fn Nonce )) Z _ _
14
1
−1 =
Step 12. If synchronization is not achieved, the process is repeated from step 5.
Step 13. If synchronization is achieved i.e. 1 2 then 1 is used as a seed for a
pseudo random number generator to generate the secret key between the
two systems for a particular session.
In security engineering, a nonce is an arbitrary number used only once in a cryptographic
communication. It is often a random or pseudo-random number issued in an authentication
protocol to ensure that old communications cannot be reused in replay attacks.
2.2 COMPLEXITY ANALYSIS OF CHAOSSKG ALGORITHM
Step 1. Sender initialization of the value of and takes needs amount of computation.
Step 2. Receiver initialization of the value of also takes amount of computation.
Step 3. Generation of the point 1 and 1 takes unit amount of computation.
Step 4. Generation of the point 2and 2 takes unit amount of computation.
Step 5. Sending the value of
1to receiver needs unit amount of computation
Step 6. Receiver calculates the new value of 2and 2 with the help of and
7. and returns the
value of 2 and 2 to the sender. This step also takes unit amount of computation.
Step 7. Sender calculates the value of
1 and 1 with the help of 2,
and
8. and sends the
value of
1 to the receiver and so on. This step also takes unit amount of computation.
Step 8. Sender generates a nonce. This nonce gets encrypted using a symmetric cipher with
1as the key and sends the results of the encryption. This step needs
!# amount of computation.
Step 9. The receiver decrypts using 2 as the key. It also takes $%'(
amount of computation.
Step 10. The receiver encrypts the result of the previous step using2 as the key and sends the
result to the sender. It takes $)**+%'( amount of computation.
Step 11. The sender decrypts this message using 1 as the key, performs the inverse of the pre-defined
function and checks if the original nonce is or not. It takes
$,'-)**+%'( amount of computation.
Step 12. If synchronization is not achieved, the process is repeated from step 5. If the loop
executed for times then algorithm needs total $ amount of computation.
Step 13. Synchronization is achieved when 1 2
From the above complexity analysis it has been seen that CHAOSSKG algorithm need to perform
at most total $ amount of computation.
2.3 HOPFIELD NEURAL NETWORKS (HNN) GUIDED PSEUDO RANDOM NUMBER
GENERATION
Chaos synchronized 1 values used as a seed of a Hopfield Neural Networks (HNN) guided
pseudo random number generation. Hopfield Neural Networks (HNN) possesses function
approximation and generalization capabilities that collectively with unsteadiness and non-
9. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.3, September 2014
convergence possessions can be revealed to be beneficial when dealing with the production of
random numbers. The learning in a Hopfield network is done by means of a weight adjustment
mechanism that directly relates to minimization of an energy function that decreases over time in
each iteration and finally stabilizes in some point of the state space representing the problem. The
basic idea of Hopfield Neural Networks (HNN) is to memorize some patterns as stable points by
associating them with specific inputs to the network. That is, after some that relates to the pattern
that is memorized. Stability, therefore, is the most important features of Hopfield neural
networks. The ability to converge in Hopfield networks is strongly related to network
architecture, network initial condition, and updating rule mode. The convergence of the network
occurs when the weight matrix is symmetric. Thus, there might be some alternatives which cause
the network not to converge, e.g., by (i) applying an initial asymmetric weight matrix consists of
large positive numbers in diagonal, (ii) letting two or more neurons active simultaneously, and
(iii) using large network and training it with orthogonal and uncorrelated patterns.
15
In this paper, a HNN has been used with following conditions to guarantee non-convergence:
• A nonlinear function, .# where is summation of all inputs of a neuron, as the
activation function for neurons,
• Weights matrix of HNN is asymmetric where the upper triangle of weight matrix contains
positive numbers and lower triangle of matrix contains negative numbers, The diagonal
of weight matrix contains large positive numbers,
• Uses of large number (100) of neurons.
• In selecting the weights if the output of one neuron is close to or more than 1 then in the
next iteration that neuron amplifies itself by the weight of the corresponding branch
regardless of other inputs of the neuron. This is also valid for output close to or less than -
1 with decreasing impact on the neuron. In other word, this makes the neuron to always
fire with ±1 or bigger than ±1 in all iterations and accordingly amplifying itself. To avoid
this, we set a condition that the summation of all the weights for inputs to each neuron
must be less than 1 and greater than -1.
• The output of each neuron in each iteration is calculated by following equation.
123 4! 56
/0
1
789
:7;0/7 =0 ?0@
Where ?; /;:; =;and signify input, output, weight, threshold and number of neurons
respectively.
• In this HNN = is zero and in the first iteration ? is 1. We also need nonlinear activation
function so we use .# function instead of 4! function. Convergence in a HNN
is achieved when the corresponding outputs of all neurons reach a stable state or oscillate
between a limited numbers of states. The definition of state stability, however, directly
relates to the degree of accuracy of our calculation. For example, if a state is stable with
an accuracy of n digits after the decimal point, the very same state might not be stable for
an accuracy of mn digits after decimal point. While digits with higher order of
significance have converged, the other digits with lower order of significance have not
converged yet, and may converge in the following iterations. Therefore, any stable
neuron in a HNN may be viewed as unstable if the accuracy of the calculation is
increased. This holds true for both cases of stability where there is (i) on stable point, or
(ii) a limited number of stable points.
10. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.3, September 2014
3. SECURITY ANALYSIS OF CSCT
In this section some of the attacks are considered to check the immunity power of the Proposed
CSCT against the attack. In key exchange protocol the major threat is the attacker who resides in
the middle of the sender and receiver has access to all the messages exchanged by both
synchronizing parties, also he/she knows all about the protocol details. Now, some of the
following question to be raised to analyse the immunity capability of the proposed technique.
Is the attacker able to know the secret information z?
16
Or
“Is attacker able to synchronize with the system regarding all the information available?”
Or
Is the attacker able to guess the key bits by any means of analytical and/or a numerical method?
To answer these attacks on the system are divided in the following categories:
Attacks by synchronization attempts: In this type of attack, the attacker tries to synchronize with
the system by eavesdropping on all the messages exchanged by sender and receiver. This type of
attack will not work as the attacker does not know the initial conditions of any of the z
components of any of the systems, and also the parameters a and r are hidden too. By nature, the
Lorenz system is very sensitive to initial conditions meaning that the error between attacker and
receiver is going to grow exponentially if there is a very slight difference between their initial
conditions. The main difference between receiver and attacker is that the output of receiver 2
influences the system A and hence affects its output 1 resulting in a lack of synchronization
between sender and attacker.
Attacks by solving the system differential equations: As the nature of chaotic systems, the
problem of solving the system of differential equations representing the system is proven to be
very hard. Numerical solution is of no use due to the approximation nature of the numerical
methods and the butter fly effect of chaotic systems. Even if the Lorenz system could be solved,
other more complex chaotic systems can be used.
4. RESULTS
A total of eight statistical tests of The NIST Test Suite have been performed to evaluate
randomness of the key stream. The 8 tests are performed for the proposed CSCT and existing
TPM [2] (Tree Parity Machine) scheme and results of these tests get compared and analyzed. The
8 tests are following:
Statistical Test 1: Frequency (Monobits) Test
Table 1 Status for Proportion of Passing and Uniformity of distribution
Technique
Expected
Proportion
Observed
Proportion
Status for
Proportion
of passing
P-value of
P-values
Status for
Uniform/
Non-uniform
distribution
TPM [2] 0.972766 0.973333 Success 2.781309e-08 Non-uniform
CSCT 0.972766 0.979437 Success 3.122711e-10 Non-uniform
From the above table it has been observed that proposed CSCT technique passed the Frequency
(Monobits) Test with higher proportion value along with non-uniform distribution than existing
TPM method. The outcomes of the test confirm the well distribution of proportion of zeroes and
ones for the entire sequence.
11. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.3, September 2014
17
Statistical Test 2: Runs Test
Table 2 Status for Proportion of Passing and Uniformity of distribution
Technique
Expected
Proportion
Observed
Proportion
Status for
Proportion
of passing
P-value of P-values
Status for
Uniform/
Non-uniform
distribution
TPM [2] 0.972766 0.974275 Success 1.093862e-02 Uniform
CSCT 0.972766 0.971263 Unsuccess 0.831790e-01 Uniform
Proposed CSCT does not able to pass the test. Only TPM method has passed the test. From the
above table it has been observed that proposed CSCT has uniform distribution.
Statistical Test 3: Binary Matrix Rank Test
Table 3 Status for Proportion of Passing and Uniformity of distribution
Technique
Expected
Proportion
Observed
Proportion
Status for
Proportion
of passing
P-value of P-values
Status for
Uniform/
Non-uniform
distribution
TPM [2] 0.972766 0.970173 Unsuccess 7.186328e-03 Uniform
CSCT 0.972766 0.992619 Success 7.571843e-02 Uniform
From the above table it has been observed that proposed CSCT technique passed the Binary
Matrix Rank Test with higher proportion value than TPM along with uniform distribution.
Whereas TPM methods does not able to pass the test.
Statistical Test 4: Non-overlapping (Aperiodic) Template Matching Test
Table 4 Status for Proportion of Passing and Uniformity of distribution
Technique
Expected
Proportion
Observed
Proportion
Status for
Proportion
of passing
P-value of P-values
Status for
Uniform/ Non-uniform
distribution
TPM [2] 0.972766 0.986667 Success 0.000000e+00 Non-uniform
CSCT 0.972766 0.992275 Success 0.000000e+00 Non-uniform
From the above table it has been observed that proposed CSCT technique passed the Non-overlapping
(Aperiodic) Template Matching Test with higher proportion value along with non-uniform
distribution than existing TPM methods.
12. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.3, September 2014
18
Statistical Test 5: Maurer’s “Universal Statistical” Test
Table 5 Status for Proportion of Passing and Uniformity of distribution
Technique
Expected
Proportion
Observed
Proportion
Status for
Proportion
of passing
P-value of P-values
Status for
Uniform/ Non-uniform
distribution
TPM [2] 0.972766 1.000000 Success 0.000000e+00 Non-uniform
CSCT 0.972766 1.000000 Success 0.000000e+00 Non-uniform
Like existing TPM technique, CSCT also passed the Maurer’s “Universal Statistical” Test along
with same observed proportion and non-uniform distribution like others.
Statistical Test 6: Serial Test
Table 6 Status for Proportion of Passing and Uniformity of distribution
Technique
Expected
Proportion
Observed
Proportion
Status for
Proportion
of passing
P-value of P-values
Status for
Uniform/ Non-uniform
distribution
TPM [2] 0.977814 0.478333 Unsuccess 0.000000e+00 Non-uniform
CSCT 0.977814 0.488874 Unsuccess 0.000000e+00 Non-uniform
From the above table it has been seen that CSCT not able to pass the Serial Test. Even existing
TPM also not able to pass the technique.
Statistical Test 7: Cumulative Sums Test
Table 7 Status for Proportion of Passing and Uniformity of distribution
Technique
Expected
Proportion
Observed
Proportion
Status for
Proportion
of passing
P-value of P-values
Status for
Uniform/ Non-uniform
distribution
TPM [2] 0.977814 0.953762 Unsuccess 0.000000e+00 Non-uniform
CSCT 0.977814 0.980000 Success 1.915241e-06 Non-uniform
Proposed CSCT passes the Cumulative Sums Test with non-uniform distribution. TPM is not able
to pass the test.
Statistical Test 8: Random Excursions Variant Test
Table 8 Status for Proportion of Passing and Uniformity of distribution
Technique
Expected
Proportion
Observed
Proportion
Status for
Proportion
of passing
P-value of P-values
Status for
Uniform/ Non-uniform
distribution
TPM [2] 0.985938 0.972593 Unsuccess 0.000000e+00 Non-uniform
CSCT 0.985938 0.981893 Unsuccess 0.000000e+00 Non-uniform
13. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.3, September 2014
From the above table it has been seen that like existing TPM and CSCT not able to pass the
Random Excursions Variant Test.
5. CONCLUSION
Proposed technique is very simple and easy to implement in various high level language. The test
results also show that the performance and security provided by the proposed technique is good
and comparable to standard technique. The security provided by the proposed technique is
comparable with other techniques. To enhance the security of the technique, proposed technique
offers changes of some parameters randomly in each session. To generate the secret session key
index mask get exchanged between sender and receiver. This technique has a unique ability to
construct the secret key at both sides using this exchanged information. Since the encryption and
decryption times are much lower, so processing speed is very high. Proposed method takes
minimum amount of resources which is greatly handle the resource constraints criteria of wireless
communication. This method generates a large number of keys which is the same number of
neurons in the map. For ensuring the randomness in every session, some of the parameters get
change randomly at each session. No platform specific optimizations were done in the actual
implementation, thus performance should be similar over varied implementation platform. The
whole procedure is randomized, thus resulting in a unique process for a unique session, which
makes it harder for a cryptanalyst to find a base to start with. This technique is applicable to
ensure security in message transmission in any form and in any size in wireless communication.
Some of the salient features of proposed technique can be summarized as follows:
a) Session key generation and exchange – Identical session key can be generate after the
tuning of Chaos system in both sender and receiver side. So, no need to transfer the
whole session key via vulnerable public channel.
b) Degree of security – Proposed technique does not suffers from cipher text only Attack,
known plaintext attack, chosen plaintext attack, Chosen cipher text only attack, brute
force attack.
c) Variable size key –128/192/256 bit session key with high key space can be used in
different session. Since the session key is used only once for each transmission, so there is
a minimum time stamp which expires automatically at the end of each transmission of
information. Thus the cryptanalyst will not be able guess the session key for that
particular session.
d) Complexity – Proposed technique has the flexibility to adopt the complexity based on
infrastructure, resource and energy available for computing in a node or mesh through
wireless communication. So, the proposed technique is very much suitable in wireless
communication.
e) Key sensitivity – Proposed method generates an entirely different cipher stream with a
small change in the key and technique totally fails to decrypt the cipher stream with a
slightly different secret session key.
f) Trade-off between security and performance – The proposed technique may be ideal for
trade-off between security and performance of light weight devices having very low
processing capabilities or limited computing power in wireless communication.
19
In future, some other soft computing based approach can be used to generate the session key.
ACKNOWLEDGEMENT
The author expresses deep sense of gratitude to the DST, Govt. of India, for financial assistance
through INSPIRE Fellowship leading for a PhD work under which this work has been carried out.
14. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.3, September 2014
20
REFERENCES
[1] Atul Kahate, Cryptography and Network Security, 2003, Tata McGraw-Hill publishing Company
Limited, Eighth reprint 2006.
[2] R. Mislovaty, Y. Perchenok, I. Kanter, and W. Kinzel. Secure key-exchange protocol with an
absence of injective functions. Phys. Rev. E, 66:066102, 2002.
[3] A. Ruttor, W. Kinzel, R. Naeh, and I. Kanter. Genetic attack on neural cryptography. Phys. Rev.
E, 73(3):036121, 2006.
[4] Wolfgang Kinzel and ldo Kanter, Neural cryptography proceedings of the 9th international
conference on Neural Information processing(ICONIP 03).
[5] Charles Pfleeger, Shari Lawrence Pfleeger, Security in computing, Third Edition 2003, pp 48,
Prentice Hall of India Pvt Ltd, New Delhi.
[6] Biham, E. and Seberry, J.”Py (Roo): A Fast and Secure Stream Cipher”. EUROCRYPT'05 Rump
Session, at the Symmetric Key Encryption Workshop (SKEW 2005), 26-27 May 2005.
[7] Chung-Ping Wu, C.C. Jay Kuo, “Design of Integrated Multimedia Compression and Encryption
Systems”, IEEE Transactions on Multimedia, Volume 7, Issue 5, Oct. 2005 Page(s): 828 – 839.
[8] HongGeun Kim, JungKyu Han and Seongje Cho.”An efficient implementation of RC4 cipher for
encrypting multimedia files on mobile devices”. SAC '07 Proceedings of the ACM symposium on
Applied computing, 2007, pp 1171--1175, NewYork, USA.
[9] Mantin and A. Shamir, “Weaknesses in the key scheduling algorithm of RC4”, Lecture Notes in
Computer Science, Vol. 2259, Revised Papers from the 8th Annual International Workshop on
Selected Areas in Cryptography, pp: 1 - 24, 2007.
[10] Sarkar Arindam, Mandal J. K., “Artificial Neural Network Guided Secured Communication
Techniques: A Practical Approach”, Paperback: 128 pages, Publisher: LAP LAMBERT Academic
Publishing (June 4, 2012), Language: English, ISBN-10: 3659119911, ISBN-13: 978-
3659119910.
Authors
Arindam Sarkar
INSPIRE FELLOW (DST, Govt. of India), MCA (VISVA BHARATI,
Santiniketan, University First Class First Rank Holder), M.Tech (CSE, K.U,
University First Class First Rank Holder).
Jyotsna Kumar Mandal
M. Tech.(Computer Science, University of Calcutta), Ph.D.(Engg., Jadavpur
University) in the field of Data Compression and Error Correction
Techniques, Professor in Computer Science and Engineering, University of
Kalyani, India. Life Member of Computer Society of India since 1992 and life
member of cryptology Research Society of India. Dean Faculty of
Engineering, Technology Management, working in the field of Network
Security, Steganography, Remote Sensing GIS Application, Image
Processing. 25 years of teaching and research experiences. Eight Scholars awarded Ph.D. and 8 are
pursuing.