Artificial Neural Synchronization Using Nature Inspired Whale Optimization

In this article, a whale optimization-based neural synchronization has been proposed for the development of the key exchange protocol. At the time of exchange of sensitive information, intruders can effortlessly perform sniffing, spoofing, phishing, or Man-In-The-Middle (MITM) attack to tamper the vital information. Information needs to be secretly transmitted with high level of encryption by preserving the authentication, confidentiality, and integrity factors. Such stated requirements urge the researchers to develop a neural network-based fast and robust security protocol. A special neural network structure called Double Layer Tree Parity Machine (DLTPM) is proposed for neural synchronization. Two DLTPMs accept the common input and different weight vectors and update the weights using neural learning rules by exchanging their output. In some steps, it results in complete synchronization, and the weights of the two DLTMs become identical. These identical weights serve as a secret key. There is, however, hardly any research in the field of neural weight vector optimization using a nature-inspired algorithm for faster neural synchronization. In this article, whale optimization-based DLTPM is proposed. For faster synchronization, this proposed DLTPM model uses a whale algorithm optimized weight vector. This proposed DLTPM model is faster and has better security. This proposed technique has been passed through a series of parametric tests. The results have been compared with some recent techniques. The results of the proposed technique have shown effective and has robust potential.

[1]  Tingwen Huang,et al.  Approach to design neural cryptography: a generalized architecture and a heuristic rule. , 2013, Physical review. E, Statistical, nonlinear, and soft matter physics.

[2]  Michal Dolecki,et al.  Threshold Method of Detecting Long-Time TPM Synchronization , 2013, CISIM.

[3]  Christian Van den Broeck,et al.  Statistical Mechanics of Learning , 2001 .

[4]  Zhigang Zeng,et al.  Global Exponential Stability and Synchronization for Discrete-Time Inertial Neural Networks With Time Delays: A Timescale Approach , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[5]  Tingwen Huang,et al.  Neural Cryptography Based on Complex-Valued Neural Network , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[6]  Jinde Cao,et al.  Novel Finite-Time Synchronization Criteria for Inertial Neural Networks With Time Delays via Integral Inequality Method , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[7]  Cheng-Chew Lim,et al.  Cluster Synchronization for Neutral Stochastic Delay Networks via Intermittent Adaptive Control , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[8]  I Kanter,et al.  Confidence in prediction by neural networks. , 1999, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[9]  Vinod Patidar,et al.  A Pseudo Random Bit Generator Based on Chaotic Logistic Map and its Statistical Testing , 2009, Informatica.

[10]  Zhen Ni,et al.  A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[11]  S. Santhanalakshmi,et al.  Analysis of Neural Synchronization Using Genetic Approach for Secure Key Generation , 2015, SSCC.

[12]  Wolfgang Kinzel,et al.  Interacting Neural Networks and Cryptography , 2002 .

[13]  Chee Peng Lim,et al.  Synchronization of an Inertial Neural Network With Time-Varying Delays and Its Application to Secure Communication , 2018, IEEE Transactions on Neural Networks and Learning Systems.

[14]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[15]  Adi Shamir,et al.  Analysis of Neural Cryptography , 2002, ASIACRYPT.

[16]  Jing Zhang,et al.  Chaotic multimedia stream cipher scheme based on true random sequence combined with tree parity machine , 2017, Multimedia Tools and Applications.

[17]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[18]  Haruna Chiroma,et al.  Whale optimization algorithm: a systematic review of contemporary applications, modifications and developments , 2020, Neural Computing and Applications.

[19]  Tao Dong,et al.  Event-triggered synchronization strategy for complex dynamical networks with the Markovian switching topologies , 2016, Neural Networks.

[20]  Lingfeng Liu,et al.  Pseudorandom bit generator based on non-stationary logistic maps , 2016, IET Inf. Secur..

[21]  J. K. Mandal,et al.  Computational Intelligence Based Neural Session Key Generation on E-Health System for Ischemic Heart Disease Information Sharing , 2018, Advances in Intelligent Systems and Computing.

[22]  Jia Wang,et al.  Multivariate Cryptography Based on Clipped Hopfield Neural Network , 2018, IEEE Transactions on Neural Networks and Learning Systems.

[23]  Hazem M. Abbas,et al.  Authenticated key exchange protocol using neural cryptography with secret boundaries , 2013, The 2013 International Joint Conference on Neural Networks (IJCNN).

[24]  Hector Gomez,et al.  A 65 nm CMOS key establishment core based on tree parity machines , 2017, Integr..

[25]  Tingwen Huang,et al.  Passivity and Synchronization of Coupled Uncertain Reaction–Diffusion Neural Networks With Multiple Time Delays , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[26]  Marcin Niemiec,et al.  Error correction in quantum cryptography based on artificial neural networks , 2018, Quantum Inf. Process..

[27]  Mattia Frasca,et al.  A true random bit generator based on a memristive chaotic circuit: Analysis, design and FPGA implementation , 2019, Chaos, Solitons & Fractals.

[28]  Xiaofeng Liao,et al.  An Approach for Designing Neural Cryptography , 2013, ISNN.

[29]  Arindam Sarkar,et al.  Multilayer neural network synchronized secured session key based encryption in wireless communication , 2019, Indonesian Journal of Electrical Engineering and Computer Science.

[30]  A. Kanso,et al.  Logistic chaotic maps for binary numbers generations , 2009 .

[31]  Neural synchronization and cryptography , 2006 .

[32]  J. K. Mandal,et al.  Key Generation and Certification using Multilayer Perceptron in Wireless communication(KGCMLP) , 2012, ArXiv.

[33]  W. Kinzel,et al.  Secure exchange of information by synchronization of neural networks , 2002 .

[34]  Michal Dolecki,et al.  The Impact of the TPM Weights Distribution on Network Synchronization Time , 2015, CISIM.

[35]  Peng Shi,et al.  Exponential Synchronization for Markovian Stochastic Coupled Neural Networks of Neutral-Type via Adaptive Feedback Control , 2017, IEEE Transactions on Neural Networks and Learning Systems.

[36]  Sunil Karforma,et al.  Neural soft computing based secured transmission of intraoral gingivitis image in e-health care , 2019, Indonesian Journal of Electrical Engineering and Computer Science.

[37]  Andreas Ruttor,et al.  Genetic attack on neural cryptography. , 2006, Physical review. E, Statistical, nonlinear, and soft matter physics.

[38]  Zhigang Zeng,et al.  Global Synchronization of Coupled Fractional-Order Recurrent Neural Networks , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[39]  Wolfgang Kinzel,et al.  Cryptography based on neural networks—analytical results , 2002 .

[40]  Xiaofeng Liao,et al.  Event-triggered synchronization for reaction–diffusion complex networks via random sampling , 2018 .