Symmetric Key and Polynomial Based Key Generation Mechanism for Secured Data Communications in 5G Networks

Fifth Generation (5G) networks provide data communications through various latest technologies including Software Defined Network (SDN), Artificial Intelligence, Machine Learning and Cloud Computing. In 5G, secure data communication is a challenging issue due to the presence of enormous volume of users including malicious users communicating with latest technologies and also based their own requirements. In such a scenario, fuzzy rules and cryptographic techniques can play a major role in providing security to the data which are either communicated through the network or stored in network based databases including distributed databases and cloud databases with cloud networks. Therefore, new and efficient mechanisms for generation and exchange of keys are necessary since they are the most important component of cryptographic methods. Since most of the existing key generation techniques are focusing on 3G and 4G networks, new key generation methods that can be generalized to n-th order polynomials are necessary to suit the security requirements of 5G networks which is smart by using rules from Artificial Intelligence. This paper proposes a new key generation and encryption/decryption mechanism which is based on both symmetric key cryptography and polynomial operations for providing effective security on data communication in 5G networks. In this work, we introduce the usage of fuzzy rules and Binomial Theorem (Pascal triangle) technique for performing the data encryption process more efficiently since it is not used in any of the existing cryptographic algorithms. Moreover, two different polynomial equations, one of degree three and another of degree two are used in the proposed work for effective key generation. Here, we have applied differential calculus for finding the second-degree polynomial. In the decryption part of the proposed mechanism, nth root operation is applied which is able to reduce the number of steps used in a single mode operation. The experimental results of the proposed work proved that the proposed security model with fuzzy rule-based approach is better than other related systems that are available in the literature in terms of reduction in computational complexity and increase in security.

[1]  Ganapathy Sannasi,et al.  Secured data storage and retrieval using elliptic curve cryptography in cloud , 2021, Int. Arab J. Inf. Technol..

[2]  Lixiang Li,et al.  Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks , 2017, IEEE Transactions on Biomedical Circuits and Systems.

[3]  Wolfgang Kellerer,et al.  Automatic intent-based secure service creation through a multilayer SDN network orchestration , 2018, IEEE/OSA Journal of Optical Communications and Networking.

[4]  Bin Li,et al.  Mimic Encryption System for Network Security , 2018, IEEE Access.

[5]  Arputharaj Kannan,et al.  Chinese remainder theorem based centralised group key management for secure multicast communication , 2014, IET Inf. Secur..

[6]  Arputharaj Kannan,et al.  Centralized key distribution protocol using the greatest common divisor method , 2013, Comput. Math. Appl..

[7]  Victor Lopez,et al.  Virtual network function deployment and service automation to provide end-to-end quantum encryption , 2018, IEEE/OSA Journal of Optical Communications and Networking.

[8]  Riccardo Muradore,et al.  Energy-Efficient Intrusion Detection and Mitigation for Networked Control Systems Security , 2015, IEEE Transactions on Industrial Informatics.

[9]  Xiaoping Li,et al.  TrustR: An Integrated Router Security Framework for Protecting Computer Networks , 2016, IEEE Communications Letters.

[10]  Kamaljit Singh Bhatia,et al.  A novel chaos-based encryption approach for future-generation passive optical networks using SHA-2 , 2017, IEEE/OSA Journal of Optical Communications and Networking.

[11]  Jin Cao,et al.  EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks , 2018, J. Netw. Comput. Appl..

[12]  Chun-Kit Chan,et al.  A Real-Valued Chaotic Orthogonal Matrix Transform-Based Encryption for OFDM-PON , 2018, IEEE Photonics Technology Letters.

[13]  Vallipuram Muthukkumarasamy,et al.  An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor Networks , 2015, IEEE Sensors Journal.

[14]  Shuai Liu,et al.  Fractal Intelligent Privacy Protection in Online Social Network Using Attribute-Based Encryption Schemes , 2018, IEEE Transactions on Computational Social Systems.

[15]  Arputharaj Kannan,et al.  Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[16]  Guangjun Liu,et al.  Low-complexity secure network coding against wiretapping using intra/inter-generation coding , 2015 .

[17]  Xia Feng,et al.  S2PD: A Selective Sharing Scheme for Privacy Data in Vehicular Social Networks , 2018, IEEE Access.

[18]  Yang Liu,et al.  SEDEA: State Estimation-Based Dynamic Encryption and Authentication in Smart Grid , 2017, IEEE Access.

[19]  Satyajayant Misra,et al.  Security, Privacy, and Access Control in Information-Centric Networking: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[20]  Josep Domingo-Ferrer,et al.  Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts , 2016, IEEE Transactions on Computers.

[21]  Ahmed A. Abd El-Latif,et al.  Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario , 2020, IEEE Transactions on Network and Service Management.