The sharing session key component (SSKC) algorithm for end-to-end secure wireless communication

Author(s):  
Hsiao-Kuang Wu ◽  
Shu-Ching Yang ◽  
Yung-Tai Lin
2016 ◽  
Vol 39 ◽  
pp. 23-44 ◽  
Author(s):  
Byung-Cheol Min ◽  
Yongho Kim ◽  
Sangjun Lee ◽  
Jin-Woo Jung ◽  
Eric T. Matson

IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 49838-49849 ◽  
Author(s):  
Jian Ma ◽  
Dong Yang ◽  
Hongchao Wang ◽  
Mikael Gidlund

Author(s):  
Arindam Sarkar ◽  
Joydeep Dey ◽  
Anirban Bhowmik

<p>Energy computation concept of multilayer neural network synchronized on derived transmission key based encryption system has been proposed for wireless transactions. Multilayer perceptron transmitting machines accepted same input array, which in turn generate a resultant bit and the networks were trained accordingly to form a protected variable length secret-key. For each session, different hidden layer of multilayer neural network is selected randomly and weights of hidden units of this selected hidden layer help to form a secret session key. A novel approach to generate a transmission key has been explained in this proposed methodology. The last thirty two bits of the session key were taken into consideration to construct the transmission key. Inverse operations were carried out by the destination perceptron to decipher the data. Floating frequency analysis of the proposed encrypted stream of bits has yielded better degree of security results. Energy computation of the processed nodes inside multi layered networks can be done using this proposed frame of work.</p>


Sensors ◽  
2019 ◽  
Vol 19 (10) ◽  
pp. 2310 ◽  
Author(s):  
Younchan Jung ◽  
Marnel Peradilla ◽  
Ronnel Agulto

The existing LTE mobile system uses the vertical model to handle the session-based security management. However, the goal of this paper is to propose a packet key-based security management scheme on the blockchain control plane to enhance the existing session key-based security scheme and overcome the limitation that the existing vertical model, as well as the Software-Defined Networking (SDN) based horizontal model, confronts within solving end-to-end security management. The proposed blockchain-based security management (BSM) scheme enables each peer to easily obtain the necessary parameters required to manage the packet key-based security system. The important features of the BSM scheme include the renewal process, which enables the different packet data streams to use completely different security parameters for the security management. In addition, because even blind values cannot be exposed to the possible attackers, our BSM scheme guarantees very secure end-to-end data transfer against active attacks such as falsification of data and transactions. Finally, this paper compares the BSM scheme with the existing vertical model to prove the advantageous effects on latency.


Sign in / Sign up

Export Citation Format

Share Document