Secure Transmission of Human-Centric Information using Two Hidden Layer Neural Synchronization

Arindam Sarkar,Mohammad Zubair Khan,Abdulfattah Noorwali
DOI: https://doi.org/10.1007/s40998-024-00750-w
2024-10-15
Iranian Journal of Science and Technology Transactions of Electrical Engineering
Abstract:The cryptographic key sharing protocol is developed utilizing the neural networks' coordination strategy based on mutual learning in this paper. This technique proposed a group of Double Layer Tree Parity Machine (DLTPM) to send sensitive human-centric data via a public channel. An adversary can effortlessly target key information while sharing sensitive material via Man-In-The-Middle (MITM) attack, sniff, phishing or scamming. The safety hardening standards of authenticity, confidentiality, and confirmation must be followed when transferring sensitive material. A set of DLTPMs synchronize using reciprocal learning to communicate neuronal key over a common channel. Determining how successfully the neural networks of both sides collaborate without using the weights of the other is a far more crucial part of neural synchronization than anything else. Neural collaboration cannot be recognized because of the latency of current methods in assessing collaboration. The suggested method has a number of benefits, including (1) the neural key is created via the public channel utlizing B-tree-guided group reciprocal neural alignment of DLTPMs, which has numerous advantages. (2) The proposed solution enables a number of communicating participants to identify perfect coordination faster than earlier methods. (3) The proposed technique considers bulk attacks, geometry, and brute force. When the proposed technique is tested, the results show that it outperforms similar strategies found in the existing research.
engineering, electrical & electronic
What problem does this paper attempt to address?