Comparative Analysis of Tree Parity Machine and Double Hidden Layer Perceptron Based Session Key Exchange in Wireless Communication

Author(s):  
Arindam Sarkar ◽  
J. K. Mandal
Author(s):  
Arindam Sarkar ◽  
Joydeep Dey ◽  
Anirban Bhowmik

<p>Energy computation concept of multilayer neural network synchronized on derived transmission key based encryption system has been proposed for wireless transactions. Multilayer perceptron transmitting machines accepted same input array, which in turn generate a resultant bit and the networks were trained accordingly to form a protected variable length secret-key. For each session, different hidden layer of multilayer neural network is selected randomly and weights of hidden units of this selected hidden layer help to form a secret session key. A novel approach to generate a transmission key has been explained in this proposed methodology. The last thirty two bits of the session key were taken into consideration to construct the transmission key. Inverse operations were carried out by the destination perceptron to decipher the data. Floating frequency analysis of the proposed encrypted stream of bits has yielded better degree of security results. Energy computation of the processed nodes inside multi layered networks can be done using this proposed frame of work.</p>


Author(s):  
Arindam Sarkar

In this paper, multilayer neural network synchronized session key based encryption has been proposed for wireless communication of data/information. Multilayer perceptron transmitting systems at both ends accept an identical input vector, generate an output bit and the network are trained based on the output bit which is used to form a protected variable length secret-key. For each session, different hidden layer of multilayer neural network is selected randomly and weights or hidden units of this selected hidden layer help to form a secret session key. The plain text is encrypted through chaining , cascaded xoring of multilayer perceptron generated session key. If size of the final block of plain  text is less than the size of the key then this block is kept unaltered.  Receiver will use identical multilayer perceptron generated session key for performing deciphering process for getting the plain text. Parametric tests have been  done and results are compared in terms of Chi-Square test, response time in transmission with some existing classical techniques, which shows comparable results for the proposed technique.


Author(s):  
Annamaria Sârbu ◽  
Simona Miclăuș ◽  
Angela Digulescu ◽  
Paul Bechet

A suitable metric to describe human exposure to microwaves emitted by wireless communication devices is still incomplete. By using both theoretical analysis and experimental validation (in controlled and real deployed networks), we analyze and compare the specificity of exposure due to data transmissions in different configurations of fourth and fifth generation wireless fidelity (Wi-Fi) standards in the proximity of a mobile device. Measurements made use of the capability of the amplitude probability density incorporated in a real-time spectrum analyzer, proving its agility of highlighting different user exposure profiles. The results are presented comparatively and indicate that, in Wi-Fi networks, the modulation and coding scheme (MCS) should be used together with the duty cycle for an improved exposure assessment. The present work introduces the emitted energy density per bit in describing the user’s exposure to Wi-Fi signals and proves its superiority in characterizing the true levels of exposure for the IEEE 802.11n and 802.11ac standards of communication.


Sign in / Sign up

Export Citation Format

Share Document