Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Kumar, M.a; * | Kavitha, A.b
Affiliations: [a] Department of Electronics and Communication Engineering, Er. perumal Manimekalai College of Engineering, Tamilnadu, India | [b] Department of Electronics and Communication Engineering, M. Kumarasamy College of Engineering, Tamilnadu, India
Correspondence: [*] Corresponding author. M. Kumar, Assistant Professor, Department of Electronics and Communication Engineering, Er. perumal Manimekalai College of Engineering, Tamilnadu, India. E-mail: [email protected].
Note: [1] Deep-MAD: Deep Learning based Multiple Attack Detection for Secure Device- To-Device Communication in FOG Environment
Abstract: An exponential growth of users demands ubiquitous connectivity, which requires the integration of new technology. Therefore, Device to Device (D2D) communication has been considered a promising technology that utilizes effective and efficient communication. Even though numerous studies have been conducted for establishing secure D2D communication, however, existing techniques face challenges like privacy, security threats, and poor generality. To overcome these issues a novel Deep-MAD model is proposed to preserve data privacy along with its access control in the D2D network and multiple attack detection in a fog environment. A Fully Homomorphic Elliptic Curve Cryptography (FHECC) is introduced to transmit data securely in a D2D network. The data owner uses FHECC algorithm to encrypt the plain text into cipher text before storing it on the fog. Whenever the user requests data from the fog, the fog service provider confirm the user’s access control. Furthermore, the deep learning-based Bi-LSTM is used to differentiate the device as an authorized or unauthorized user. If the IP address is genuine then the inverse FHECC is used to decrypt the data for authorized users. Otherwise, the particular device is blocked and it is sent for further verification for classifying the types of attacks. The effectiveness of the proposed strategy is examined using several parameters, such as computational complexity, scalability, accuracy, and Execution time. The proposed technique improves the overall computational overhead of 31.77, 9.34, and 4.67 better than AKA protocol, lightweight cipher, and FHEEP respectively.
Keywords: Bi-LSTM, device-to-device communication, cryptography, security, fog environment
DOI: 10.3233/JIFS-235362
Journal: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 1, pp. 955-966, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]