Abstract
Fifth Generation (5G) networks provide data communications through various latest technologies including Software Defined Networks (SDN), Artificial Intelligence, Machine Learning and Cloud Computing. In 5G, secure data communication is a challenging issue due to the presence of an enormous volume of users including malicious users communicating with the latest technologies and also based on their own requirements. In such a scenario, fuzzy rules and cryptographic techniques can play a major role in providing security to the data which are either communicated through the network or stored in network-based databases including distributed databases and cloud databases with cloud networks. Therefore, new and efficient mechanisms for the generation and exchange of keys are necessary since they are the most important component of cryptographic methods. Since most of the existing key generation techniques are focusing on 3G and 4G networks, new key generation methods that can be generalized to n-th order polynomials are necessary to suit the security requirements of 5G networks which is smart by using rules from Artificial Intelligence. This paper proposes a new key generation and encryption/decryption mechanism that is based on both symmetric key cryptography and polynomial operations for providing effective security on data communication in 5G networks. In this work, we introduce the usage of fuzzy rules and Binomial Theorem (Pascal triangle) technique for performing the data encryption process more efficiently since it is not used in any of the existing cryptographic algorithms. Moreover, two different polynomial equations, one of degree three and another of degree two are used in the proposed work for effective key generation. Here, we have applied differential calculus for finding the second-degree polynomial. In the decryption part of the proposed mechanism, nth root operation is applied which is able to reduce the number of steps used in a single-mode operation. The experimental results of the proposed work proved that the proposed security model with a fuzzy rule-based approach is better than other related systems that are available in the literature in terms of reduction in computational complexity and increase in security.
Similar content being viewed by others
Data availability
Enquiries about data availability should be directed to the authors.
References
Abd El-Latif AA, Abd-El-Atty B, Venegas-Andraca SE, Mazurczyk W (2019) Efficient quantum-based security protocols for information sharing and data protection in 5G networks. Future Gener Comput Syst 100:893–906
Abd El-Latif AA, Abd-El-Atty B, Mazurczyk W, Fung C, Venegas-Andraca SE (2020) Secure data encryption based on quantum walks for 5G internet of things scenario. IEEE Trans Netw Serv Manag 17(1):118–131
Abd El-Latif AA, Abd-El-Atty B, Mehmood I, Muhammad K, Venegas-Andraca SE, Peng J (2021) Quantum-inspired blockchain-based cybersecurity: securing smart edge utilities in IoT-based smart cities. Inform Process Manag 58(4):102549–102888
Aguado A, Lopez V, Martinez-Mateo J, Szyrkowiec T, Autenrieth A, Peev M, Lopez D, Martin V (2017) Hybrid conventional and quantum security for software defined and virtualized networks. IEEE/OSA J Opt Commun Netw 9(10):819–825
Aguado A, Lopez V, Martinez-Mateo J, Peev M, Lopez D, Martin V (2018) Virtual network function deployment and service automation to provide end-to-end quantum encryption. IEEE/OSA J Opt Commun Netw 10(4):421–430
Aichhorn A, Unterweger A, Mayrhofer R, Engel D (2018) Investigating the impact of network security on the line current differential protection system. J Eng 2018(15):1199–1203
Biswas K, Muthukkumarasamy V, Singh K (2015) An encryption scheme using chaotic map and genetic operations for wireless sensor networks. IEEE Sens J 15(5):2801–2809. https://doi.org/10.1109/JSEN.2014
Caoa J, Ma M, Li H, Yulong Fu, Liu X (2018) EGHR: efficient group-based handover authentication protocols for mMTC in 5G wireless networks. J Netw Comput Appl 102:1–16
Chandra S, Mandal B, Alam SS, Bhattacharyya S (2015) Content based double encryption algorithm using symmetric key cryptography. Procedia Comput Sci 57:1228–1234
De Ree M, Mantas G, Radwan A, Mumtaz S, Rodriguez J, Otung IE (2019) Key management for beyond 5G mobile small cells: a survey. IEEE Access 7:59200–59236
Fang D, Qian Y, Hu RQ (2018) Security for 5G mobile wireless networks. IEEE Access 6:4850–4874
Feng X, Wang L (2018) S2PD: a selective sharing scheme for privacy data in vehicular social networks. IEEE Access 6:55139–55148
Ganapathy S, Kulothungan K, Muthurajkumar S, Vijayalakshmi M, Yogesh P, Kannan A (2013) Intelligent feature selection and classification techniques for intrusion detection in networks: a survey. EURASIP J Wirel Commun Netw 271(1):1–16
Gill HS, Gill SS, Bhatia KS (2017) A novel chaos-based encryption approach for future-generation passive optical networks using SHA-2. IEEE/OSA J Opt Commun Netw 9(12):1184–1190
Hamid MA, Abdullah-Al-Wadud M, Hassan MM, Almogren A, Alamri A, Kamal AR, Mamun-Or-Rashid M (2018) A key distribution scheme for secure communication in acoustic sensor networks. Future Gener Comput Syst 86:1209–1217
Harn L, Huang D (1994) A protocol for establishing secure communication channels in a large network. IEEE Trans Knowl Data Eng 6(1):188–191
Hu Z, Chan C (2018) A real-valued chaotic orthogonal matrix transform-based encryption for OFDM-PON. IEEE Photon Technol Lett 30(16):1455–1458
Kouzehzar H, Moghadam MN, Torkzadeh P (2018) A high data rate pipelined architecture of AES encryption/decryption in storage area networks. Iranian Conference on Electrical Engineering (ICEE). 23–28
Li B, Zhou Q, Si X, Fu J (2018) Mimic encryption system for network security. IEEE Access 6:50468–50487
Liu G, Liu B, Liu X, Li F, Guo W (2015) Low-complexity secure network coding against wiretapping using intra/inter-generation coding. China Commun 12(6):116–125
Liu T, Tian J, Gui Y, Liu Y, Liu P (2017) SEDEA: state estimation-based dynamic encryption and authentication in smart grid. IEEE Access 5:15682–15693
Logambigai R, Ganapathy S, Kannan A (2018) Energy–efficient grid-based routing algorithm using intelligent fuzzy rules for wireless sensor networks. Comput Electr Eng 68:62–75
Muradore R, Quaglia D (2015) Energy-efficient intrusion detection and mitigation for networked control systems security. IEEE Trans Industr Inf 11(3):830–840
Peng H, Tian Y, Kurths J, Li L, Yang Y, Wang D (2017) Secure and energy-efficient data transmission system based on chaotic compressive sensing in body-to-body networks. IEEE Trans Biomed Circuits Syst 11(3):558–573
Pradeep S, Muthurajkumar S, Ganapathy S, Kannan A (2021) A matrix translation and elliptic curve based cryptosystem for secured data communications in WSNs. Wirel Person Commun. https://doi.org/10.1007/s11277-021-08221-9
Schinianakis D (2017) Alternative security options in the 5G and IoT era. IEEE Circuits Syst Mag 17(4):6–28
Shin S, Kwon T (2018) Two-factor authenticated key agreement supporting unlinkability in 5G-integrated wireless sensor networks. IEEE Access 6:11229–11241
Suthanthiramani P, Muthurajkumar S, Sannasi G, Arputharaj K (2021) Secured data storage and retrieval using elliptic curve cryptography in cloud. Int Arab J Inform Technol 18(1):56–66
Szyrkowiec T et al (2018) Automatic intent-based secure service creation through a multilayer SDN network orchestration. IEEE/OSA J Opt Commun Netw 10(4):289–297
Tan S, Li X, Dong Q (2016) TrustR: an integrated router security framework for protecting computer networks. IEEE Commun Lett 20(2):376–379
Tang H, Sun QT, Yang X, Long K (2018) A network coding and des based dynamic encryption scheme for moving target defense. IEEE Access 6:26059–26068
Tourani R, Misra S, Mick T, Panwar G (2018) Security, privacy, and access control in information-centric networking: a survey. IEEE Commun Surv Tutorials 20(1):566–600
Vijayakumar P, Bose S, Kannan A (2013) Centralized key distribution protocol using the greatest common divisor method. Comput Math Appl 65(9):1360–1368
Vijayakumar P, Bose S, Kannan A (2014) Chinese remainder theorem based centralised group key management for secure multicast communication. IET Inform Secur 8(3):179–187
Vijayakumar P, Azees M, Kannan A, Jegatha Deborah L (2016) Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Trans Intell Transp Syst 17(4):1015–1028
Wei W, Liu S, Li W, Du D (2018) Fractal intelligent privacy protection in online social network using attribute-based encryption schemes. IEEE Trans Comput Soc Syst 5(3):736–747
Wu Q, Qin B, Zhang L, Domingo-Ferrer J, Farràs O, Manjón JA (2016) Contributory broadcast encryption with efficient encryption and short ciphertexts. IEEE Trans Comput 65(2):466–479
Ying B, Nayak A (2019) Lightweight remote user authentication protocol for multi- server 5G networks using self-certified public key cryptography. J Netw Comput Appl 131:66–74
Funding
The authors have not disclosed any funding.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have not disclosed any competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Pradeep, S., Muthurajkumar, S., Ganapathy, S. et al. Symmetric key and polynomial-based key generation mechanism for secured data communications in 5G networks. Soft Comput (2024). https://doi.org/10.1007/s00500-023-09601-y
Accepted:
Published:
DOI: https://doi.org/10.1007/s00500-023-09601-y