Skip to main content
Log in

Symmetric key and polynomial-based key generation mechanism for secured data communications in 5G networks

  • Application of soft computing
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Fifth Generation (5G) networks provide data communications through various latest technologies including Software Defined Networks (SDN), Artificial Intelligence, Machine Learning and Cloud Computing. In 5G, secure data communication is a challenging issue due to the presence of an enormous volume of users including malicious users communicating with the latest technologies and also based on their own requirements. In such a scenario, fuzzy rules and cryptographic techniques can play a major role in providing security to the data which are either communicated through the network or stored in network-based databases including distributed databases and cloud databases with cloud networks. Therefore, new and efficient mechanisms for the generation and exchange of keys are necessary since they are the most important component of cryptographic methods. Since most of the existing key generation techniques are focusing on 3G and 4G networks, new key generation methods that can be generalized to n-th order polynomials are necessary to suit the security requirements of 5G networks which is smart by using rules from Artificial Intelligence. This paper proposes a new key generation and encryption/decryption mechanism that is based on both symmetric key cryptography and polynomial operations for providing effective security on data communication in 5G networks. In this work, we introduce the usage of fuzzy rules and Binomial Theorem (Pascal triangle) technique for performing the data encryption process more efficiently since it is not used in any of the existing cryptographic algorithms. Moreover, two different polynomial equations, one of degree three and another of degree two are used in the proposed work for effective key generation. Here, we have applied differential calculus for finding the second-degree polynomial. In the decryption part of the proposed mechanism, nth root operation is applied which is able to reduce the number of steps used in a single-mode operation. The experimental results of the proposed work proved that the proposed security model with a fuzzy rule-based approach is better than other related systems that are available in the literature in terms of reduction in computational complexity and increase in security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

Enquiries about data availability should be directed to the authors.

References

  • Abd El-Latif AA, Abd-El-Atty B, Venegas-Andraca SE, Mazurczyk W (2019) Efficient quantum-based security protocols for information sharing and data protection in 5G networks. Future Gener Comput Syst 100:893–906

    Article  Google Scholar 

  • Abd El-Latif AA, Abd-El-Atty B, Mazurczyk W, Fung C, Venegas-Andraca SE (2020) Secure data encryption based on quantum walks for 5G internet of things scenario. IEEE Trans Netw Serv Manag 17(1):118–131

    Article  Google Scholar 

  • Abd El-Latif AA, Abd-El-Atty B, Mehmood I, Muhammad K, Venegas-Andraca SE, Peng J (2021) Quantum-inspired blockchain-based cybersecurity: securing smart edge utilities in IoT-based smart cities. Inform Process Manag 58(4):102549–102888

    Article  Google Scholar 

  • Aguado A, Lopez V, Martinez-Mateo J, Szyrkowiec T, Autenrieth A, Peev M, Lopez D, Martin V (2017) Hybrid conventional and quantum security for software defined and virtualized networks. IEEE/OSA J Opt Commun Netw 9(10):819–825

    Article  Google Scholar 

  • Aguado A, Lopez V, Martinez-Mateo J, Peev M, Lopez D, Martin V (2018) Virtual network function deployment and service automation to provide end-to-end quantum encryption. IEEE/OSA J Opt Commun Netw 10(4):421–430

    Article  Google Scholar 

  • Aichhorn A, Unterweger A, Mayrhofer R, Engel D (2018) Investigating the impact of network security on the line current differential protection system. J Eng 2018(15):1199–1203

    Article  Google Scholar 

  • Biswas K, Muthukkumarasamy V, Singh K (2015) An encryption scheme using chaotic map and genetic operations for wireless sensor networks. IEEE Sens J 15(5):2801–2809. https://doi.org/10.1109/JSEN.2014

    Article  Google Scholar 

  • Caoa J, Ma M, Li H, Yulong Fu, Liu X (2018) EGHR: efficient group-based handover authentication protocols for mMTC in 5G wireless networks. J Netw Comput Appl 102:1–16

    Article  Google Scholar 

  • Chandra S, Mandal B, Alam SS, Bhattacharyya S (2015) Content based double encryption algorithm using symmetric key cryptography. Procedia Comput Sci 57:1228–1234

    Article  Google Scholar 

  • De Ree M, Mantas G, Radwan A, Mumtaz S, Rodriguez J, Otung IE (2019) Key management for beyond 5G mobile small cells: a survey. IEEE Access 7:59200–59236

    Article  Google Scholar 

  • Fang D, Qian Y, Hu RQ (2018) Security for 5G mobile wireless networks. IEEE Access 6:4850–4874

    Article  Google Scholar 

  • Feng X, Wang L (2018) S2PD: a selective sharing scheme for privacy data in vehicular social networks. IEEE Access 6:55139–55148

    Article  Google Scholar 

  • Ganapathy S, Kulothungan K, Muthurajkumar S, Vijayalakshmi M, Yogesh P, Kannan A (2013) Intelligent feature selection and classification techniques for intrusion detection in networks: a survey. EURASIP J Wirel Commun Netw 271(1):1–16

    Google Scholar 

  • Gill HS, Gill SS, Bhatia KS (2017) A novel chaos-based encryption approach for future-generation passive optical networks using SHA-2. IEEE/OSA J Opt Commun Netw 9(12):1184–1190

    Article  Google Scholar 

  • Hamid MA, Abdullah-Al-Wadud M, Hassan MM, Almogren A, Alamri A, Kamal AR, Mamun-Or-Rashid M (2018) A key distribution scheme for secure communication in acoustic sensor networks. Future Gener Comput Syst 86:1209–1217

    Article  Google Scholar 

  • Harn L, Huang D (1994) A protocol for establishing secure communication channels in a large network. IEEE Trans Knowl Data Eng 6(1):188–191

    Article  Google Scholar 

  • Hu Z, Chan C (2018) A real-valued chaotic orthogonal matrix transform-based encryption for OFDM-PON. IEEE Photon Technol Lett 30(16):1455–1458

    Article  Google Scholar 

  • Kouzehzar H, Moghadam MN, Torkzadeh P (2018) A high data rate pipelined architecture of AES encryption/decryption in storage area networks. Iranian Conference on Electrical Engineering (ICEE). 23–28

  • Li B, Zhou Q, Si X, Fu J (2018) Mimic encryption system for network security. IEEE Access 6:50468–50487

    Article  Google Scholar 

  • Liu G, Liu B, Liu X, Li F, Guo W (2015) Low-complexity secure network coding against wiretapping using intra/inter-generation coding. China Commun 12(6):116–125

    Article  Google Scholar 

  • Liu T, Tian J, Gui Y, Liu Y, Liu P (2017) SEDEA: state estimation-based dynamic encryption and authentication in smart grid. IEEE Access 5:15682–15693

    Article  Google Scholar 

  • Logambigai R, Ganapathy S, Kannan A (2018) Energy–efficient grid-based routing algorithm using intelligent fuzzy rules for wireless sensor networks. Comput Electr Eng 68:62–75

    Article  Google Scholar 

  • Muradore R, Quaglia D (2015) Energy-efficient intrusion detection and mitigation for networked control systems security. IEEE Trans Industr Inf 11(3):830–840

    Article  Google Scholar 

  • Peng H, Tian Y, Kurths J, Li L, Yang Y, Wang D (2017) Secure and energy-efficient data transmission system based on chaotic compressive sensing in body-to-body networks. IEEE Trans Biomed Circuits Syst 11(3):558–573

    Article  Google Scholar 

  • Pradeep S, Muthurajkumar S, Ganapathy S, Kannan A (2021) A matrix translation and elliptic curve based cryptosystem for secured data communications in WSNs. Wirel Person Commun. https://doi.org/10.1007/s11277-021-08221-9

    Article  Google Scholar 

  • Schinianakis D (2017) Alternative security options in the 5G and IoT era. IEEE Circuits Syst Mag 17(4):6–28

    Article  Google Scholar 

  • Shin S, Kwon T (2018) Two-factor authenticated key agreement supporting unlinkability in 5G-integrated wireless sensor networks. IEEE Access 6:11229–11241

    Article  Google Scholar 

  • Suthanthiramani P, Muthurajkumar S, Sannasi G, Arputharaj K (2021) Secured data storage and retrieval using elliptic curve cryptography in cloud. Int Arab J Inform Technol 18(1):56–66

    Google Scholar 

  • Szyrkowiec T et al (2018) Automatic intent-based secure service creation through a multilayer SDN network orchestration. IEEE/OSA J Opt Commun Netw 10(4):289–297

    Article  Google Scholar 

  • Tan S, Li X, Dong Q (2016) TrustR: an integrated router security framework for protecting computer networks. IEEE Commun Lett 20(2):376–379

    Article  Google Scholar 

  • Tang H, Sun QT, Yang X, Long K (2018) A network coding and des based dynamic encryption scheme for moving target defense. IEEE Access 6:26059–26068

    Article  Google Scholar 

  • Tourani R, Misra S, Mick T, Panwar G (2018) Security, privacy, and access control in information-centric networking: a survey. IEEE Commun Surv Tutorials 20(1):566–600

    Article  Google Scholar 

  • Vijayakumar P, Bose S, Kannan A (2013) Centralized key distribution protocol using the greatest common divisor method. Comput Math Appl 65(9):1360–1368

    Article  MathSciNet  Google Scholar 

  • Vijayakumar P, Bose S, Kannan A (2014) Chinese remainder theorem based centralised group key management for secure multicast communication. IET Inform Secur 8(3):179–187

    Article  Google Scholar 

  • Vijayakumar P, Azees M, Kannan A, Jegatha Deborah L (2016) Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Trans Intell Transp Syst 17(4):1015–1028

    Article  Google Scholar 

  • Wei W, Liu S, Li W, Du D (2018) Fractal intelligent privacy protection in online social network using attribute-based encryption schemes. IEEE Trans Comput Soc Syst 5(3):736–747

    Article  Google Scholar 

  • Wu Q, Qin B, Zhang L, Domingo-Ferrer J, Farràs O, Manjón JA (2016) Contributory broadcast encryption with efficient encryption and short ciphertexts. IEEE Trans Comput 65(2):466–479

    Article  MathSciNet  Google Scholar 

  • Ying B, Nayak A (2019) Lightweight remote user authentication protocol for multi- server 5G networks using self-certified public key cryptography. J Netw Comput Appl 131:66–74

    Article  Google Scholar 

Download references

Funding

The authors have not disclosed any funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Pradeep.

Ethics declarations

Conflict of interest

The authors have not disclosed any competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pradeep, S., Muthurajkumar, S., Ganapathy, S. et al. Symmetric key and polynomial-based key generation mechanism for secured data communications in 5G networks. Soft Comput (2024). https://doi.org/10.1007/s00500-023-09601-y

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s00500-023-09601-y

Keywords

Navigation