Abstract
In this paper, a detail analysis of Tree Parity Machine (TPM) and Double Hidden Layer Perceptron (DHLP) based session key exchange tecchnique has been presented in terms of synchronization time, space complexity, variability of learning rules, gantt chart, total number of threads and security. TPM uses single hidden layer in their architecture and participated in mutual learning for producing the tuned weights as a session key. DHLP uses two hidden layers instead of single. Addition of this extra layer enhances the security of the key exchange protocol. Comparisons of results of both techniques has been presented along with detail analysis.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
References
Kahate, A.: Cryptography and Network Security, Eighth reprint. Tata McGraw-Hill Publishing Company Limited (2006)
Arindam, S., Mandal, J.K.: Group Session Key exchange Multilayer Perceptron based Simulated Annealing guided Automata and Comparison based Metamorphosed Encryption in Wireless Communication (GSMLPSA). International Journal of Wireless & Mobile Networks (IJWMN) 5(4), 203–222 (2013), doi:10.5121/ijwmn.2013.5415, ISSN 0975 - 3834 (Online), 0975 - 4679 (Print); Mislovaty, R., Perchenok, Y., Kanter, I., Kinzel, W.: Secure key-exchange protocol with an absence of injective functions. Phys. Rev. E 66, 066102 (2002)
Ruttor, A., Kinzel, W., Naeh, R., Kanter, I.: Genetic attack on neural cryptography. Phys. Rev. E 73(3), 036121 (2006)
Engel, A., Van den Broeck, C.: Statistical Mechanics of Learning. Cambridge University Press, Cambridge (2001)
Godhavari, T., Alainelu, N.R., Soundararajan, R.: Cryptography Using Neural Network. In: IEEE Indicon 2005 Conference, India, December 11-13 (2005)
Kinzel, W., Kanter, L.: Interacting neural networks and cryptography. In: Kramer, B. (ed.) Advances in Solid State Physics, vol. 42, p. 383 arXiv- cond-mat/0203011. Springer, Berlin (2002)
Kinzel, W., Kanter, L.: Neural cryptography. In: Proceedings of the 9th International Conference on Neural Information Processing (ICONIP 2002) (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Sarkar, A., Mandal, J.K. (2015). Comparative Analysis of Tree Parity Machine and Double Hidden Layer Perceptron Based Session Key Exchange in Wireless Communication. In: Satapathy, S., Govardhan, A., Raju, K., Mandal, J. (eds) Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India (CSI) Volume 1. Advances in Intelligent Systems and Computing, vol 337. Springer, Cham. https://doi.org/10.1007/978-3-319-13728-5_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-13728-5_6
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13727-8
Online ISBN: 978-3-319-13728-5
eBook Packages: EngineeringEngineering (R0)