Loading…
SAIF-Cnet: self-attention improved faster convolutional neural network for decentralized blockchain-based key management protocol
Internet of Things (IoT) devices are an essential part of several aspects of daily life for people. They are utilized in a variety of contexts, including industrial monitoring, environmental sensing, and so on. But, secure communication is the major challenge in the IoT environment. Therefore, a dec...
Saved in:
Published in: | Wireless networks 2024-07, Vol.30 (5), p.3211-3228 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | cdi_FETCH-LOGICAL-c242t-c398f324377c99cf873f53e5be1db2403b7a36a21235d1c962d3c3ea0c72a86b3 |
container_end_page | 3228 |
container_issue | 5 |
container_start_page | 3211 |
container_title | Wireless networks |
container_volume | 30 |
creator | Rejin Paul, N. R. Purnendu Shekhar, P. Singh, Charanjeet Rajesh Kumar, P. |
description | Internet of Things (IoT) devices are an essential part of several aspects of daily life for people. They are utilized in a variety of contexts, including industrial monitoring, environmental sensing, and so on. But, secure communication is the major challenge in the IoT environment. Therefore, a decentralized Blockchain-based Key Management protocol using Levy Flight-Equilibrium Optimization and Self-Attention-based Improved Faster Region-based Convolutional Neural Network (BlkKM) method is proposed to determine stable security in tamper-resistant hardware machine that can protect sensitive secret data in the healthcare field i.e., stored cryptographic keys. The keys are categorized as Key Encryption Keys (KEKs) and Data Encryption Keys (DEKs). The number of the keys is decreased by using Levy Flight- Equilibrium Optimization (LF-EO) as organizing nodes with logical sets. Also, Self-Attention-based Improved Faster Region-based Convolutional Neural Network (SA-based IFRCNN) is used for reordering a set of logical nodes to minimize the number of sets after a node exits the network. Additionally, the system makes use of smart contracts for access control as well as proxy encryption to data encryption. The proposed method is compared with existing techniques to validate the security enhancement performance. The evaluation is performed based on throughput, end-to-end delay, storage overheads, and energy consumption. The experimentation results revealed that the proposed method improved the throughput to 220.52bps and diminished the utilization of energy. A greater degree of memory usage is also decreased by using this technique. |
doi_str_mv | 10.1007/s11276-024-03728-y |
format | article |
fullrecord | <record><control><sourceid>crossref_sprin</sourceid><recordid>TN_cdi_crossref_primary_10_1007_s11276_024_03728_y</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_1007_s11276_024_03728_y</sourcerecordid><originalsourceid>FETCH-LOGICAL-c242t-c398f324377c99cf873f53e5be1db2403b7a36a21235d1c962d3c3ea0c72a86b3</originalsourceid><addsrcrecordid>eNp9kM1OwzAQhC0EEuXnBTj5BQz-SWKHW1VRqFSJA3C2HMcuaRO7st2icOPNcVvOnGa1O99IOwDcEXxPMOYPkRDKK4RpgTDjVKDxDExIySkSpK7O84wpRRgzcQmuYlxjjAWr6wn4eZsu5mjmTHqE0fQWqZSMS513sBu2we9NC62KyQSovdv7fne4qR46swtHSV8-bKD1AbZGZzRvu-9MNb3XG_2pOocaFfNiY0Y4KKdWZsg2mMOT176_ARdW9dHc_uk1-Jg_vc9e0PL1eTGbLpGmBU1Is1pYRgvGua5rbQVntmSmbAxpG1pg1nDFKkUJZWVLdF3RlmlmFNacKlE17BrQU64OPsZgrNyGblBhlATLQ4nyVKLMJcpjiXLMEDtBMZvdygS59ruQ_4__Ub8BFnkN</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>SAIF-Cnet: self-attention improved faster convolutional neural network for decentralized blockchain-based key management protocol</title><source>Springer Nature</source><creator>Rejin Paul, N. R. ; Purnendu Shekhar, P. ; Singh, Charanjeet ; Rajesh Kumar, P.</creator><creatorcontrib>Rejin Paul, N. R. ; Purnendu Shekhar, P. ; Singh, Charanjeet ; Rajesh Kumar, P.</creatorcontrib><description>Internet of Things (IoT) devices are an essential part of several aspects of daily life for people. They are utilized in a variety of contexts, including industrial monitoring, environmental sensing, and so on. But, secure communication is the major challenge in the IoT environment. Therefore, a decentralized Blockchain-based Key Management protocol using Levy Flight-Equilibrium Optimization and Self-Attention-based Improved Faster Region-based Convolutional Neural Network (BlkKM) method is proposed to determine stable security in tamper-resistant hardware machine that can protect sensitive secret data in the healthcare field i.e., stored cryptographic keys. The keys are categorized as Key Encryption Keys (KEKs) and Data Encryption Keys (DEKs). The number of the keys is decreased by using Levy Flight- Equilibrium Optimization (LF-EO) as organizing nodes with logical sets. Also, Self-Attention-based Improved Faster Region-based Convolutional Neural Network (SA-based IFRCNN) is used for reordering a set of logical nodes to minimize the number of sets after a node exits the network. Additionally, the system makes use of smart contracts for access control as well as proxy encryption to data encryption. The proposed method is compared with existing techniques to validate the security enhancement performance. The evaluation is performed based on throughput, end-to-end delay, storage overheads, and energy consumption. The experimentation results revealed that the proposed method improved the throughput to 220.52bps and diminished the utilization of energy. A greater degree of memory usage is also decreased by using this technique.</description><identifier>ISSN: 1022-0038</identifier><identifier>EISSN: 1572-8196</identifier><identifier>DOI: 10.1007/s11276-024-03728-y</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Communications Engineering ; Computer Communication Networks ; Electrical Engineering ; Engineering ; IT in Business ; Networks ; Original Paper</subject><ispartof>Wireless networks, 2024-07, Vol.30 (5), p.3211-3228</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c242t-c398f324377c99cf873f53e5be1db2403b7a36a21235d1c962d3c3ea0c72a86b3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Rejin Paul, N. R.</creatorcontrib><creatorcontrib>Purnendu Shekhar, P.</creatorcontrib><creatorcontrib>Singh, Charanjeet</creatorcontrib><creatorcontrib>Rajesh Kumar, P.</creatorcontrib><title>SAIF-Cnet: self-attention improved faster convolutional neural network for decentralized blockchain-based key management protocol</title><title>Wireless networks</title><addtitle>Wireless Netw</addtitle><description>Internet of Things (IoT) devices are an essential part of several aspects of daily life for people. They are utilized in a variety of contexts, including industrial monitoring, environmental sensing, and so on. But, secure communication is the major challenge in the IoT environment. Therefore, a decentralized Blockchain-based Key Management protocol using Levy Flight-Equilibrium Optimization and Self-Attention-based Improved Faster Region-based Convolutional Neural Network (BlkKM) method is proposed to determine stable security in tamper-resistant hardware machine that can protect sensitive secret data in the healthcare field i.e., stored cryptographic keys. The keys are categorized as Key Encryption Keys (KEKs) and Data Encryption Keys (DEKs). The number of the keys is decreased by using Levy Flight- Equilibrium Optimization (LF-EO) as organizing nodes with logical sets. Also, Self-Attention-based Improved Faster Region-based Convolutional Neural Network (SA-based IFRCNN) is used for reordering a set of logical nodes to minimize the number of sets after a node exits the network. Additionally, the system makes use of smart contracts for access control as well as proxy encryption to data encryption. The proposed method is compared with existing techniques to validate the security enhancement performance. The evaluation is performed based on throughput, end-to-end delay, storage overheads, and energy consumption. The experimentation results revealed that the proposed method improved the throughput to 220.52bps and diminished the utilization of energy. A greater degree of memory usage is also decreased by using this technique.</description><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Electrical Engineering</subject><subject>Engineering</subject><subject>IT in Business</subject><subject>Networks</subject><subject>Original Paper</subject><issn>1022-0038</issn><issn>1572-8196</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9kM1OwzAQhC0EEuXnBTj5BQz-SWKHW1VRqFSJA3C2HMcuaRO7st2icOPNcVvOnGa1O99IOwDcEXxPMOYPkRDKK4RpgTDjVKDxDExIySkSpK7O84wpRRgzcQmuYlxjjAWr6wn4eZsu5mjmTHqE0fQWqZSMS513sBu2we9NC62KyQSovdv7fne4qR46swtHSV8-bKD1AbZGZzRvu-9MNb3XG_2pOocaFfNiY0Y4KKdWZsg2mMOT176_ARdW9dHc_uk1-Jg_vc9e0PL1eTGbLpGmBU1Is1pYRgvGua5rbQVntmSmbAxpG1pg1nDFKkUJZWVLdF3RlmlmFNacKlE17BrQU64OPsZgrNyGblBhlATLQ4nyVKLMJcpjiXLMEDtBMZvdygS59ruQ_4__Ub8BFnkN</recordid><startdate>20240701</startdate><enddate>20240701</enddate><creator>Rejin Paul, N. R.</creator><creator>Purnendu Shekhar, P.</creator><creator>Singh, Charanjeet</creator><creator>Rajesh Kumar, P.</creator><general>Springer US</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20240701</creationdate><title>SAIF-Cnet: self-attention improved faster convolutional neural network for decentralized blockchain-based key management protocol</title><author>Rejin Paul, N. R. ; Purnendu Shekhar, P. ; Singh, Charanjeet ; Rajesh Kumar, P.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c242t-c398f324377c99cf873f53e5be1db2403b7a36a21235d1c962d3c3ea0c72a86b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Electrical Engineering</topic><topic>Engineering</topic><topic>IT in Business</topic><topic>Networks</topic><topic>Original Paper</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Rejin Paul, N. R.</creatorcontrib><creatorcontrib>Purnendu Shekhar, P.</creatorcontrib><creatorcontrib>Singh, Charanjeet</creatorcontrib><creatorcontrib>Rajesh Kumar, P.</creatorcontrib><collection>CrossRef</collection><jtitle>Wireless networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Rejin Paul, N. R.</au><au>Purnendu Shekhar, P.</au><au>Singh, Charanjeet</au><au>Rajesh Kumar, P.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>SAIF-Cnet: self-attention improved faster convolutional neural network for decentralized blockchain-based key management protocol</atitle><jtitle>Wireless networks</jtitle><stitle>Wireless Netw</stitle><date>2024-07-01</date><risdate>2024</risdate><volume>30</volume><issue>5</issue><spage>3211</spage><epage>3228</epage><pages>3211-3228</pages><issn>1022-0038</issn><eissn>1572-8196</eissn><abstract>Internet of Things (IoT) devices are an essential part of several aspects of daily life for people. They are utilized in a variety of contexts, including industrial monitoring, environmental sensing, and so on. But, secure communication is the major challenge in the IoT environment. Therefore, a decentralized Blockchain-based Key Management protocol using Levy Flight-Equilibrium Optimization and Self-Attention-based Improved Faster Region-based Convolutional Neural Network (BlkKM) method is proposed to determine stable security in tamper-resistant hardware machine that can protect sensitive secret data in the healthcare field i.e., stored cryptographic keys. The keys are categorized as Key Encryption Keys (KEKs) and Data Encryption Keys (DEKs). The number of the keys is decreased by using Levy Flight- Equilibrium Optimization (LF-EO) as organizing nodes with logical sets. Also, Self-Attention-based Improved Faster Region-based Convolutional Neural Network (SA-based IFRCNN) is used for reordering a set of logical nodes to minimize the number of sets after a node exits the network. Additionally, the system makes use of smart contracts for access control as well as proxy encryption to data encryption. The proposed method is compared with existing techniques to validate the security enhancement performance. The evaluation is performed based on throughput, end-to-end delay, storage overheads, and energy consumption. The experimentation results revealed that the proposed method improved the throughput to 220.52bps and diminished the utilization of energy. A greater degree of memory usage is also decreased by using this technique.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11276-024-03728-y</doi><tpages>18</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1022-0038 |
ispartof | Wireless networks, 2024-07, Vol.30 (5), p.3211-3228 |
issn | 1022-0038 1572-8196 |
language | eng |
recordid | cdi_crossref_primary_10_1007_s11276_024_03728_y |
source | Springer Nature |
subjects | Communications Engineering Computer Communication Networks Electrical Engineering Engineering IT in Business Networks Original Paper |
title | SAIF-Cnet: self-attention improved faster convolutional neural network for decentralized blockchain-based key management protocol |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-25T15%3A12%3A20IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=SAIF-Cnet:%20self-attention%20improved%20faster%20convolutional%20neural%20network%20for%20decentralized%20blockchain-based%20key%20management%20protocol&rft.jtitle=Wireless%20networks&rft.au=Rejin%20Paul,%20N.%20R.&rft.date=2024-07-01&rft.volume=30&rft.issue=5&rft.spage=3211&rft.epage=3228&rft.pages=3211-3228&rft.issn=1022-0038&rft.eissn=1572-8196&rft_id=info:doi/10.1007/s11276-024-03728-y&rft_dat=%3Ccrossref_sprin%3E10_1007_s11276_024_03728_y%3C/crossref_sprin%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c242t-c398f324377c99cf873f53e5be1db2403b7a36a21235d1c962d3c3ea0c72a86b3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |