Proceedings of the 3rd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2022, 24-25 March 2022, New Delhi, India

Research Article

Enhancement of Security in Connection establishment for IoT Infrastructure through Adversarial Neural Cryptography using GANs

Download153 downloads
  • @INPROCEEDINGS{10.4108/eai.24-3-2022.2318924,
        author={Basil  Hanafi and Mohammad Ubaidullah Bokhari},
        title={Enhancement of Security in Connection establishment for IoT Infrastructure  through Adversarial Neural Cryptography using GANs},
        proceedings={Proceedings of the 3rd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2022, 24-25 March 2022, New Delhi, India},
        publisher={EAI},
        proceedings_a={ICIDSSD},
        year={2023},
        month={5},
        keywords={adversarial neural cryptography generative adversarial networks security internet of things},
        doi={10.4108/eai.24-3-2022.2318924}
    }
    
  • Basil Hanafi
    Mohammad Ubaidullah Bokhari
    Year: 2023
    Enhancement of Security in Connection establishment for IoT Infrastructure through Adversarial Neural Cryptography using GANs
    ICIDSSD
    EAI
    DOI: 10.4108/eai.24-3-2022.2318924
Basil Hanafi1,*, Mohammad Ubaidullah Bokhari1
  • 1: Aligarh Muslim University, Aligarh
*Contact email: basilhanafi@gmail.com

Abstract

As we are moving ahead in this Digital age of Information, the need of fortification for Digital Assets and Data is also increasing day by day. Soon in the near future, we will be able to see everything connected and controlled by a single large-scale network called Internet. This whole infrastructure of connected of various machines is coined with a term called Internet of Things. With this versatile connection of Devices, Sensors and Machine, every digital asset an Individual can own will be at risk. With the Increase in number of Assets will lead to Increase in the number of Threats and Vulnerabilities which will result in a catastrophic future. To avoid such situations, we are in need of some dynamic strategies that can help individuals to protect themselves from such threats. Here we will be discussing, how these assets can be protected in an IoT environment by implementing Security through Adversarial Neural Cryptography using Generative Adversarial Networks. Fortification of this Cryptographic technique is giving momentous results when implemented in IoT devices during establishing connections, without human interference.