Open Access   Article Go Back

A Dynamic Key Generation Scheme based on Metaheuristic Cuckoo Search

Arindam Sarkar1 , Joydeep Dey2 , Anirban Bhowmik3 , Sk. Samim Ferdows4

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-01 , Page no. 184-187, Jan-2019

Online published on Jan 20, 2019

Copyright © Arindam Sarkar, Joydeep Dey, Anirban Bhowmik, Sk. Samim Ferdows . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Arindam Sarkar, Joydeep Dey, Anirban Bhowmik, Sk. Samim Ferdows, “A Dynamic Key Generation Scheme based on Metaheuristic Cuckoo Search,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.01, pp.184-187, 2019.

MLA Style Citation: Arindam Sarkar, Joydeep Dey, Anirban Bhowmik, Sk. Samim Ferdows "A Dynamic Key Generation Scheme based on Metaheuristic Cuckoo Search." International Journal of Computer Sciences and Engineering 07.01 (2019): 184-187.

APA Style Citation: Arindam Sarkar, Joydeep Dey, Anirban Bhowmik, Sk. Samim Ferdows, (2019). A Dynamic Key Generation Scheme based on Metaheuristic Cuckoo Search. International Journal of Computer Sciences and Engineering, 07(01), 184-187.

BibTex Style Citation:
@article{Sarkar_2019,
author = {Arindam Sarkar, Joydeep Dey, Anirban Bhowmik, Sk. Samim Ferdows},
title = {A Dynamic Key Generation Scheme based on Metaheuristic Cuckoo Search},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {07},
Issue = {01},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {184-187},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=616},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=616
TI - A Dynamic Key Generation Scheme based on Metaheuristic Cuckoo Search
T2 - International Journal of Computer Sciences and Engineering
AU - Arindam Sarkar, Joydeep Dey, Anirban Bhowmik, Sk. Samim Ferdows
PY - 2019
DA - 2019/01/20
PB - IJCSE, Indore, INDIA
SP - 184-187
IS - 01
VL - 07
SN - 2347-2693
ER -

           

Abstract

Nature inspired food foraging features by the cuckoo species promotes the proposed methodology to generate a true random session key. To make more complex for the intruders, a key based on the behavior of cuckoo species creates the fittest solution out of the sample population. Metaheuristic based optimization algorithms are good enough to encapsulate information during the wireless communication in more secured approach. Statistical fitness function ensuring with randomized expansion of bits in the session key have been tested. The key which has been generated dynamically using cuckoo search passed through different statistical tests in order to synthesize the randomness. In this paper run test is used for examining the robustness of key and test result shows the good randomness.

Key-Words / Index Term

Cuckoo Search, Levy flights, Statistical tests

References

[1]. Younsung Choi, Cryptanalysis on Privacy-Aware Two-Factor Authentication Protocol for Wireless Sensor Networks, Indonesian Journal of Electrical Engineering and Computer Science Vol. 8, Issue 2, pp. 296 – 301, 2017
[2]. Xin-She Yang, Suash Deb, Cuckoo Search via Levy Flights, In the Proceedings of the 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC 2009), IEEE Publications, USA, pp.210-214, 2009.
[3]. T. El-Ghazali, Metaheuristics: From Design to Implementation, vol. , John Wiley & Sons, 
[4]. T. El-Ghazali, Metaheuristics: From Design to Implementation, vol. , John Wiley & Sons, 
[5]. Gove Nitinkumar Rajendra, Bedi Rajneesh kaur , “A New Approach for Data Encryption Using Genetic Algorithms and Brain Mu Waves”, International Journal Of Scientific And Engineering Research Volume 2, Issue 5, May-2011.
[6]. Baumjohann, W., and R. A. Treumann (1997), Basic Space Plasma Physics, Imperial College Press, London.
[7]. Abramowitz, M., and I. A. Stegun (1965), Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables, Dover.
[8]. Iztok Fister Jr., Dusan Fister, Iztok Fister, A comprehensive review of cuckoo search: variants and hybrids, Int. J. Mathematical Modelling and Numerical Optimisation, Vol. 4, Issue. 4, pp.387-409, 2013.
[9]. 7.C.Asmuth and J.Bloom, A modular to key safeguarding, IEEE Transaction on Information Theory, vol.29, no. 2, pp. 208-210, 1983.
[10]. G.R. Blakley, Safeguarding cryptographic keys,in Proceedings of AFIPS International Worhshop on Managing Requirements Knowledge, pp. 313, 1979.
[11]. Whitfield Diffman and Martin Hellman New Directions of
cryptography, Bulletin of the American Mathematical Society 42 (2005), 3-38; online in 2004. ISSN 0273-0979.
[12]. M. L Wu and T. Y. Hwang, 1984, Access control with single key-lock, IEEE Transaction on Software Engineering, Vol. SE- , No. 2, pp.185-191.