{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:20:57Z","timestamp":1760710857525,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,1,4]],"date-time":"2022-01-04T00:00:00Z","timestamp":1641254400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,1,4]],"date-time":"2022-01-04T00:00:00Z","timestamp":1641254400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2022,4]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The key exchange mechanism in this paper is built utilizing neural network coordination and a hyperchaotic (or chaotic) nonlinear dynamic complex system. This approach is used to send and receive sensitive data between\u00a0Internet-of-Things (IoT)\u00a0nodes across a public network. Using phishing, Man-In-The-Middle (MITM), or spoofing attacks, an attacker can easily target sensitive information during the exchange process. Furthermore, minimal research has been made on the exchange of input seed values for creating identical input at both ends of neural networks. The proposed method uses a 5D hyperchaotic or chaotic nonlinear complex structure to ensure the sharing of input seed value across two neural networks, resulting in the identical input on both ends. This study discusses two ways for sharing seed values for neural coordination. The first is a chaotic system with all real variables, whereas the second is a hyperchaotic system with at least one complex variable. Each neural network has its own random weight vector, and the outputs are exchanged. It achieves full coordination in some stages by altering the neuronal weights according to the mutual learning law. The coordinated weights are utilized as a key after the neural coordination technique. The network\u2019s core structure is made up of triple concealed layers. So, determining the inner configuration will be tough for the intruder. The efficiency of the suggested model is validated by simulations, and the findings reveal that the suggested strategy outperforms current equivalent techniques.<\/jats:p>","DOI":"10.1007\/s40747-021-00616-2","type":"journal-article","created":{"date-parts":[[2022,1,4]],"date-time":"2022-01-04T07:03:04Z","timestamp":1641279784000},"page":"1619-1637","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Chaos coordinated neural key synchronization for enhancing security of IoT"],"prefix":"10.1007","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6613-6822","authenticated-orcid":false,"given":"Ahmed h.","family":"Alahmadi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,4]]},"reference":[{"issue":"5","key":"616_CR1","doi-asserted-by":"publisher","first-page":"230","DOI":"10.32628\/ijsrset196550","volume":"6","author":"ZK Abdalrdha","year":"2019","unstructured":"Abdalrdha ZK, AL-Qinani IH, Abbas FN (2019) Subject review: key generation in different cryptography algorithm. Int J Sci Res Sci Eng Technol 6(5):230\u2013240. https:\/\/doi.org\/10.32628\/ijsrset196550","journal-title":"Int J Sci Res Sci Eng Technol"},{"key":"616_CR2","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16:2129\u20132151","journal-title":"Int J Bifurc Chaos"},{"key":"616_CR3","doi-asserted-by":"publisher","first-page":"1430","DOI":"10.1007\/s40815-020-00878-x","volume":"22","author":"\u00d6 Atan","year":"2020","unstructured":"Atan \u00d6, Kutlu F, Castillo O (2020) Intuitionistic fuzzy sliding controller for uncertain hyperchaotic synchronization. Int J Fuzzy Syst 22:1430\u20131443. https:\/\/doi.org\/10.1007\/s40815-020-00878-x","journal-title":"Int J Fuzzy Syst"},{"key":"616_CR4","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.sigpro.2017.08.020","volume":"143","author":"C Cao","year":"2018","unstructured":"Cao C, Sun K, Liu W (2018) A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process 143:122\u2013123","journal-title":"Signal Process"},{"key":"616_CR5","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1016\/0167-2789(89)90074-2","volume":"35","author":"M Casdagli","year":"1989","unstructured":"Casdagli M (1989) Nonlinear prediction of chaotic time series. Phys Nonlinear Phenom 35:335\u2013356","journal-title":"Phys Nonlinear Phenom"},{"key":"616_CR6","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1109\/TCSI.2014.2365767","volume":"62","author":"K Cho","year":"2014","unstructured":"Cho K, Miyano T (2014) Chaotic cryptography using augmented Lorenz equations aided by quantum key distribution. IEEE Trans Circ Syst Regul Pap 62:478\u2013487","journal-title":"IEEE Trans Circ Syst Regul Pap"},{"key":"616_CR7","first-page":"451","volume":"9339","author":"M Dolecki","year":"2015","unstructured":"Dolecki M, Kozera R (2015) The impact of the TPM weights distribution on network synchronization time. Comput Inf Syst Ind Manag 9339:451\u2013460","journal-title":"Comput Inf Syst Ind Manag"},{"issue":"11","key":"616_CR8","doi-asserted-by":"publisher","first-page":"4999","DOI":"10.1109\/TNNLS.2019.2955165","volume":"31","author":"T Dong","year":"2020","unstructured":"Dong T, Huang T (2020) Neural cryptography based on complex-valued neural network. IEEE Trans Neural Netw Learn Syst 31(11):4999\u20135004. https:\/\/doi.org\/10.1109\/TNNLS.2019.2955165","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"616_CR9","doi-asserted-by":"publisher","first-page":"958","DOI":"10.3390\/e21100958","volume":"21","author":"A Farhan","year":"2019","unstructured":"Farhan A, Al-Saidi N, Maolood A, Nazarimehr F, Hussain I (2019) Entropy analysis and image encryption application based on a new chaotic system crossing a cylinder. Entropy 21:958","journal-title":"Entropy"},{"key":"616_CR10","doi-asserted-by":"publisher","first-page":"124914","DOI":"10.1109\/ACCESS.2019.2938513","volume":"7","author":"A Farhan","year":"2019","unstructured":"Farhan A, Ali R, Natiq H, Al-Saidi N (2019) A new S-box generation algorithm based on multistability behavior of a plasma perturbation model. IEEE Access 7:124914\u2013124924","journal-title":"IEEE Access"},{"key":"616_CR11","doi-asserted-by":"crossref","unstructured":"Hadke PP, Kale SG (2016) Use of neural networks in cryptography: a review. In: Proceedings of the 2016 world conference on futuristic trends in research and innovation for social welfare (Startup Conclave), pp 1\u20134","DOI":"10.1109\/STARTUP.2016.7583925"},{"key":"616_CR12","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6680782","author":"S Jeong","year":"2021","unstructured":"Jeong S, Park C, Hong D, Seo C, Jho N (2021) Neural cryptography based on generalized tree parity machine for real-life systems. Secur Commun Netw. https:\/\/doi.org\/10.1155\/2021\/6680782","journal-title":"Secur Commun Netw"},{"key":"616_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3011849","author":"M Jo","year":"2020","unstructured":"Jo M, Jangirala S, Das AK, Li X, Khan MK (2020) Designing anonymous signature-based authenticated key exchange scheme for IoT-enabled smart grid systems. IEEE Trans Ind Inform. https:\/\/doi.org\/10.1109\/TII.2020.3011849","journal-title":"IEEE Trans Ind Inform"},{"key":"616_CR14","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.chaos.2018.12.021","volume":"119","author":"B Karakaya","year":"2019","unstructured":"Karakaya B, G\u00fclten A, Frasca M (2019) A true random bit generator based on a memristive chaotic circuit: analysis, design and FPGA implementation. Chaos Solitons Fractals 119:143\u2013149","journal-title":"Chaos Solitons Fractals"},{"issue":"1","key":"616_CR15","doi-asserted-by":"publisher","first-page":"297","DOI":"10.32604\/cmc.2020.09758","volume":"64","author":"J Kou","year":"2020","unstructured":"Kou J, He M, Xiong L, Ge Z, Xie G (2020) Efficient hierarchical multi-server authentication protocol for mobile cloud computing. Comput Mater Contin 64(1):297\u2013312. https:\/\/doi.org\/10.32604\/cmc.2020.09758","journal-title":"Comput Mater Contin"},{"issue":"10","key":"616_CR16","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1049\/iet-ifs.2014.0192","volume":"2","author":"L Liu","year":"2016","unstructured":"Liu L, Miao S, Hu H, Deng Y (2016) Pseudo-random bit generator based on non-stationary logistic maps. IET Inf Secur 2(10):87\u201394","journal-title":"IET Inf Secur"},{"issue":"8","key":"616_CR17","doi-asserted-by":"publisher","first-page":"2358","DOI":"10.1109\/TNNLS.2018.2884620","volume":"30","author":"P Liu","year":"2019","unstructured":"Liu P, Zeng Z, Wang J (2019) Global synchronization of coupled fractional-order recurrent neural networks. IEEE Trans Neural Netw Learn Syst 30(8):2358\u20132368","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"6","key":"616_CR18","doi-asserted-by":"publisher","first-page":"4177","DOI":"10.1109\/TII.2019.2942190","volume":"16","author":"Y Lu","year":"2020","unstructured":"Lu Y, Huang X, Dai Y, Maharjan S, Zhang Y (2020) Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. IEEE Trans Ind Inf 16(6):4177\u20134186","journal-title":"IEEE Trans Ind Inf"},{"issue":"2","key":"616_CR19","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1109\/TII.2020.2968927","volume":"17","author":"A Makkar","year":"2021","unstructured":"Makkar A, Garg S, Kumar N, Hossain MS, Ghoneim A, Alrashoud M (2021) An efficient spam detection technique for IoT devices using machine learning. IEEE Trans Ind Inf 17(2):903\u2013912. https:\/\/doi.org\/10.1109\/TII.2020.2968927","journal-title":"IEEE Trans Ind Inf"},{"key":"616_CR20","doi-asserted-by":"crossref","unstructured":"Mehic M, Niemiec H, Siljak M, Voznak (2020) Error reconciliation in quantum key distribution protocols. In: Proceedings of the international conference on reversible computation, pp 222\u2013236","DOI":"10.1007\/978-3-030-47361-7_11"},{"key":"616_CR21","doi-asserted-by":"publisher","first-page":"829","DOI":"10.3390\/sym12050829","volume":"12","author":"L Moysis","year":"2020","unstructured":"Moysis L, Tutueva A, Volos C, Butusov D, Munoz-Pacheco J, Nistazakis H (2020) A two-parameter modified logistic map and its application to random bit generation. Symmetry 12:829","journal-title":"Symmetry"},{"key":"616_CR22","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1016\/j.chaos.2018.08.005","volume":"114","author":"H Natiq","year":"2018","unstructured":"Natiq H, Banerjee S, He S, Said M, Kilicman A (2018) Designing an M-dimensional nonlinear model for producing hyperchaos. Chaos Solitons Fractals 114:506\u2013515","journal-title":"Chaos Solitons Fractals"},{"key":"616_CR23","doi-asserted-by":"publisher","DOI":"10.1063\/1.5079886","volume":"29","author":"H Natiq","year":"2019","unstructured":"Natiq H, Banerjee S, Ariffin M, Said M (2019) Can hyperchaotic maps with high complexity produce multistability? Chaos Interdiscip J Nonlinear Sci 29:011103","journal-title":"Chaos Interdiscip J Nonlinear Sci"},{"key":"616_CR24","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1140\/epjst\/e2019-800206-9","volume":"228","author":"H Natiq","year":"2019","unstructured":"Natiq H, Banerjee S, Said M (2019) Cosine chaotification technique to enhance chaos and complexity of discrete systems. Eur Phys J Spec Top 228:185\u2013194","journal-title":"Eur Phys J Spec Top"},{"key":"616_CR25","doi-asserted-by":"publisher","first-page":"34","DOI":"10.3390\/e21010034","volume":"21","author":"H Natiq","year":"2019","unstructured":"Natiq H, Said M, Al-Saidi N, Kilicman A (2019) Dynamics and complexity of a new 4d chaotic laser system. Entropy 21:34","journal-title":"Entropy"},{"key":"616_CR26","unstructured":"NIST (2020) NIST statistical test. http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/rng\/stats_tests.html"},{"key":"616_CR27","first-page":"441","volume":"33","author":"V Patidar","year":"2009","unstructured":"Patidar V, Sud KK, Pareek NK (2009) A pseudo random bit generator based on chaotic logistic map and its statistical testing. Informatica 33:441\u2013452","journal-title":"Informatica"},{"key":"616_CR28","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1103\/PhysRevLett.64.821","volume":"64","author":"LM Pecora","year":"1990","unstructured":"Pecora LM, Carroll TL (1990) Synchronization in chaotic systems. Phys Rev Lett 64:8. https:\/\/doi.org\/10.1103\/PhysRevLett.64.821","journal-title":"Phys Rev Lett"},{"issue":"2","key":"616_CR29","doi-asserted-by":"publisher","first-page":"483","DOI":"10.5937\/vojtehg64-8877","volume":"64","author":"D Protic","year":"2016","unstructured":"Protic D (2016) Neural cryptography. Vojnotehnicki Glasnik 64(2):483\u2013495. https:\/\/doi.org\/10.5937\/vojtehg64-8877","journal-title":"Vojnotehnicki Glasnik"},{"issue":"10","key":"616_CR30","doi-asserted-by":"publisher","first-page":"6829","DOI":"10.1016\/j.apm.2013.02.023","volume":"37","author":"M Rehan","year":"2013","unstructured":"Rehan M (2013) Synchronization and anti-synchronization of chaotic oscillators under input saturation. Appl Math Modell 37(10):6829\u20136837. https:\/\/doi.org\/10.1016\/j.apm.2013.02.023","journal-title":"Appl Math Modell"},{"issue":"1","key":"616_CR31","first-page":"44","volume":"8","author":"A Sarkar","year":"2019","unstructured":"Sarkar A (2019) Multilayer neural network synchronized secured session key based encryption in wireless communication. Int J Artif Intell 8(1):44\u201353","journal-title":"Int J Artif Intell"},{"issue":"7","key":"616_CR32","first-page":"267","volume":"3","author":"A Sarkar","year":"2012","unstructured":"Sarkar A, Mandal J (2012) Swarm intelligence based faster public-key cryptography in wireless communication (SIFPKC). Int J Comput Sci Eng Technol 3(7):267\u2013273","journal-title":"Int J Comput Sci Eng Technol"},{"issue":"2","key":"616_CR33","doi-asserted-by":"publisher","first-page":"371","DOI":"10.5013\/ijssst.a.21.02.37","volume":"21","author":"E Shishniashvili","year":"2020","unstructured":"Shishniashvili E, Mamisashvili L, Mirtskhulava L (2020) Enhancing IoT security using multi-layer feedforward neural network with tree parity machine elements. Int J Simul Syst Sci Technol 21(2):371\u2013383. https:\/\/doi.org\/10.5013\/ijssst.a.21.02.37","journal-title":"Int J Simul Syst Sci Technol"},{"key":"616_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08566-1","author":"A Teodoro","year":"2021","unstructured":"Teodoro A, Gomes O, Saadi M (2021) An FPGA-based performance evaluation of artificial neural network architecture algorithm for IoT. Wirel Pers Commun. https:\/\/doi.org\/10.1007\/s11277-021-08566-1","journal-title":"Wirel Pers Commun"},{"key":"616_CR35","doi-asserted-by":"publisher","unstructured":"Tun\u00e7, Osman, Atan, \u00d6zkan, Tun\u00e7, Cemil, Yao, Jen-Chih (2021) Qualitative analyses of integro-fractional differential equations with caputo derivatives and retardations via the Lyapunov\u2013Razumikhin method. Axioms 10:2. https:\/\/doi.org\/10.3390\/axioms10020058, https:\/\/www.mdpi.com\/2075-1680\/10\/2\/58","DOI":"10.3390\/axioms10020058"},{"key":"616_CR36","doi-asserted-by":"crossref","unstructured":"Viet-Thanh P, Ali D, Al-Saidi N, Rajagopal K, Alsaadi F, Jafari S (2020) A novel mega-stable chaotic circuit. Radioengineering 29:141","DOI":"10.13164\/re.2020.0140"},{"key":"616_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.32604\/cmc.2020.09821","volume":"64","author":"M Waqas","year":"2020","unstructured":"Waqas M, Tu S, Rehman SU, Halim Z, Anwar S, Abbas G, Abbas ZH, Rehman OU (2020) Authentication of vehicles and road side units in intelligent transportation system. Comput Mater Contin 64:1. https:\/\/doi.org\/10.32604\/cmc.2020.09821","journal-title":"Comput Mater Contin"},{"issue":"3","key":"616_CR38","doi-asserted-by":"publisher","first-page":"1297","DOI":"10.32604\/cmc.2020.09873","volume":"63","author":"L Yan","year":"2020","unstructured":"Yan L, Zhang S, Chang Y, Sun Z, Sheng Z (2020) Quantum secure direct communication protocol with mutual authentication based on single photons and bell states. Comput Mater Contin 63(3):1297\u20131307. https:\/\/doi.org\/10.32604\/cmc.2020.09873","journal-title":"Comput Mater Contin"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00616-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-021-00616-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00616-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T17:15:28Z","timestamp":1651252528000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-021-00616-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,4]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["616"],"URL":"https:\/\/doi.org\/10.1007\/s40747-021-00616-2","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"type":"print","value":"2199-4536"},{"type":"electronic","value":"2198-6053"}],"subject":[],"published":{"date-parts":[[2022,1,4]]},"assertion":[{"value":"3 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"All authors declare that they have conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}