Digital repository of Slovenian research organisations

Show document
A+ | A- | Help | SLO | ENG

Title:A multi layered encryption framework using intuitionistic fuzzy graphs and graph theoretic domination for secure communication networks
Authors:ID Meenakshi, Annamalai (Author)
ID Dhanushiya, S. (Author)
ID Mršić, Leo (Author)
ID Kalampakas, Antonios (Author)
ID Samanta, Sovan (Author)
Files:URL URL - Source URL, visit https://www.nature.com/articles/s41598-025-01924-0
 
.pdf PDF - Presentation file, download (9,87 MB)
MD5: 2C72E1CD8F58D85EE85710F76BC3103E
 
Language:English
Typology:1.01 - Original Scientific Article
Organization:Logo RUDOLFOVO - Rudolfovo - Science and Technology Centre Novo Mesto
Abstract:Secure communication is essential in today’s rapidly evolving digital environment, and strong encryption methods are required to protect private data from unwanted access. The aim of this study is to strengthen the security and complexity of encrypted communications by adopting a new form of cryptographic encryption technique based on the principles of an intuitionistic fuzzy graph. Key graphtheoretic measures, such as domination number, vertex categorization (alpha-strong, beta-strong, and gamma-strong), vertex order coloring, and chromatic number, play important roles in this process. Domination number finds the key vertices of the network, while vertex strength categorization and fuzzy graph coloring provide multiple encryption layers, hence the encoded message is highly resistant to decryption unless a proper key is used. The chromatic number offers further security through various patterns of vertex coloring. The comparative analysis shows the proposed approach to be superior compared to RSA, AES, ECC, and Blowfish due to its increased security, computational efficiency, and resilience to attacks. This framework can be applied to the protection of banking PINs, military access codes, government identification numbers, cryptographic keys, and medical records, so it is an extremely versatile solution for protecting sensitive data. This multi-step approach to encryption through the proposed technique ensures safe transfer and efficient encoding as it establishes a complicated framework.
Keywords:Graph network, Vertex order coloring, α−strong vertex, β−strong vertex, γ–strong vertex, Domination number
Publication status:Published
Publication version:Version of Record
Publication date:01.07.2025
Publisher:Nature Publishing Group
Year of publishing:2025
Number of pages:str. 1-22
Numbering:Vol. 15, article no. ǂ20992
PID:20.500.12556/DiRROS-22940 New window
UDC:519.17
ISSN on article:2045-2322
DOI:10.1038/s41598-025-01924-0 New window
COBISS.SI-ID:242008323 New window
Note:Nasl. z nasl. zaslona; Opis vira z dne 9. 7. 2025; Soavtorji: S. Dhanushiya, Leo Mrsic, Antonios Kalampakas & Sovan Samanta;
Publication date in DiRROS:09.09.2025
Views:291
Downloads:139
Metadata:XML DC-XML DC-RDF
:
Copy citation
  
Share:Bookmark and Share


Hover the mouse pointer over a document title to show the abstract or click on the title to get all document metadata.

Record is a part of a journal

Title:Scientific reports
Shortened title:Sci. rep.
Publisher:Nature Publishing Group
ISSN:2045-2322
COBISS.SI-ID:18727432 New window

Licences

License:CC BY-ND 4.0, Creative Commons Attribution-NoDerivatives 4.0 International
Link:http://creativecommons.org/licenses/by-nd/4.0/
Description:Under the NoDerivatives Creative Commons license one can take a work released under this license and re-distribute it, but it cannot be shared with others in adapted form, and credit must be provided to the author.

Secondary language

Language:Slovenian
Keywords:omrežje grafov, barvanje vrstnega reda vozlišč, α-močno vozlišče, β-močno vozlišče, γ-močno vozlišče, dominantno število


Back