| Naslov: | A multi layered encryption framework using intuitionistic fuzzy graphs and graph theoretic domination for secure communication networks |
|---|
| Avtorji: | ID Meenakshi, Annamalai (Avtor) ID Dhanushiya, S. (Avtor) ID Mršić, Leo (Avtor) ID Kalampakas, Antonios (Avtor) ID Samanta, Sovan (Avtor) |
| Datoteke: | URL - Izvorni URL, za dostop obiščite https://www.nature.com/articles/s41598-025-01924-0
PDF - Predstavitvena datoteka, prenos (9,87 MB) MD5: 2C72E1CD8F58D85EE85710F76BC3103E
|
|---|
| Jezik: | Angleški jezik |
|---|
| Tipologija: | 1.01 - Izvirni znanstveni članek |
|---|
| Organizacija: | RUDOLFOVO - Rudolfovo – Znanstveno in tehnološko središče Novo mesto
|
|---|
| Povzetek: | Secure communication is essential in today’s rapidly evolving digital environment, and strong encryption methods are required to protect private data from unwanted access. The aim of this study is to strengthen the security and complexity of encrypted communications by adopting a new form of cryptographic encryption technique based on the principles of an intuitionistic fuzzy graph. Key graphtheoretic measures, such as domination number, vertex categorization (alpha-strong, beta-strong, and gamma-strong), vertex order coloring, and chromatic number, play important roles in this process. Domination number finds the key vertices of the network, while vertex strength categorization and fuzzy graph coloring provide multiple encryption layers, hence the encoded message is highly resistant to decryption unless a proper key is used. The chromatic number offers further security through various patterns of vertex coloring. The comparative analysis shows the proposed approach to be superior compared to RSA, AES, ECC, and Blowfish due to its increased security, computational efficiency, and resilience to attacks. This framework can be applied to the protection of banking PINs, military access codes, government identification numbers, cryptographic keys, and medical records, so it is an extremely versatile solution for protecting sensitive data. This multi-step approach to encryption through the proposed technique ensures safe transfer and efficient encoding as it establishes a complicated framework. |
|---|
| Ključne besede: | Graph network, Vertex order coloring, α−strong vertex, β−strong vertex, γ–strong vertex, Domination number |
|---|
| Status publikacije: | Objavljeno |
|---|
| Verzija publikacije: | Objavljena publikacija |
|---|
| Datum objave: | 01.07.2025 |
|---|
| Založnik: | Nature Publishing Group |
|---|
| Leto izida: | 2025 |
|---|
| Št. strani: | str. 1-22 |
|---|
| Številčenje: | Vol. 15, article no. ǂ20992 |
|---|
| PID: | 20.500.12556/DiRROS-22940  |
|---|
| UDK: | 519.17 |
|---|
| ISSN pri članku: | 2045-2322 |
|---|
| DOI: | 10.1038/s41598-025-01924-0  |
|---|
| COBISS.SI-ID: | 242008323  |
|---|
| Opomba: | Nasl. z nasl. zaslona;
Opis vira z dne 9. 7. 2025;
Soavtorji: S. Dhanushiya, Leo Mrsic, Antonios Kalampakas & Sovan Samanta;
|
|---|
| Datum objave v DiRROS: | 09.09.2025 |
|---|
| Število ogledov: | 292 |
|---|
| Število prenosov: | 139 |
|---|
| Metapodatki: |  |
|---|
|
:
|
Kopiraj citat |
|---|
| | | | Objavi na: |  |
|---|
Postavite miškin kazalec na naslov za izpis povzetka. Klik na naslov izpiše
podrobnosti ali sproži prenos. |