Application of Odd-Even Congruence Graph Labeling in Secured Cyber Physical Systems

Application of Odd-Even Congruence Graph Labeling in Secured Cyber Physical Systems

Kanakambika K., Thamizhendhi G.
ISBN13: 9781799893080|ISBN10: 1799893081|ISBN13 Softcover: 9781799893097|EISBN13: 9781799893103
DOI: 10.4018/978-1-7998-9308-0.ch006
Cite Chapter Cite Chapter

MLA

K., Kanakambika, and Thamizhendhi G. "Application of Odd-Even Congruence Graph Labeling in Secured Cyber Physical Systems." Real-Time Applications of Machine Learning in Cyber-Physical Systems, edited by Balamurugan Easwaran, et al., IGI Global, 2022, pp. 77-92. https://doi.org/10.4018/978-1-7998-9308-0.ch006

APA

K., K. & G., T. (2022). Application of Odd-Even Congruence Graph Labeling in Secured Cyber Physical Systems. In B. Easwaran, K. Hiran, S. Krishnan, & R. Doshi (Eds.), Real-Time Applications of Machine Learning in Cyber-Physical Systems (pp. 77-92). IGI Global. https://doi.org/10.4018/978-1-7998-9308-0.ch006

Chicago

K., Kanakambika, and Thamizhendhi G. "Application of Odd-Even Congruence Graph Labeling in Secured Cyber Physical Systems." In Real-Time Applications of Machine Learning in Cyber-Physical Systems, edited by Balamurugan Easwaran, et al., 77-92. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-7998-9308-0.ch006

Export Reference

Mendeley
Favorite

Abstract

Technological advancement in the recent decades enhanced the calibre of human life. Contemporary research in machine learning (ML) exhibits a mock-up to make decisions on its own and is applied in various fields including medical diagnosis, email filtering, banking, computer vision, financial marketing, image processing, cyber security. The systems inter-connected across the world via internet are attacked by hackers, and it is prevented by cyber security. The optimum solution for cyber-attacks is attained by collaborating ML techniques with cyber security and envisioned issues are designed by cyber machine learning models. In this chapter, an algorithm is proposed to defend data by encoding the text to an unintelligent text and decoding it to original text by applying graph labelling in cryptography. Symmetric key is designed based on the edge label of an odd-even congruence graph to achieve secured communication in CPS. In addition, a program is suggested using Python programming to attain cipher text and its converse.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.