Adaptive cryptography: a transformer neural network-based approach for anomaly detection and secure messaging with signReencryption

The increasing sophistication of cyber threats, particularly in decentralized and resource-constrained environments such as the Internet of Things (IoT), demands adaptive and efficient security solutions. This study introduces SignReencryption, a unified framework that integrates signcryption, proxy...

Full description

Saved in:
Bibliographic Details
Main Author: Tee, Junn Jeh
Format: Final Year Project / Dissertation / Thesis
Published: 2025
Subjects:
Online Access:http://eprints.utar.edu.my/7281/1/SE_2105387_FYP_Report_%2D_TeeJunnJeh_TEE_JUNN_JEH.pdf
http://eprints.utar.edu.my/7281/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The increasing sophistication of cyber threats, particularly in decentralized and resource-constrained environments such as the Internet of Things (IoT), demands adaptive and efficient security solutions. This study introduces SignReencryption, a unified framework that integrates signcryption, proxy re-encryption (PRE), and Transformer-based intrusion detection to deliver both cryptographic assurance and intelligent adaptability. Signcryption ensures confidentiality and authenticity in a single lightweight operation, while PRE enables scalable, fine-grained access control without exposing plaintext. A TabTransformer-based intrusion detection system complements these cryptographic mechanisms, achieving classification accuracies of 94% on CICIDS2017, 99% on CIDDS-001, and 97% on NSL-KDD, with particular strength in detecting minority attack classes traditionally overlooked by baseline models. Optuna-driven hyperparameter optimization revealed dataset-specific configurations, demonstrating the adaptability of the TabTransformer across heterogeneous traffic distributions. Experimental evaluation further shows that SignReencryption reduces ciphertext expansion by up to 50% and lowers per-message execution time by nearly half compared to conventional Sign-Then-Encrypt schemes, confirming its practicality for real-time and bandwidth-limited environments such as intelligent transportation systems. Overall, the framework advances intrusion detection by uniting cryptographic efficiency with adaptive intelligence, offering a scalable, resilient, and operationally viable defense model for modern cybersecurity challenges. Keywords: Signcryption; Cryptography; Transformer Neural Network; Intrusion Detection System; Internet of Things Subject Area: QA75.5-76.95