UTAR Institutional Repository

Adaptive cryptography: a transformer neural network-based approach for anomaly detection and secure messaging with signReencryption

Tee, Junn Jeh (2025) Adaptive cryptography: a transformer neural network-based approach for anomaly detection and secure messaging with signReencryption. Final Year Project, UTAR.

[img] PDF
Download (2249Kb)

    Abstract

    The increasing sophistication of cyber threats, particularly in decentralized and resource-constrained environments such as the Internet of Things (IoT), demands adaptive and efficient security solutions. This study introduces SignReencryption, a unified framework that integrates signcryption, proxy re-encryption (PRE), and Transformer-based intrusion detection to deliver both cryptographic assurance and intelligent adaptability. Signcryption ensures confidentiality and authenticity in a single lightweight operation, while PRE enables scalable, fine-grained access control without exposing plaintext. A TabTransformer-based intrusion detection system complements these cryptographic mechanisms, achieving classification accuracies of 94% on CICIDS2017, 99% on CIDDS-001, and 97% on NSL-KDD, with particular strength in detecting minority attack classes traditionally overlooked by baseline models. Optuna-driven hyperparameter optimization revealed dataset-specific configurations, demonstrating the adaptability of the TabTransformer across heterogeneous traffic distributions. Experimental evaluation further shows that SignReencryption reduces ciphertext expansion by up to 50% and lowers per-message execution time by nearly half compared to conventional Sign-Then-Encrypt schemes, confirming its practicality for real-time and bandwidth-limited environments such as intelligent transportation systems. Overall, the framework advances intrusion detection by uniting cryptographic efficiency with adaptive intelligence, offering a scalable, resilient, and operationally viable defense model for modern cybersecurity challenges. Keywords: Signcryption; Cryptography; Transformer Neural Network; Intrusion Detection System; Internet of Things Subject Area: QA75.5-76.95

    Item Type: Final Year Project / Dissertation / Thesis (Final Year Project)
    Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
    Q Science > QA Mathematics > QA76 Computer software
    Divisions: Lee Kong Chian Faculty of Engineering and Science > Bachelor of Science (Honours) Software Engineering
    Depositing User: Sg Long Library
    Date Deposited: 13 Jan 2026 18:03
    Last Modified: 13 Jan 2026 18:03
    URI: http://eprints.utar.edu.my/id/eprint/7281

    Actions (login required)

    View Item