scholarly journals Secure Quantum Key Distribution Encryption method for Efficient Data Communication in Wireless Body Area Sensor Net-works

2018 ◽  
Vol 7 (2.32) ◽  
pp. 331
Author(s):  
Y Sai Suguna ◽  
B Kavya Reddy ◽  
V Keerthi Durga ◽  
A Roshini

Wireless sensor networks has found its advancement in sensing the physiological parameters of human body through WBAN. Such nodes are either implanted or surface mounted on the human body in a particular position. The main purpose of these networks is to send the data generated by the wearable device outside the WLAN or the Internet. The BAN will continuously monitor the psychological changes like blood volume pressure (BVP), Brain signals etc. Uncertainty in the normal values will result in transmit all the information to the respective recipient to take required treatment. If an emergency is detected, the doctor instantly updates the patient’s health by sending a specific message. There is limited confidentiality, so the intruders will gather sensitive data. Public key cryptography can be used to create an unprotected communication channel. It also provides a convenient way to implement keys. This paper is focusing on a unique key generation technique called Quantum key distribution, which is used to create symmetric key method by using quantum properties of optics to transfer information from one Client to another in One-Time Pad manner. The special feature of the technique is to guarantee that the key cannot be intercepted during transmission without alerting the users to provide high authentication for received data.   

Photonics ◽  
2021 ◽  
Vol 8 (6) ◽  
pp. 208
Author(s):  
Xiangqing Wang ◽  
Jie Zhang ◽  
Bo Wang ◽  
Kongni Zhu ◽  
Haokun Song ◽  
...  

With the increase in the popularity of cloud computing and big data applications, the amount of sensitive data transmitted through optical networks has increased dramatically. Furthermore, optical transmission systems face various security risks at the physical level. We propose a novel key distribution scheme based on signal-to-noise ratio (SNR) measurements to extract the fingerprint of the fiber channel and improve the physical level of security. The SNR varies with time because the fiber channel is affected by many physical characteristics, such as dispersion, polarization, scattering, and amplifier noise. The extracted SNR of the optical fiber channel can be used as the basis of key generation. Alice and Bob can obtain channel characteristics by measuring the SNR of the optical fiber channel and generate the consistent key by quantization coding. The security and consistency of the key are guaranteed by the randomness and reciprocity of the channel. The simulation results show that the key generation rate (KGR) can reach 25 kbps, the key consistency rate (KCR) can reach 98% after key post-processing, and the error probability of Eve’s key is ~50%. In the proposed scheme, the equipment used is simple and compatible with existing optic fiber links.


Laser Physics ◽  
2010 ◽  
Vol 20 (5) ◽  
pp. 1210-1214 ◽  
Author(s):  
F. A. A. El-Orany ◽  
M. R. B. Wahiddin ◽  
M. -A. Mat-Nor ◽  
N. Jamil ◽  
I. Bahari

Author(s):  
G. Sridevi Devasena ◽  
S. Kanmani

<p>Wireless Body Area Networks (WBANs) are fundamental technology in health care that permits the information of a patient’s essential body parameters to be gathered by the sensors. However, the safety and concealment defense of the gathered information is a key uncertain problem. A Hybrid Key Management (HKM) scheme [13] is worked based on Public Key Cryptography (PKC)-authentication scheme. This scheme uses a oneway hash function to construct a Merkle Tree. The PKC method increase the computational complexity and lacking scalability. Additionally, it increases expensive computation, communication costs and delay. To overcome this problem, Robust Security for Protected Health Information by ECC with signature Hash Function in WBAN (RSP) is proposed. The system employs hash-chain based key signature technique to achieve efficient, secure transmission from sensor to user in WBAN. Moreover, Elliptical Curve Cryptography algorithm is used to verifies the authenticate sensor. In addition, it describes the experimental results of the proposed system demonstrate the efficient data communication in a network.</p>


2005 ◽  
Vol 03 (supp01) ◽  
pp. 143-143 ◽  
Author(s):  
HOI-KWONG LO

Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states—a vacuum and a weak decoy state—asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution", . We also have done the first experimental demonstration of decoy state quantum key distribution, over 15km of Telecom fibers. This part of work is published in "Experimental Decoy State Quantum Key Distribution Over 15km", .


2019 ◽  
Vol 34 (04) ◽  
pp. 2050063
Author(s):  
Yefeng He ◽  
Wenping Ma

With heralded pair coherent states (HPCS), orbital angular momentum (OAM) states and pulse position modulation (PPM) technology, a decoy-state measurement-device-independent quantum key distribution (MDI-QKD) protocol is proposed. OAM states and PPM technology are used to realize the coding of the signal states in the HPCS light source. The use of HPCS light source, OAM coding and PPM coding cannot only reduce the error rate but also improve the key generation rate and communication distance. The new MDI-QKD protocol also employs three-intensity decoy states to avoid the attacks against the light source. By calculating the error rate and key generation rate, the performance of the MDI-QKD protocol is analyzed. Numerical simulation shows that the protocol has very low error rate and very high key generation rate. Moreover, the maximum communication distance can reach 455 km.


2017 ◽  
Vol 15 (08) ◽  
pp. 1740018
Author(s):  
Alan Kanapin ◽  
Alexander Duplinskiy ◽  
Alexander Sokolov ◽  
Sergey Vorobey ◽  
Alexander Miller ◽  
...  

In this work, the results of quantum key distribution through an urban fiber communication line with a length of 30.6[Formula: see text]km and losses of 11.7[Formula: see text]dB, obtained by both phase and polarization encoding-based devices, are presented. For phase encoding, a two-pass auto-compensating optical scheme, commonly called “plug&play”, was used. For polarization encoding, a self-developed unconventional optical scheme was made. A continuous key distribution with a sifted key generation rate of 1.0[Formula: see text]kbit/s and a quantum bit error rate of 5.7% was implemented when using “plug&play” device, whereas 0.1[Formula: see text]kbit/s and 5.5% was observed when using one with polarization encoding. The features and conveniences of both implementations are discussed.


2009 ◽  
Vol 9 (1&2) ◽  
pp. 131-165
Author(s):  
C.-H. F. Fung ◽  
K. Tamaki ◽  
B. Qi ◽  
H.-K. Lo ◽  
X. Ma

In theory, quantum key distribution (QKD) offers unconditional security based on the laws of physics. However, as demonstrated in recent quantum hacking theory and experimental papers, detection efficiency loophole can be fatal to the security of practical QKD systems. Here, we describe the physical origin of detection efficiency mismatch in various domains including spatial, spectral, and time domains and in various experimental set-ups. More importantly, we prove the unconditional security of QKD even with detection efficiency mismatch. We explicitly show how the key generation rate is characterized by the maximal detection efficiency ratio between the two detectors. Furthermore, we prove that by randomly switching the bit assignments of the detectors, the effect of detection efficiency mismatch can be completely eliminated.


Author(s):  
Meenakshi Sharma ◽  
Sonia Thind

In order to protect and secure the sensitive data over the internet, the current data security methods typically depend on the cryptographic systems. Recent achievements in quantum computing is a major challenge to such cryptography systems. In this way, the quantum key distribution (QKD) technique evolves as a very important technique which gives un-conditional data security. This technique is based on the laws of quantum physics for its security. This article gives a detailed description of the QKD technique. This technique secures the encryption key delivery between the two authenticated parties from the unauthorized access. In the next phase, quantum cryptography model is discussed. Finally, some important application areas and limitations of this technology are be discussed.


2008 ◽  
Vol 06 (02) ◽  
pp. 347-367 ◽  
Author(s):  
A. S. TRUSHECHKIN ◽  
I. V. VOLOVICH

Quantum cryptography is used to find practical and useful applications. Recently, some first quantum cryptographic solutions became available on the market. For clients, it is important to be able to compare the quality and properties of the proposed products. To this end, one needs to elaborate on specifications and standards of solutions in quantum cryptography. We propose and discuss a list of characteristics for the specification, which includes numerical evaluations of the security of solution and can be considered as a standard for quantum key distribution solutions. The list is based on the average time of key generation, depending on some parameters. In the simplest case for the user, the list includes three characteristics: the security degree, the length of keys and the key refresh rate.


2005 ◽  
Vol 03 (supp01) ◽  
pp. 97-110
Author(s):  
BERTHOLD-GEORG ENGLERT ◽  
FANG-WEI FU ◽  
HARALD NIEDERREITER ◽  
CHAOPING XING

As an alternative to the usual key generation by two-way communication in schemes for quantum cryptography, we consider codes for key generation by one-way communication. We study codes that could be applied to the raw key sequences that are ideally obtained in recently proposed scenarios for quantum key distribution, which can be regarded as communication through symmetric four-letter channels.


Sign in / Sign up

Export Citation Format

Share Document