scholarly journals Securing IOT Network through Quantum Key Distribution

Current cryptographic techniques broadly specified as conventional cryptography is solely based on the solidity of the mathematical concepts. The advancements in quantum computing can use reversible logic to compute the keys and easily break the existing security in conventional computers. From the analysis of the network structure of Internet of Things (IOT) it is very clear that the entire backbone of the system would collapse if it is attacked or hacked. IOT is a wireless technology that connects “ANYTHING” around to the Internet. IOT is a revolution which should be protected from the attackers as it would lead to several losses which could even be fatal. Hence a strong provision for securing users data in IOT is a real challenge. This paper is attempted to review the fundamentals of Quantum Key Distribution, security aspects for IOT and to address how QKD can be used to secure a IOT system. The challenge encountered is to increase the range and increase the transmission rate of data in QKD systems and to check for a possible solution to adhere these systems with existing information security solutions

Cryptography ◽  
2020 ◽  
Vol 4 (3) ◽  
pp. 24
Author(s):  
Noah Cowper ◽  
Harry Shaw ◽  
David Thayer

The ability to send information securely is a vital aspect of today’s society, and with the developments in quantum computing, new ways to communicate have to be researched. We explored a novel application of quantum key distribution (QKD) and synchronized chaos which was utilized to mask a transmitted message. This communication scheme is not hampered by the ability to send single photons and consequently is not vulnerable to number splitting attacks like other QKD schemes that rely on single photon emission. This was shown by an eavesdropper gaining a maximum amount of information on the key during the first setup and listening to the key reconciliation to gain more information. We proved that there is a maximum amount of information an eavesdropper can gain during the communication, and this is insufficient to decode the message.


2020 ◽  
Vol 18 (06) ◽  
pp. 2050031
Author(s):  
Ali Mehri-Toonabi ◽  
Mahdi Davoudi Darareh ◽  
Shahrooz Janbaz

In this work, we introduce a high-dimensional polarization-phase (PoP)-based quantum key distribution protocol, briefly named PoP[Formula: see text], where [Formula: see text] is the dimension of a hybrid quantum state including polarization and phase degrees of freedom of the same photon, and [Formula: see text] is the number of mutually unbiased bases. We present a detailed description of the PoP[Formula: see text] protocol as a special case, and evaluate its security against various individual and coherent eavesdropping strategies, and in each case, we compare it with the BB84 and the two-dimensional (TD)-PoP protocols. In all the strategies, the error threshold and the effective transmission rate of the PoP[Formula: see text] protocol are far greater than the other two protocols. Unlike most high-dimensional protocols, the simplicity of producing and detecting the qudits and the use of conventional components (such as traditional single-photon sources and quantum channels) are among the features of the PoP[Formula: see text] protocol.


Sensors ◽  
2020 ◽  
Vol 20 (5) ◽  
pp. 1409
Author(s):  
Angus Wong ◽  
Yan Tai Chow

As satellite communications provide ubiquitous coverage, they play a key role in providing Internet connectivity in remote or marginalized areas, so as to enable the vision of a truly global connectivity of the Internet of Things (IoT). However, these areas often lack reliable electricity supply. Thus, this paper proposes a satellite internet access point powered by solar energy, so that a stable Internet connection can be provided. The access point provides Wi-Fi coverage so that sensors, IoT, and devices can connect to the access point using the Wi-Fi, a common wireless technology. Our design took some cost-saving measures to make it affordable and selected the components that require minimal maintenance operations. The satellite access point costs about USD $500, and can provide four days of Internet connectivity without solar energy.


2020 ◽  
Vol 3 (1) ◽  
Author(s):  
Ana Lavinia Petrache ◽  
George Suciu

Quantum key distribution will bring more confidentiality and privacy of communication in the future ICT world and will solve the eavesdropping issue. Domains regarded are e-government, e-commerce, e-health, transmission of biometric data, intelligent transport systems and more. So far, quantum researches focus on using properties of the qubit to bring improvements in technologies from our days.  The purpose of this paper is to describe the quantum encryption methods. These methods can bring more efficiency of security in existing communications. In this matter, many encryption architectures have been proposed. As an example, the QKD architecture is presented in this paper.


2020 ◽  
Vol 175 ◽  
pp. 107268 ◽  
Author(s):  
Eunsang Cho ◽  
Jeongnyeo Kim ◽  
Minkyung Park ◽  
Hyeonmin Lee ◽  
Chorom Hamm ◽  
...  

2019 ◽  
Vol 9 (18) ◽  
pp. 3937
Author(s):  
Ying Guo ◽  
Minglu Cai ◽  
Duan Huang

Polarization is one of the physical characteristics of optical waves, and the polarization-division-multiplexing (PDM) scheme has gained much attraction thanks to its capability of achieving high transmission rate. In the PDM-based quantum key distribution (QKD), the key information could be encoded independently by the optical fields E x and E y , where the 2-dimensional modulation and orthogonal polarization multiplexing usually result in two-fold channel capacity. Unfortunately, the non-negligible polarization-dependent loss (PDL) caused by the crystal dichroism in optical devices may result in the signal distortion, leading to an imbalanced optical signal-to-noise ratio. Here, we present a polarization-pairwise coding (PPC) scheme for the PDM-based continuous-variable (CV) QKD systems to overcome the PDL problem. Numerical simulation results indicate that the PDL-induced performance degradation can be mitigated. In addition, the PPC scheme, tailored to be robust against a high level of PDL, offers a suitable solution to improve the performance of the PDM-based CVQKD in terms of the secret key rate and maximal transmission distance.


Author(s):  
Meenakshi Sharma ◽  
Sonia Thind

In order to protect and secure the sensitive data over the internet, the current data security methods typically depend on the cryptographic systems. Recent achievements in quantum computing is a major challenge to such cryptography systems. In this way, the quantum key distribution (QKD) technique evolves as a very important technique which gives un-conditional data security. This technique is based on the laws of quantum physics for its security. This article gives a detailed description of the QKD technique. This technique secures the encryption key delivery between the two authenticated parties from the unauthorized access. In the next phase, quantum cryptography model is discussed. Finally, some important application areas and limitations of this technology are be discussed.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Ning Sun ◽  
Tao Li ◽  
Gongfei Song ◽  
Haoran Xia

In the process of implementing the Internet of Things, the object itself has identity information and identification equipment and encounters difficulties in communication security during the process of entering the network communication. Just like the Internet and wireless sensor networks, there are security issues in information transmission. Therefore, it is of great significance to study the mobile Internet of Things network security technology depression to protect the communication information in the mobile Internet of Things. This paper mainly studies the network security technology of intelligent information terminal based on mobile Internet of Things. This article will analyze and compare the mainstream encryption algorithms of the current mobile Internet and choose a safer and more secure HASH algorithm. We study the flow of key management, key generation, key distribution, verification key distribution, key update, key storage, key backup, and key validity time setting for mobile Internet of Things, using an existing identity cryptosystem. Based on encryption, the design technology of key management and authentication in this paper is improved. Compared with other methods, the storage consumption of this method on GWN is relatively medium. In the initial stage, the storage is 32 bytes, then in registration stage 1, it reaches 84 bytes, in registration stage 2, it is 82 bytes, and then, in the login authentication phase, the number of bytes rose and reached 356 bytes in authentication phase 3. Experimental results show that this protocol has certain advantages in ensuring safety performance.


Sign in / Sign up

Export Citation Format

Share Document