Cargando…

A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks

The industry-based internet of things (IIoT) describes how IIoT devices enhance and extend their capabilities for production amenities, security, and efficacy. IIoT establishes an enterprise-to-enterprise setup that means industries have several factories and manufacturing units that are dependent o...

Descripción completa

Detalles Bibliográficos
Autores principales: Singamaneni, Kranthi Kumar, Dhiman, Gaurav, Juneja, Sapna, Muhammad, Ghulam, AlQahtani, Salman A., Zaki, John
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9504852/
https://www.ncbi.nlm.nih.gov/pubmed/36146089
http://dx.doi.org/10.3390/s22186741
_version_ 1784796321518977024
author Singamaneni, Kranthi Kumar
Dhiman, Gaurav
Juneja, Sapna
Muhammad, Ghulam
AlQahtani, Salman A.
Zaki, John
author_facet Singamaneni, Kranthi Kumar
Dhiman, Gaurav
Juneja, Sapna
Muhammad, Ghulam
AlQahtani, Salman A.
Zaki, John
author_sort Singamaneni, Kranthi Kumar
collection PubMed
description The industry-based internet of things (IIoT) describes how IIoT devices enhance and extend their capabilities for production amenities, security, and efficacy. IIoT establishes an enterprise-to-enterprise setup that means industries have several factories and manufacturing units that are dependent on other sectors for their services and products. In this context, individual industries need to share their information with other external sectors in a shared environment which may not be secure. The capability to examine and inspect such large-scale information and perform analytical protection over the large volumes of personal and organizational information demands authentication and confidentiality so that the total data are not endangered after illegal access by hackers and other unauthorized persons. In parallel, these large volumes of confidential industrial data need to be processed within reasonable time for effective deliverables. Currently, there are many mathematical-based symmetric and asymmetric key cryptographic approaches and identity- and attribute-based public key cryptographic approaches that exist to address the abovementioned concerns and limitations such as computational overheads and taking more time for crucial generation as part of the encipherment and decipherment process for large-scale data privacy and security. In addition, the required key for the encipherment and decipherment process may be generated by a third party which may be compromised and lead to man-in-the-middle attacks, brute force attacks, etc. In parallel, there are some other quantum key distribution approaches available to produce keys for the encipherment and decipherment process without the need for a third party. However, there are still some attacks such as photon number splitting attacks and faked state attacks that may be possible with these existing QKD approaches. The primary motivation of our work is to address and avoid such abovementioned existing problems with better and optimal computational overhead for key generation, encipherment, and the decipherment process compared to the existing conventional models. To overcome the existing problems, we proposed a novel dynamic quantum key distribution (QKD) algorithm for critical public infrastructure, which will secure all cyber–physical systems as part of IIoT. In this paper, we used novel multi-state qubit representation to support enhanced dynamic, chaotic quantum key generation with high efficiency and low computational overhead. Our proposed QKD algorithm can create a chaotic set of qubits that act as a part of session-wise dynamic keys used to encipher the IIoT-based large scales of information for secure communication and distribution of sensitive information.
format Online
Article
Text
id pubmed-9504852
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-95048522022-09-24 A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks Singamaneni, Kranthi Kumar Dhiman, Gaurav Juneja, Sapna Muhammad, Ghulam AlQahtani, Salman A. Zaki, John Sensors (Basel) Article The industry-based internet of things (IIoT) describes how IIoT devices enhance and extend their capabilities for production amenities, security, and efficacy. IIoT establishes an enterprise-to-enterprise setup that means industries have several factories and manufacturing units that are dependent on other sectors for their services and products. In this context, individual industries need to share their information with other external sectors in a shared environment which may not be secure. The capability to examine and inspect such large-scale information and perform analytical protection over the large volumes of personal and organizational information demands authentication and confidentiality so that the total data are not endangered after illegal access by hackers and other unauthorized persons. In parallel, these large volumes of confidential industrial data need to be processed within reasonable time for effective deliverables. Currently, there are many mathematical-based symmetric and asymmetric key cryptographic approaches and identity- and attribute-based public key cryptographic approaches that exist to address the abovementioned concerns and limitations such as computational overheads and taking more time for crucial generation as part of the encipherment and decipherment process for large-scale data privacy and security. In addition, the required key for the encipherment and decipherment process may be generated by a third party which may be compromised and lead to man-in-the-middle attacks, brute force attacks, etc. In parallel, there are some other quantum key distribution approaches available to produce keys for the encipherment and decipherment process without the need for a third party. However, there are still some attacks such as photon number splitting attacks and faked state attacks that may be possible with these existing QKD approaches. The primary motivation of our work is to address and avoid such abovementioned existing problems with better and optimal computational overhead for key generation, encipherment, and the decipherment process compared to the existing conventional models. To overcome the existing problems, we proposed a novel dynamic quantum key distribution (QKD) algorithm for critical public infrastructure, which will secure all cyber–physical systems as part of IIoT. In this paper, we used novel multi-state qubit representation to support enhanced dynamic, chaotic quantum key generation with high efficiency and low computational overhead. Our proposed QKD algorithm can create a chaotic set of qubits that act as a part of session-wise dynamic keys used to encipher the IIoT-based large scales of information for secure communication and distribution of sensitive information. MDPI 2022-09-06 /pmc/articles/PMC9504852/ /pubmed/36146089 http://dx.doi.org/10.3390/s22186741 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Singamaneni, Kranthi Kumar
Dhiman, Gaurav
Juneja, Sapna
Muhammad, Ghulam
AlQahtani, Salman A.
Zaki, John
A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks
title A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks
title_full A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks
title_fullStr A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks
title_full_unstemmed A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks
title_short A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks
title_sort novel qkd approach to enhance iiot privacy and computational knacks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9504852/
https://www.ncbi.nlm.nih.gov/pubmed/36146089
http://dx.doi.org/10.3390/s22186741
work_keys_str_mv AT singamanenikranthikumar anovelqkdapproachtoenhanceiiotprivacyandcomputationalknacks
AT dhimangaurav anovelqkdapproachtoenhanceiiotprivacyandcomputationalknacks
AT junejasapna anovelqkdapproachtoenhanceiiotprivacyandcomputationalknacks
AT muhammadghulam anovelqkdapproachtoenhanceiiotprivacyandcomputationalknacks
AT alqahtanisalmana anovelqkdapproachtoenhanceiiotprivacyandcomputationalknacks
AT zakijohn anovelqkdapproachtoenhanceiiotprivacyandcomputationalknacks
AT singamanenikranthikumar novelqkdapproachtoenhanceiiotprivacyandcomputationalknacks
AT dhimangaurav novelqkdapproachtoenhanceiiotprivacyandcomputationalknacks
AT junejasapna novelqkdapproachtoenhanceiiotprivacyandcomputationalknacks
AT muhammadghulam novelqkdapproachtoenhanceiiotprivacyandcomputationalknacks
AT alqahtanisalmana novelqkdapproachtoenhanceiiotprivacyandcomputationalknacks
AT zakijohn novelqkdapproachtoenhanceiiotprivacyandcomputationalknacks