Cargando…

An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy †

The Internet of Things (IoT) strongly influences the world economy; this emphasizes the importance of securing all four aspects of the IoT model: sensors, networks, cloud, and applications. Considering the significant value of public-key cryptography threats on IoT system confidentiality, it is vita...

Descripción completa

Detalles Bibliográficos
Autores principales: Shamshad, Shuhab, Riaz, Farina, Riaz, Rabia, Rizvi, Sanam Shahla, Abdulla, Shahab
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9656278/
https://www.ncbi.nlm.nih.gov/pubmed/36365848
http://dx.doi.org/10.3390/s22218151
_version_ 1784829393816780800
author Shamshad, Shuhab
Riaz, Farina
Riaz, Rabia
Rizvi, Sanam Shahla
Abdulla, Shahab
author_facet Shamshad, Shuhab
Riaz, Farina
Riaz, Rabia
Rizvi, Sanam Shahla
Abdulla, Shahab
author_sort Shamshad, Shuhab
collection PubMed
description The Internet of Things (IoT) strongly influences the world economy; this emphasizes the importance of securing all four aspects of the IoT model: sensors, networks, cloud, and applications. Considering the significant value of public-key cryptography threats on IoT system confidentiality, it is vital to secure it. One of the potential candidates to assist in securing public key cryptography in IoT is quantum computing. Although the notion of IoT and quantum computing convergence is not new, it has been referenced in various works of literature and covered by many scholars. Quantum computing eliminates most of the challenges in IoT. This research provides a comprehensive introduction to the Internet of Things and quantum computing before moving on to public-key cryptography difficulties that may be encountered across the convergence of quantum computing and IoT. An enhanced architecture is then proposed for resolving these public-key cryptography challenges using SimuloQron to implement the BB84 protocol for quantum key distribution (QKD) and one-time pad (OTP). The proposed model prevents eavesdroppers from performing destructive operations in the communication channel and cyber side by preserving its state and protecting the public key using quantum cryptography and the BB84 protocol. A modified version is introduced for this IoT situation. A traditional cryptographic mechanism called “one-time pad” (OTP) is employed in hybrid management.
format Online
Article
Text
id pubmed-9656278
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-96562782022-11-15 An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy † Shamshad, Shuhab Riaz, Farina Riaz, Rabia Rizvi, Sanam Shahla Abdulla, Shahab Sensors (Basel) Article The Internet of Things (IoT) strongly influences the world economy; this emphasizes the importance of securing all four aspects of the IoT model: sensors, networks, cloud, and applications. Considering the significant value of public-key cryptography threats on IoT system confidentiality, it is vital to secure it. One of the potential candidates to assist in securing public key cryptography in IoT is quantum computing. Although the notion of IoT and quantum computing convergence is not new, it has been referenced in various works of literature and covered by many scholars. Quantum computing eliminates most of the challenges in IoT. This research provides a comprehensive introduction to the Internet of Things and quantum computing before moving on to public-key cryptography difficulties that may be encountered across the convergence of quantum computing and IoT. An enhanced architecture is then proposed for resolving these public-key cryptography challenges using SimuloQron to implement the BB84 protocol for quantum key distribution (QKD) and one-time pad (OTP). The proposed model prevents eavesdroppers from performing destructive operations in the communication channel and cyber side by preserving its state and protecting the public key using quantum cryptography and the BB84 protocol. A modified version is introduced for this IoT situation. A traditional cryptographic mechanism called “one-time pad” (OTP) is employed in hybrid management. MDPI 2022-10-25 /pmc/articles/PMC9656278/ /pubmed/36365848 http://dx.doi.org/10.3390/s22218151 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Shamshad, Shuhab
Riaz, Farina
Riaz, Rabia
Rizvi, Sanam Shahla
Abdulla, Shahab
An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy †
title An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy †
title_full An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy †
title_fullStr An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy †
title_full_unstemmed An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy †
title_short An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy †
title_sort enhanced architecture to resolve public-key cryptographic issues in the internet of things (iot), employing quantum computing supremacy †
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9656278/
https://www.ncbi.nlm.nih.gov/pubmed/36365848
http://dx.doi.org/10.3390/s22218151
work_keys_str_mv AT shamshadshuhab anenhancedarchitecturetoresolvepublickeycryptographicissuesintheinternetofthingsiotemployingquantumcomputingsupremacy
AT riazfarina anenhancedarchitecturetoresolvepublickeycryptographicissuesintheinternetofthingsiotemployingquantumcomputingsupremacy
AT riazrabia anenhancedarchitecturetoresolvepublickeycryptographicissuesintheinternetofthingsiotemployingquantumcomputingsupremacy
AT rizvisanamshahla anenhancedarchitecturetoresolvepublickeycryptographicissuesintheinternetofthingsiotemployingquantumcomputingsupremacy
AT abdullashahab anenhancedarchitecturetoresolvepublickeycryptographicissuesintheinternetofthingsiotemployingquantumcomputingsupremacy
AT shamshadshuhab enhancedarchitecturetoresolvepublickeycryptographicissuesintheinternetofthingsiotemployingquantumcomputingsupremacy
AT riazfarina enhancedarchitecturetoresolvepublickeycryptographicissuesintheinternetofthingsiotemployingquantumcomputingsupremacy
AT riazrabia enhancedarchitecturetoresolvepublickeycryptographicissuesintheinternetofthingsiotemployingquantumcomputingsupremacy
AT rizvisanamshahla enhancedarchitecturetoresolvepublickeycryptographicissuesintheinternetofthingsiotemployingquantumcomputingsupremacy
AT abdullashahab enhancedarchitecturetoresolvepublickeycryptographicissuesintheinternetofthingsiotemployingquantumcomputingsupremacy