Cargando…
An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy †
The Internet of Things (IoT) strongly influences the world economy; this emphasizes the importance of securing all four aspects of the IoT model: sensors, networks, cloud, and applications. Considering the significant value of public-key cryptography threats on IoT system confidentiality, it is vita...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9656278/ https://www.ncbi.nlm.nih.gov/pubmed/36365848 http://dx.doi.org/10.3390/s22218151 |
_version_ | 1784829393816780800 |
---|---|
author | Shamshad, Shuhab Riaz, Farina Riaz, Rabia Rizvi, Sanam Shahla Abdulla, Shahab |
author_facet | Shamshad, Shuhab Riaz, Farina Riaz, Rabia Rizvi, Sanam Shahla Abdulla, Shahab |
author_sort | Shamshad, Shuhab |
collection | PubMed |
description | The Internet of Things (IoT) strongly influences the world economy; this emphasizes the importance of securing all four aspects of the IoT model: sensors, networks, cloud, and applications. Considering the significant value of public-key cryptography threats on IoT system confidentiality, it is vital to secure it. One of the potential candidates to assist in securing public key cryptography in IoT is quantum computing. Although the notion of IoT and quantum computing convergence is not new, it has been referenced in various works of literature and covered by many scholars. Quantum computing eliminates most of the challenges in IoT. This research provides a comprehensive introduction to the Internet of Things and quantum computing before moving on to public-key cryptography difficulties that may be encountered across the convergence of quantum computing and IoT. An enhanced architecture is then proposed for resolving these public-key cryptography challenges using SimuloQron to implement the BB84 protocol for quantum key distribution (QKD) and one-time pad (OTP). The proposed model prevents eavesdroppers from performing destructive operations in the communication channel and cyber side by preserving its state and protecting the public key using quantum cryptography and the BB84 protocol. A modified version is introduced for this IoT situation. A traditional cryptographic mechanism called “one-time pad” (OTP) is employed in hybrid management. |
format | Online Article Text |
id | pubmed-9656278 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-96562782022-11-15 An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy † Shamshad, Shuhab Riaz, Farina Riaz, Rabia Rizvi, Sanam Shahla Abdulla, Shahab Sensors (Basel) Article The Internet of Things (IoT) strongly influences the world economy; this emphasizes the importance of securing all four aspects of the IoT model: sensors, networks, cloud, and applications. Considering the significant value of public-key cryptography threats on IoT system confidentiality, it is vital to secure it. One of the potential candidates to assist in securing public key cryptography in IoT is quantum computing. Although the notion of IoT and quantum computing convergence is not new, it has been referenced in various works of literature and covered by many scholars. Quantum computing eliminates most of the challenges in IoT. This research provides a comprehensive introduction to the Internet of Things and quantum computing before moving on to public-key cryptography difficulties that may be encountered across the convergence of quantum computing and IoT. An enhanced architecture is then proposed for resolving these public-key cryptography challenges using SimuloQron to implement the BB84 protocol for quantum key distribution (QKD) and one-time pad (OTP). The proposed model prevents eavesdroppers from performing destructive operations in the communication channel and cyber side by preserving its state and protecting the public key using quantum cryptography and the BB84 protocol. A modified version is introduced for this IoT situation. A traditional cryptographic mechanism called “one-time pad” (OTP) is employed in hybrid management. MDPI 2022-10-25 /pmc/articles/PMC9656278/ /pubmed/36365848 http://dx.doi.org/10.3390/s22218151 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Shamshad, Shuhab Riaz, Farina Riaz, Rabia Rizvi, Sanam Shahla Abdulla, Shahab An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy † |
title | An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy † |
title_full | An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy † |
title_fullStr | An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy † |
title_full_unstemmed | An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy † |
title_short | An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy † |
title_sort | enhanced architecture to resolve public-key cryptographic issues in the internet of things (iot), employing quantum computing supremacy † |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9656278/ https://www.ncbi.nlm.nih.gov/pubmed/36365848 http://dx.doi.org/10.3390/s22218151 |
work_keys_str_mv | AT shamshadshuhab anenhancedarchitecturetoresolvepublickeycryptographicissuesintheinternetofthingsiotemployingquantumcomputingsupremacy AT riazfarina anenhancedarchitecturetoresolvepublickeycryptographicissuesintheinternetofthingsiotemployingquantumcomputingsupremacy AT riazrabia anenhancedarchitecturetoresolvepublickeycryptographicissuesintheinternetofthingsiotemployingquantumcomputingsupremacy AT rizvisanamshahla anenhancedarchitecturetoresolvepublickeycryptographicissuesintheinternetofthingsiotemployingquantumcomputingsupremacy AT abdullashahab anenhancedarchitecturetoresolvepublickeycryptographicissuesintheinternetofthingsiotemployingquantumcomputingsupremacy AT shamshadshuhab enhancedarchitecturetoresolvepublickeycryptographicissuesintheinternetofthingsiotemployingquantumcomputingsupremacy AT riazfarina enhancedarchitecturetoresolvepublickeycryptographicissuesintheinternetofthingsiotemployingquantumcomputingsupremacy AT riazrabia enhancedarchitecturetoresolvepublickeycryptographicissuesintheinternetofthingsiotemployingquantumcomputingsupremacy AT rizvisanamshahla enhancedarchitecturetoresolvepublickeycryptographicissuesintheinternetofthingsiotemployingquantumcomputingsupremacy AT abdullashahab enhancedarchitecturetoresolvepublickeycryptographicissuesintheinternetofthingsiotemployingquantumcomputingsupremacy |