Influence of Quantum Computing on IoT Using Modern Algorithms

Z. Ageed, Subhi R. M. Zeebaree, R. Saeed
{"title":"Influence of Quantum Computing on IoT Using Modern Algorithms","authors":"Z. Ageed, Subhi R. M. Zeebaree, R. Saeed","doi":"10.1109/ICOASE56293.2022.10075583","DOIUrl":null,"url":null,"abstract":"Even while the Internet of Things (IoT) already affects our day-to-day activities, its future relevance and potential for transformation remain untapped. Security issues with present communications technology must be solved before secure end-to-end connection between services can be achieved. Internet of Things (IoT) is here to stay. In the next years, it will become an integral part of our everyday life. There is a good chance that sensor-based networks can recognize it as a direct service provider in our surroundings. Even if it's just in the form of a value-added service delivered through cellular networks, it's going to be helpful nevertheless. It is, nevertheless, subject to a wide range of security threats. The current level of security is insufficient for IoT applications in the future. A secure cryptosystem is needed for the Internet of Things. quantum-based security has seen a surge of attention recently. Additional quantum key distribution systems and network services are now supported by this solution. As a result of the quantum computing's unrivaled security level, it has become more popular in recent years. Because every measurement must affect the state of the quantum bit being sent, quantum physics dictates that this must be the case. Regardless of whether the sender or recipient is aware of the change, it is clear. It is thus no longer possible to listen passively. Polarized photons may encode a string of bits using protocols like BB84. Secure cryptographic keys may be generated over an unsafe channel utilizing various key distillation procedures.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOASE56293.2022.10075583","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Even while the Internet of Things (IoT) already affects our day-to-day activities, its future relevance and potential for transformation remain untapped. Security issues with present communications technology must be solved before secure end-to-end connection between services can be achieved. Internet of Things (IoT) is here to stay. In the next years, it will become an integral part of our everyday life. There is a good chance that sensor-based networks can recognize it as a direct service provider in our surroundings. Even if it's just in the form of a value-added service delivered through cellular networks, it's going to be helpful nevertheless. It is, nevertheless, subject to a wide range of security threats. The current level of security is insufficient for IoT applications in the future. A secure cryptosystem is needed for the Internet of Things. quantum-based security has seen a surge of attention recently. Additional quantum key distribution systems and network services are now supported by this solution. As a result of the quantum computing's unrivaled security level, it has become more popular in recent years. Because every measurement must affect the state of the quantum bit being sent, quantum physics dictates that this must be the case. Regardless of whether the sender or recipient is aware of the change, it is clear. It is thus no longer possible to listen passively. Polarized photons may encode a string of bits using protocols like BB84. Secure cryptographic keys may be generated over an unsafe channel utilizing various key distillation procedures.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用现代算法的量子计算对物联网的影响
尽管物联网(IoT)已经影响了我们的日常活动,但其未来的相关性和转型潜力仍未得到开发。在实现服务之间的端到端安全连接之前,必须解决现有通信技术的安全问题。物联网(IoT)将继续存在。在接下来的几年里,它将成为我们日常生活中不可或缺的一部分。基于传感器的网络很有可能将其识别为我们周围环境中的直接服务提供商。即使它只是通过蜂窝网络提供增值服务的形式,它也会有所帮助。然而,它受到广泛的安全威胁。目前的安全水平不足以满足未来物联网应用的需求。物联网需要安全的密码系统。最近,以量子为基础的安全受到了极大的关注。该解决方案现在支持额外的量子密钥分发系统和网络服务。由于量子计算具有无与伦比的安全级别,近年来越来越受欢迎。因为每一次测量都必须影响被发送的量子比特的状态,量子物理学规定这必须是事实。不管发送方或接收方是否意识到这个变化,都是清楚的。因此,被动地倾听是不可能的。偏振光子可以使用BB84这样的协议对一串比特进行编码。可以利用各种密钥蒸馏过程在不安全通道上生成安全加密密钥。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Circular Dipole Nanoantenna with Improved Performance The Use of Toulmin's Argumentation Model in Solving The Drug Conflict Problems Comparison and Assessment of PV Module Power Prediction Based on ANN for Iraq Weather Generating Masked Facial Datasets Using Dlib-Machine Learning Library Combination of Stream and Block Image Encryption Algorithms in Pixel Scrambling Using Henon Map
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1