Internet of Things (Iot) Network Security using Quantum Key Distribution Algorithm

Internet of Things (Iot) Network Security using Quantum Key Distribution Algorithm

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2022 by IJETT Journal
Volume-70 Issue-2
Year of Publication : 2022
Authors : A. Srikrishnan, Dr. Arun Raaza, Dr. B. Ebenezer Abishek
DOI :  10.14445/22315381/IJETT-V70I2P203

How to Cite?

A. Srikrishnan, Dr. Arun Raaza, Dr. B. Ebenezer Abishek, "Internet of Things (Iot) Network Security using Quantum Key Distribution Algorithm," International Journal of Engineering Trends and Technology, vol. 70, no. 3, pp. 22-28, 2022. Crossref,

Modern networks and future technologies rely on IOT technology. High bandwidth, extensive coverage, and enhanced capacity are key qualities of IOT networks. The IOT mobile network has two parts: Radio Access Network and Core Network. Toll-free radio access will cover macrocells and towers. The IOT network`s macrocells use MIMO (Multiple Input Multiple Output) data transmission. IOT network is a wireless communication to build smart cities. The continuous switching of mega cells necessitates system security. The IoT network has its own communication security. Communication between two users will need frequent cell hopping. To improve network security, AES DES are utilised. QKD Algorithm is utilised to encrypt and decrypt in the proposed technique. Quantum computation uses superposition and entanglement to solve problems. This secures quantum computers. The QKD algorithm encrypts and decrypts data in Rectilinear and Diagonal bases utilising randomness. The qubits are transmitted. Encryption is done by turning qubits into photons. The QKD employs symmetric key encryption for authentication and confidentiality. Quantum key exchange delivers secure symmetric secret keys using a public key protocol for all network users. The performance indicators are compared to existing algorithms.

IOT network security, Quantum computation, Quantum Key Distribution (QKD), BB84 Algorithm, Encryption and Decryption.

[1] Ma, Z., Zhang, Z., Ding, Z., Fan, P. and Li, H., Key techniques for 5G wireless communications: network architecture, physical layer, and MAC layer perspectives. Science China information sciences, 58(4) (2015) 1-20.
[2] Wazid, M., Das, A.K., Shetty, S., Gope, P. and Rodrigues, J.J., Security in 5G- enabled internet of things communication: issues, challenges, and future research roadmap. IEEE Access, 9 (2020) 4466-4489.
[3] Fan, C.I., Shih, Y.T., Huang, J.J. and Chiu, W.R., Cross-network-slice authentication scheme for the 5 th generation mobile communication system. IEEE Transactions on Network and Service Management, 18(1) (2021) 701-712.
[4] Zhao, D., Yan, Z., Wang, M., Zhang, P. and Song, B., Is 5G Handover Secure and Private? A Survey. IEEE Internet of Things Journal. (2021).
[5] Cohen, A., D’Oliveira, R.G., Salamatian, S. and Médard, M., Network Coding- Based Post-Quantum Cryptography. IEEE Journal on Selected Areas in Information Theory, 2(1) (2021) 49-64.
[6] Althobaiti, O.S. and Dohler, M., Cybersecurity Challenges Associated with the Internet of Things in a Post-Quantum World. IEEE Access, 8, (2020) 157356-157381.
[7] Babar, Z., Chandra, D., Nguyen, H.V., Botsinis, P., Alanis, D., Ng, S.X. and Hanzo, L., Duality of quantum and classical error correction codes: Design principles and examples. IEEE Communications Surveys & Tutorials, 21(1) (2018) 970-1010.
[8] Abd El-Latif, A.A., Abd-El-Atty, B., Venegas-Andraca, S.E., Elwahsh, H., Piran, M.J., Bashir, A.K., Song, O.Y. and Mazurczyk, W., Providing end-to-end Security using quantum walks in 5G networks. IEEE Access, 8 (2020) .92687-92696.
[9] Roffe, J., Zohren, S., Horsman, D. and Chancellor, N., Quantum codes from classical graphical models. IEEE Transactions on Information Theory, 66(1) (2019) 130- 146.
[10] Chandra, D., Babar, Z., Nguyen, H.V., Alanis, D., Botsinis, P., Ng, S.X. and Hanzo, L., Quantum topological error correction codes: The classical-to-quantum isomorphism perspective. IEEE Access, 6 (2017) 13729-13757.
[11] Jain, A., Singh, T., Sharma, S.K. and Prajapati, V., Implementing Security in 5G Ecosystem Using 5G Network Slicing and Pattern Matched Intrusion Detection System: A Simulation Study. Interdisciplinary Journal of Information, Knowledge & Management, 16 (2021).
[12] Arul, R., Raja, G., Almagrabi, A.O., Alkatheiri, M.S., Chauhdary, S.H. and Bashir, A.K., A quantum-safe key hierarchy and dynamic security association for LTE/SAE in 5G scenario. IEEE Transactions on Industrial Informatics, 16(1) (2019) 681-690.
[13] Yan, P. and Yu, N., The QQUIC Transport Protocol: Quantum assisted UDP Internet Connections. arXiv preprint arXiv:2006.00653. (2019)
[14] Liyanage, M., Salo, J., Braeken, A., Kumar, T., Seneviratne, S. and Ylianttila, M., July. 5G privacy: Scenarios and solutions. In IEEE 5G World Forum (5GWF) (2018) 197-203.