Securing IoT devices: A novel approach using blockchain and quantum cryptography

被引:31
作者
Dhar, Shalini [1 ]
Khare, Ashish [1 ]
Dwivedi, Ashutosh Dhar [2 ]
Singh, Rajani [3 ]
机构
[1] Univ Allahabad, Dept Elect & Commun, Prayagraj, India
[2] Aalborg Univ, Dept Elect Syst, Cyber Secur Grp, Copenhagen, Denmark
[3] Copenhagen Business Sch, Dept Digitalizat, Frederiksberg, Denmark
关键词
Quantum Key Distribution; Internet of Things; Blockchain; Multimedia; Privacy;
D O I
10.1016/j.iot.2023.101019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper delves into the crucial challenge of safeguarding data sensitivity and preventing security breaches, which can result in substantial losses, including significant financial costs and potential loss of lives. Notably, the United States faces the highest financial burden, with data breaches costing approximately USD 5.09 million. With the proliferation of Internet of Things (IoT) devices, enormous volumes of data are collected from diverse sources. However, the inherent limitations in computational power and memory of IoT devices render them susceptible targets for malicious attacks. This study focuses on fortifying the security of multimedia data, encompassing audio, video, and images, obtained from IoT devices. Cutting-edge technologies such as blockchain and quantum cryptography are explored as promising avenues to bolster multimedia security and preserve privacy. Quantum Key Distribution (QKD) emerges as an alternative to classical encryption and key distribution methods, offering heightened data security. Simultaneously, blockchain leverages hash functions to augment the overall security posture. By harnessing the principles of quantum mechanics, QKD facilitates secure key exchange between involved parties for data encryption and decryption. Additionally, the paper introduces innovative methodologies to enhance the security, privacy, and anonymity of IoT devices.
引用
收藏
页数:16
相关论文
共 20 条
[1]   Advanced security model for multimedia data sharing in Internet of Things [J].
Dhar, Shalini ;
Khare, Ashish ;
Singh, Rajani .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (11)
[2]   Ascon v1.2: Lightweight Authenticated Encryption and Hashing [J].
Dobraunig, Christoph ;
Eichlseder, Maria ;
Mendel, Florian ;
Schlaffer, Martin .
JOURNAL OF CRYPTOLOGY, 2021, 34 (03)
[3]  
Dwivedi A.D., 2017, P 14 INT JOINT C E B, P237, DOI 10.5220/0006387302370246.IACRhttps://ia.cr/2016
[4]   Privacy preserving authentication system based on non-interactive zero knowledge proof suitable for Internet of Things [J].
Dwivedi, Ashutosh Dhar ;
Singh, Rajani ;
Ghosh, Uttam ;
Mukkamala, Raghava Rao ;
Tolba, Amr ;
Said, Omar .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (10) :4639-4649
[5]   Tracing the Source of Fake News using a Scalable Blockchain Distributed Network [J].
Dwivedi, Ashutosh Dhar ;
Singh, Rajani ;
Dhall, Sakshi ;
Srivastava, Gautam ;
Pal, Saibal K. .
2020 IEEE 17TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2020), 2020, :38-43
[6]  
Dwivedi AD, 2019, 2019 42ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), P135, DOI [10.1109/TSP.2019.8769060, 10.1109/tsp.2019.8769060]
[7]   Quantum Key Distribution Approach for Secure Authentication of Cloud Servers [J].
Fatima, Shahin ;
Ahmad, Shish .
INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2021, 11 (03) :19-32
[8]   Privacy, security and resilience in mobile healthcare applications [J].
Lin, Wenjun ;
Xu, Ming ;
He, Jingyi ;
Zhang, Wenjun .
ENTERPRISE INFORMATION SYSTEMS, 2023, 17 (03)
[9]   Protection of surveillance recordings via blockchain-assisted multimedia security [J].
Ma, Zhaowei ;
Zhu, Li ;
Yu, F. Richard ;
James, Jeremy .
INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2021, 37 (02) :69-80
[10]  
Malina L., 2018, ICETE 2, P692