On The Use of Quantum Communications for Securing IoT Devices in the 6G Era

被引:30
作者
Al-Mohammed, Hasan Abbas [1 ]
Yaacoub, Elias [1 ]
机构
[1] Qatar Univ, Coll Engn, Dept Comp Sci & Engn, POB 2713, Doha, Qatar
来源
2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS) | 2021年
关键词
IoT; IoT security; Quantum security; BB84; protocol; QKD; photon; polarization filter; KEY DISTRIBUTION; INTERNET; THINGS;
D O I
10.1109/ICCWorkshops50388.2021.9473793
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) connects billions of machines that can interact with each other. IoT is one of the fastest-growing areas in the history of computing, and will continue in this direction in the 6G era. New security problems have been raised, however, since implementing protection mechanisms for IoT devices, such as encryption, authentication, and so on, is inefficient, due to their inherent flaws. Therefore, a new method of protecting IoT devices needs to be sought. Quantum security depends on the natural physical phenomenon (quantum mechanics) and offers an appropriate and powerful security technique. This paper suggests a new approach for simulating the quantum key distribution between IoT devices and a server to encrypt the data sent to the server. It also demonstrates the simplicity of this new method, and its efficiency in producing a quantum key distribution (QKD) simulation. In addition, it describes the use of the final length key for symmetrical security for IoT devices. Moreover, the simulation of the attacker between the server and IoT devices is performed.
引用
收藏
页数:6
相关论文
共 22 条
[1]   Providing End-to-End Security Using Quantum Walks in IoT Networks [J].
Abd El-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Venegas-Andraca, Salvador E. ;
Elwahsh, Haitham ;
Piran, Md Jalil ;
Bashir, Ali Kashif ;
Song, Oh-Young ;
Mazurczyk, Wojciech .
IEEE ACCESS, 2020, 8 :92687-92696
[2]  
Abomhara M., 2015, Journal of Cyber Security and Mobility, P65
[3]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[4]  
Al-Mohammed H., 2021, 6 INT C INFORM COMMU
[5]  
Archana B, 2015, 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), P457, DOI 10.1109/ECS.2015.7124946
[6]  
Atashpendar A, QKD SIMULATOR
[7]   Fog Computing: Helping the Internet of Things Realize Its Potential [J].
Dastjerdi, Amir Vahid ;
Buyya, Rajkumar .
COMPUTER, 2016, 49 (08) :112-116
[8]   TOWARD MASSIVE MACHINE TYPE CELLULAR COMM UNICATIONS [J].
Dawy, Zaher ;
Saad, Walid ;
Ghosh, Arunabha ;
Andrews, Jeffrey G. ;
Yaacoub, Elias .
IEEE WIRELESS COMMUNICATIONS, 2017, 24 (01) :120-128
[9]   From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things [J].
Fernandez-Carames, Tiago M. .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (07) :6457-6480
[10]   IoTShare: A Blockchain-Enabled IoT Resource Sharing On-Demand Protocol for Smart City Situation-Awareness Applications [J].
Hamdaoui, Bechir ;
Alkalbani, Mohamed ;
Rayes, Ammar ;
Zorba, Nizar .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10) :10548-10561