Improving Wireless Sensor Network Security Using Quantum Key Distribution

被引:2
|
作者
Alhasnawy, Laith H. [1 ]
AL-Mashanji, Ameer K. [1 ]
机构
[1] Univ Babylon, Presidency Univ Babylon, Babylon, Iraq
关键词
AES; BB84; protocol; QBER; QKD; WSN;
D O I
10.21123/bsj.2023.7460
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of life, which makes it is a promising technology in the future. In the coming days, as attack technologies become more improved, security will have an important role in WSN. Currently, quantum computers pose a significant risk to current encryption technologies that work in tandem with intrusion detection systems because it is difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor networks. Great emphasis is placed on the concepts of using the BB84 protocol with the AES algorithm in WSN security. The results of analysis indicated a high level of security between the data by depending on the generation of secure keys, and reached an accuracy rate of about (80-95) % based on using NIST statistical. The efficiency of the work increased to 0.704 after using the Quantum Bit Error Rate equation, eventually increasing the network performance. This results in the reduction of the overall amount of energy, and the time required for performing the key exchange in the encryption and decryption processes decreased.
引用
收藏
页码:2077 / 2085
页数:9
相关论文
共 50 条
  • [41] Improving the Network Lifetime of a Wireless Sensor Network using Clustering Techniques
    Basu, Shreya V.
    Ashwin, K. P.
    Neti, Nupur K.
    Premananda, B. S.
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 1872 - 1877
  • [42] Improving the performance of Key Pre-distribution Scheme in Sensor Network using Clustering of Combinatorics
    Saikia, Monjul
    Hussain, Md. A.
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 682 - 686
  • [43] Quantum key distribution with unconditional security for all optical fiber network
    Hirota, O
    Kato, K
    Shoma, M
    Usuda, TS
    QUANTUM COMMUNICATIONS AND QUANTUM IMAGING, 2004, 5161 : 320 - 331
  • [44] Security Vulnerability and Robust Security Requirements using Key Management in Sensor Network
    Patel, Jaykumar Shantilal
    Chavda, Vijaykumar M.
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 23 - 28
  • [45] An implementation of wireless sensor network for security system using Bluetooth
    Choi, SH
    Kim, BK
    Park, J
    Kang, CH
    Eom, DS
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (01) : 236 - 244
  • [46] Improving the security of quantum key distribution with multi-step advantage distillation
    Hao, Chen-Peng
    Liu, Yang
    Wang, Yang
    Zhou, Chun
    Zhou, Yan-Yang
    Bao, Wan-Su
    Li, Hong-Wei
    QUANTUM INFORMATION PROCESSING, 2024, 23 (04)
  • [47] Improving Adhoc wireless sensor networks security using distributed automaton
    Venkatraman, S.
    Kumar, P. Arun Raj
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 6): : 14551 - 14557
  • [48] Improving Adhoc wireless sensor networks security using distributed automaton
    S. Venkatraman
    P. Arun Raj Kumar
    Cluster Computing, 2019, 22 : 14551 - 14557
  • [49] Attack Wireless Sensor Network using Compromised Key Redistribution
    Yein, Alan Dahgwo
    Chen, Cheng-Yeh
    Hsu, Te-Cheng
    Hsieh, Wen-Shyong
    Lin, Jiun-An
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 920 - +
  • [50] Secret Key Generation in Wireless Sensor Network Using Public
    Bashaa, Manar Hamza
    Al-Alak, Saif Mahmood
    Idrees, Ali Kadhum
    INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICICT 2019), 2019, : 106 - 112