Application of Quantum Key Distribution to Enhance Data Security in Agrotechnical Monitoring Systems Using UAVs

被引:0
|
作者
Bakyt, Makhabbat [1 ]
La Spada, Luigi [2 ]
Zeeshan, Nida [2 ]
Moldamurat, Khuralay [3 ]
Atanov, Sabyrzhan [4 ]
机构
[1] LN Gumilyov Eurasian Natl Univ, Fac Informat Technol, Dept Informat Secur, Astana 010000, Kazakhstan
[2] Edinburgh Napier Univ, Sch Comp Engn & Built Environm, 10 Colinton Rd, Edinburgh EH10 5DT, Scotland
[3] LN Gumilyov Eurasian Natl Univ, Fac Informat Technol, Dept Comp Sci, Astana 010000, Kazakhstan
[4] LN Gumilyov Eurasian Natl Univ, Fac Phys & Engn, Dept Space Tech & Technol, Astana 010000, Kazakhstan
来源
APPLIED SCIENCES-BASEL | 2025年 / 15卷 / 05期
关键词
quantum key distribution; UAV; data security; geographic information systems; agrotechnical monitoring; AI methods; RESOURCE-ALLOCATION; DESIGN;
D O I
10.3390/app15052429
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Ensuring secure data transmission in agrotechnical monitoring systems using unmanned aerial vehicles (UAVs) is critical due to increasing cyber threats, particularly with the advent of quantum computing. This study proposes the integration of Quantum Key Distribution (QKD), based on the BB84 protocol, as a secure key management mechanism to enhance data security in UAV-based geographic information systems (GIS) for monitoring agricultural fields and forest fires. QKD is not an encryption algorithm but a secure key distribution protocol that provides information-theoretic security by leveraging the principles of quantum mechanics. Rather than replacing traditional encryption methods, QKD complements them by ensuring the secure generation and distribution of encryption keys, while AES-128 is employed for efficient data encryption. The QKD framework is optimized for real-time operations through adaptive key generation and energy-efficient hardware, alongside Lempel-Ziv-Welch (LZW) compression to improve the bandwidth efficiency. The simulation results demonstrate that the proposed system achieves secure key generation rates up to 50 Mbps with minimal computational overhead, maintaining reliability even under adverse environmental conditions. This hybrid approach significantly improves data resilience against both quantum and classical cyber-attacks, offering a comprehensive and robust solution for secure agrotechnical data transmission.
引用
收藏
页数:32
相关论文
共 50 条
  • [31] Security of quantum key distribution using d-level systems -: art. no. 127902
    Cerf, NJ
    Bourennane, M
    Karlsson, A
    Gisin, N
    PHYSICAL REVIEW LETTERS, 2002, 88 (12) : 4 - 127902
  • [32] Security and application of semi-quantum key distribution protocol for users with different quantum capabilities
    Ye, Chong-Qiang
    Li, Jian
    Chen, Xiu-Bo
    Hou, Yanyan
    Wang, Zhuo
    EPJ QUANTUM TECHNOLOGY, 2023, 10 (01)
  • [33] Security and application of semi-quantum key distribution protocol for users with different quantum capabilities
    Chong-Qiang Ye
    Jian Li
    Xiu-Bo Chen
    Yanyan Hou
    Zhuo Wang
    EPJ Quantum Technology, 2023, 10
  • [34] Improving Wireless Sensor Network Security Using Quantum Key Distribution
    Alhasnawy, Laith H.
    AL-Mashanji, Ameer K.
    BAGHDAD SCIENCE JOURNAL, 2023, 20 (05) : 2077 - 2085
  • [35] Novel quantum key distribution and attribute based encryption for cloud data security
    Verma, Garima
    Kumar, Ashutosh
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (21):
  • [36] Quantum key distribution with coherent laser pulse train : security without monitoring disturbance
    Koashi, Masato
    2015 PHOTONICS NORTH, 2015,
  • [37] Security of quantum key distribution with iterative sifting
    Tamaki, Kiyoshi
    Lo, Hoi-Kwong
    Mizutani, Akihiro
    Kato, Go
    Lim, Charles Ci Wen
    Azuma, Koji
    Curty, Marcos
    QUANTUM SCIENCE AND TECHNOLOGY, 2018, 3 (01):
  • [38] The security and recent technology of quantum key distribution
    Wang X.-B.
    Ying H.
    Ma H.-X.
    Peng C.-Z.
    Yang T.
    Pan J.-W.
    Frontiers of Physics in China, 2006, 1 (3): : 251 - 255
  • [39] Security analysis of quantum key distribution protocol
    Omine T.
    Yamada C.
    Miyagi K.
    Ichikawa S.
    IEEJ Transactions on Industry Applications, 2016, 136 (10) : 698 - 702
  • [40] Security of quantum key distribution with imperfect devices
    Gottesman, D
    Lo, HK
    Lütkenhaus, N
    Preskill, J
    2004 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2004, : 136 - 136