Improving Wireless Sensor Network Security Using Quantum Key Distribution

被引:2
|
作者
Alhasnawy, Laith H. [1 ]
AL-Mashanji, Ameer K. [1 ]
机构
[1] Univ Babylon, Presidency Univ Babylon, Babylon, Iraq
关键词
AES; BB84; protocol; QBER; QKD; WSN;
D O I
10.21123/bsj.2023.7460
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of life, which makes it is a promising technology in the future. In the coming days, as attack technologies become more improved, security will have an important role in WSN. Currently, quantum computers pose a significant risk to current encryption technologies that work in tandem with intrusion detection systems because it is difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor networks. Great emphasis is placed on the concepts of using the BB84 protocol with the AES algorithm in WSN security. The results of analysis indicated a high level of security between the data by depending on the generation of secure keys, and reached an accuracy rate of about (80-95) % based on using NIST statistical. The efficiency of the work increased to 0.704 after using the Quantum Bit Error Rate equation, eventually increasing the network performance. This results in the reduction of the overall amount of energy, and the time required for performing the key exchange in the encryption and decryption processes decreased.
引用
收藏
页码:2077 / 2085
页数:9
相关论文
共 50 条
  • [1] Improving key distribution for wireless sensor networks
    Mehallegue, Noureddine
    Garcia, Emi
    Bouridane, Ahmed
    Qu, Gang
    NASA/ESA CONFERENCE ON ADAPTIVE HARDWARE AND SYSTEMS, PROCEEDINGS, 2007, : 82 - +
  • [2] Improving Security In Wireless Sensor Network Using Trust And Metaheuristic Algorithms
    Anbuchelian, S.
    Lokesh, S.
    Baskaran, Madhusudhanan
    2016 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCOINS), 2016, : 233 - 241
  • [3] Wireless Sensor Network with a Novel Key Distribution for Improved Four-Tier Network Security
    Poonguzhali, S.
    RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2015, 6 (04): : 319 - 327
  • [4] A New Scheme of Key Distribution using Implicit Security in Wireless Sensor Networks
    Chiang, Chien-Wen
    Lin, Chih-Chung
    Chang, Ray-I
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 151 - 155
  • [5] Analyzing the key distribution from security attacks in wireless sensor
    Techateerawat, Piya
    Jennings, Andrew
    INNOVATIVE ALGORITHMS AND TECHNIQUES IN AUTOMATION, INDUSTRIAL ELECTRONICS AND TELECOMMUNICATIONS, 2007, : 353 - 357
  • [6] Security key distribution method of wireless sensor network based on DV-hop algorithm
    Fei, Gao
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2023, 16 (01) : 66 - 83
  • [7] Security Improvement on An Efficient Key Distribution Mechanism for Large-scale Wireless Sensor Network
    Xue, Kaiping
    Hong, Peilin
    Lu, Hancheng
    Zhu, Bin
    Li, Le
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 140 - 143
  • [8] A novel key distribution algorithm in wireless sensor network
    He Dinghua
    2014 SIXTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2014, : 42 - 45
  • [9] A Key Distribution from Pairing for Wireless Sensor Network
    Zhu Bin
    Liao Jun'guo
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4095 - +
  • [10] SECURITY IN QUANTUM COMPUTING USING QUANTUM KEY DISTRIBUTION PROTOCOLS
    Kartheek, D. N.
    Amarnath, G.
    Reddy, P. Venkateswarlu
    2013 IEEE INTERNATIONAL MULTI CONFERENCE ON AUTOMATION, COMPUTING, COMMUNICATION, CONTROL AND COMPRESSED SENSING (IMAC4S), 2013, : 19 - 24