Loading

Securing IOT Network through Quantum Key Distribution
S.Krithika1, T.Kesavmurthy2

1S. Krithika, Assistant Professor, Kumaraguru College of Technology, Coimbatore (TamilNadu), India.

2Dr. T. Kesavmurthy, Professor, PSG College of Technology, Coimbatore (TamilNadu), India.

Manuscript received on 10 April 2019 | Revised Manuscript received on 17 April 2019 | Manuscript Published on 26 July 2019 | PP: 693-696 | Volume-8 Issue-6S4 April 2019 | Retrieval Number: F11410486S419/19©BEIESP | DOI: 10.35940/ijitee.F1141.0486S419

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Current cryptographic techniques broadly specified as conventional cryptography is solely based on the solidity of the mathematical concepts. The advancements in quantum computing can use reversible logic to compute the keys and easily break the existing security in conventional computers. From the analysis of the network structure of Internet of Things (IOT) it is very clear that the entire backbone of the system would collapse if it is attacked or hacked. IOT is a wireless technology that connects “ANYTHING” around to the Internet. IOT is a revolution which should be protected from the attackers as it would lead to several losses which could even be fatal. Hence a strong provision for securing users data in IOT is a real challenge. This paper is attempted to review the fundamentals of Quantum Key Distribution, security aspects for IOT and to address how QKD can be used to secure a IOT system. The challenge encountered is to increase the range and increase the transmission rate of data in QKD systems and to check for a possible solution to adhere these systems with existing information security solutions.

Keywords: Eaves Dropping, Internet of Things, Protocols, Quantum Cryptography, Quantum Key Distribution.
Scope of the Article: Energy Harvesting and Wireless Power Transmission