Back to Search Start Over

Enhancing security in IIoT applications through efficient quantum key exchange and advanced encryption standard.

Authors :
Krishna, Hosakota Vamshi
Sekhar, Krovi Raja
Source :
Soft Computing - A Fusion of Foundations, Methodologies & Applications. Feb2024, Vol. 28 Issue 3, p2671-2681. 11p.
Publication Year :
2024

Abstract

The industrial internet of things (IIoT) refers to a system of interconnected equipment, sensors, and devices deployed within industrial environments whose primary function is to collect and facilitate the exchange of data. IIoT has gained significant traction in several domains, encompassing remote monitoring, equipment management, and condition tracking. The utilization of IIoT in different environments gives rise to apprehensions regarding the security of data. As a result of this, it is imperative to ensure that rigorous safety measures are in place to safeguard the confidentiality of the sensitive information being transmitted. The utilization of elliptic curve cryptography (ECC) and quantum key exchange (QKE) in IIoT networks holds promise for achieving robust and predictable security measures. ECC is a widely adopted type of public-key cryptography due to its efficiency and security. It has gained significant popularity in contemporary systems. QKE is an innovative methodology that originates from the fundamental principles of quantum physics. The system has the ability to generate a secret key that is impervious to hacking attempts, as it leverages natural principles instead of conventional mathematical procedures. Due to this characteristic, quantum key distribution (QKD) is widely recognized as one of the most reliable methods for key exchange. The combination has led to the creation of a novel cryptographic model that integrates elliptic curve cryptography (ECC) and quantum key exchange (QKE) techniques for the generation and distribution of cryptographic keys. The model leads to an increase in the base probability of the Bennett–Brassard protocol (BB84) from 0.5 to 1. Subsequently, the keys that are produced are employed for the encryption of data through a streamlined and adapted variant of the Advanced Encryption Standard (AES), thereby expediting the secure exchange of data while upholding its level of safeguarding. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
14327643
Volume :
28
Issue :
3
Database :
Academic Search Index
Journal :
Soft Computing - A Fusion of Foundations, Methodologies & Applications
Publication Type :
Academic Journal
Accession number :
175199619
Full Text :
https://doi.org/10.1007/s00500-023-09585-9