Open Access Open Access  Restricted Access Subscription Access

Internet of Things Security Analysis of Networks using Quantum Key Distribution


Affiliations
1 University of Engineering and Management, Kolkata - 700084, West Bengal, India
 

Objectives: To identify the drawback of the Internet of Things Networks and find a suitable solution of the case by Quantum Key Distribution. Methods/Statistical Analysis: Analyzing the Network system of the IoT we see that if the system goes in wrong hands it could mislead the entire backbone of the structure. While using Quantum Key Distribution we can easily identify the Eve in the system. So by analyzing the algorithm we can generate series of patterns which can serve us to protect the system network effectively. Findings: The paper defines the various problems in the IoT network and gives the solutions which have been proposed using Quantum Key Distribution, as IoT is the revolution which if gone to the wrong hands, will cause severe loss in lives and as well as in the economy. Application/Improvements: The algorithm proposed can be implemented in any existing IoT structure to evaluate and put forward any misconduct in the system

Keywords

Data Mining, Internet of Things, Quantum Cryptography, Quantum Key Distribution, Qubits.
User

Abstract Views: 152

PDF Views: 0




  • Internet of Things Security Analysis of Networks using Quantum Key Distribution

Abstract Views: 152  |  PDF Views: 0

Authors

Sayantan Gupta
University of Engineering and Management, Kolkata - 700084, West Bengal, India
Chayan Dutta
University of Engineering and Management, Kolkata - 700084, West Bengal, India

Abstract


Objectives: To identify the drawback of the Internet of Things Networks and find a suitable solution of the case by Quantum Key Distribution. Methods/Statistical Analysis: Analyzing the Network system of the IoT we see that if the system goes in wrong hands it could mislead the entire backbone of the structure. While using Quantum Key Distribution we can easily identify the Eve in the system. So by analyzing the algorithm we can generate series of patterns which can serve us to protect the system network effectively. Findings: The paper defines the various problems in the IoT network and gives the solutions which have been proposed using Quantum Key Distribution, as IoT is the revolution which if gone to the wrong hands, will cause severe loss in lives and as well as in the economy. Application/Improvements: The algorithm proposed can be implemented in any existing IoT structure to evaluate and put forward any misconduct in the system

Keywords


Data Mining, Internet of Things, Quantum Cryptography, Quantum Key Distribution, Qubits.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i48%2F138802