The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objectives: To identify the drawback of the Internet of Things Networks and find a suitable solution of the case by Quantum Key Distribution. Methods/Statistical Analysis: Analyzing the Network system of the IoT we see that if the system goes in wrong hands it could mislead the entire backbone of the structure. While using Quantum Key Distribution we can easily identify the Eve in the system. So by analyzing the algorithm we can generate series of patterns which can serve us to protect the system network effectively. Findings: The paper defines the various problems in the IoT network and gives the solutions which have been proposed using Quantum Key Distribution, as IoT is the revolution which if gone to the wrong hands, will cause severe loss in lives and as well as in the economy. Application/Improvements: The algorithm proposed can be implemented in any existing IoT structure to evaluate and put forward any misconduct in the system

Keywords

Data Mining, Internet of Things, Quantum Cryptography, Quantum Key Distribution, Qubits.
User