2022
DOI: 10.3390/s22186741
|View full text |Cite
|
Sign up to set email alerts
|

A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks

Abstract: The industry-based internet of things (IIoT) describes how IIoT devices enhance and extend their capabilities for production amenities, security, and efficacy. IIoT establishes an enterprise-to-enterprise setup that means industries have several factories and manufacturing units that are dependent on other sectors for their services and products. In this context, individual industries need to share their information with other external sectors in a shared environment which may not be secure. The capability to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 37 publications
(7 citation statements)
references
References 46 publications
0
7
0
Order By: Relevance
“…The performance of A4 was compared with Teng et al (2020) (abbreviated as A5), ( Yao et al, 2020 ) (abbreviated as A6), and ( Meng et al, 2022 ) (abbreviated as A7) according to the conditions of a network configuration and the performance parameter evaluation method of Experiment 1. More references can be found in Ahmad et al (2022) , Alrashed et al (2022) , and Singamaneni et al (2022) .…”
Section: Resultsmentioning
confidence: 99%
“…The performance of A4 was compared with Teng et al (2020) (abbreviated as A5), ( Yao et al, 2020 ) (abbreviated as A6), and ( Meng et al, 2022 ) (abbreviated as A7) according to the conditions of a network configuration and the performance parameter evaluation method of Experiment 1. More references can be found in Ahmad et al (2022) , Alrashed et al (2022) , and Singamaneni et al (2022) .…”
Section: Resultsmentioning
confidence: 99%
“…In [26], a new Quantum Hash-focused Cypher Policy-Attribute-based Encryption (QH-CPABE) architecture was designed to protect cloud users' sensitive data, including structured and unstructured huge cloud clinical data. Simulations and experiments show that this proposal improves bit hash change accuracy and chaotic dynamic key production, encryption, and decryption times compared to conventional methods from previous studies, with slightly higher computational overhead [27]. A new cloud data security solution using quantum chaotic hash-based attribute-based encryption is proposed in [28].…”
Section: Related Workmentioning
confidence: 93%
“…To optimize the relationship between each link in the model promotion model, this paper uses the SA-ACPSO method to optimize accordingly. The SA-ACPSO algorithm mentioned in this paper combines the simulated annealing operator and the mixed pure perturbation based on PSO and makes particles increase their randomness ergodicity through chaotic mapping, which can improve the ability of the algorithm itself to avoid local convergence, which is, improve the global convergence performance (Singamaneni et al, 2022). In order to better conform to and adapt to the characteristics of the multi-objective and multi-constraint of the economy scheduling problem, the inertia weight of particles will be adjusted before scheduling, which can enable the algorithm to expand the search scope at the initial stage.…”
Section: Model Performance Analysismentioning
confidence: 99%