2020
DOI: 10.1109/access.2020.2992820
|View full text |Cite
|
Sign up to set email alerts
|

Providing End-to-End Security Using Quantum Walks in IoT Networks

Abstract: Internet of Things acts an essential role in our everyday lives and it definitely has the potential to grow on the importance and revolutionize our future. However, the present communication technologies have several security related issues which is required to provide secure end to end connectivity among services. Moreover, due to recent, rapid growth of quantum technologies, most common security mechanisms considered secure today may be soon imperilled. Thus, the modern security mechanisms during their const… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 76 publications
(30 citation statements)
references
References 50 publications
0
25
0
1
Order By: Relevance
“…VANETs have many applications in the literature such that real-time safety applications, mobile-health systems, smartphone-based methods, autonomous vehicles, wearable sensorbased methods, systems for clustering vehicles using VANETs [1]. Numerous protocols have been designed for Wireless Sensor Networks (WSN) and Mobile Ad hoc Networks (MANETs) [4].…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…VANETs have many applications in the literature such that real-time safety applications, mobile-health systems, smartphone-based methods, autonomous vehicles, wearable sensorbased methods, systems for clustering vehicles using VANETs [1]. Numerous protocols have been designed for Wireless Sensor Networks (WSN) and Mobile Ad hoc Networks (MANETs) [4].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Lastly, these algorithms focus on exploring the whole working space eliminating the local optima problem which is unsuitable for any kind of problem. IoT being an important field of networks acts as a significant part of everyone's lives and it is increasing and modernizing every day for a prosperous future [1]. The IoT is a composition of different types of networks.…”
Section: Introductionmentioning
confidence: 99%
“…Topic 12 includes studies on transport protocols for endto-end security [288][289][290]. To achieve end-to-end secure communication between an IoT back end and resourcelimited smart things, various studies on communication protocols such as DTLS and CoAP [291,292] and key setting protocols such as EDHOC have been conducted [293,294].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…Information encryption has always been a mechanism to protect and secure the information from the illegal usage and access for decades. In today's era of social media and fast communication facilities, the image based communication is one of the preferred means [85,86]. to check the suitability of proposed S-box for encryption applications.…”
Section: G Encryption Application Of S-boxmentioning
confidence: 99%