2024
DOI: 10.1109/comst.2023.3309051
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Cryptography in 5G Networks: A Comprehensive Overview

Miralem Mehic,
Libor Michalek,
Emir Dervisevic
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 19 publications
(2 citation statements)
references
References 165 publications
0
1
0
Order By: Relevance
“…In most IoT wireless networks, the authentication process involves pre-configuring a newly joining node with a pre-shared key (PSK) in the initial authentication phase. Each device, possessing a distinctive identifier, must pre-share a symmetric key with the network coordinator which allows the network coordinator to authenticate recognized devices when engaging in subsequent communications [25]. However, IoT networks lack a well-defined procedure for sharing pre shared keys.…”
Section: Pre-shared Keymentioning
confidence: 99%
“…In most IoT wireless networks, the authentication process involves pre-configuring a newly joining node with a pre-shared key (PSK) in the initial authentication phase. Each device, possessing a distinctive identifier, must pre-share a symmetric key with the network coordinator which allows the network coordinator to authenticate recognized devices when engaging in subsequent communications [25]. However, IoT networks lack a well-defined procedure for sharing pre shared keys.…”
Section: Pre-shared Keymentioning
confidence: 99%
“…This cryptographic phenomenon exploit quantum mechanics' peculiar properties, rendering data transmissions impervious to classical decryption techniques. By entangling quantum states and employing decoy states, our QKD protocol augments data security manifold, providing an ideal safeguard for multi-subnetwork networks [5][6]. Using quantum entanglement and decoy states, a comprehensive and adaptable framework can be developed, which can ensure the robust security of multi-subnetwork networks.…”
Section: Introductionmentioning
confidence: 99%