2022
DOI: 10.3390/su142315901
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Key Distribution Protocol Selector Based on Machine Learning for Next-Generation Networks

Abstract: In next-generation networks, including the sixth generation (6G), a large number of computing devices can communicate with ultra-low latency. By implication, 6G capabilities present a massive benefit for the Internet of Things (IoT), considering a wide range of application domains. However, some security concerns in the IoT involving authentication and encryption protocols are currently under investigation. Thus, mechanisms implementing quantum communications in IoT devices have been explored to offer improved… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 47 publications
(58 reference statements)
0
2
0
Order By: Relevance
“…To demonstrate resistance to phishing attacks, we show that the proposed framework incorporates robust authentication and verification mechanisms to prevent unauthorized access and data breaches. The framework ensures that user credentials and sensitive information are securely transmitted and stored, minimizing the risk of phishing attacks [12].…”
Section: Resistance To Phishing Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…To demonstrate resistance to phishing attacks, we show that the proposed framework incorporates robust authentication and verification mechanisms to prevent unauthorized access and data breaches. The framework ensures that user credentials and sensitive information are securely transmitted and stored, minimizing the risk of phishing attacks [12].…”
Section: Resistance To Phishing Attacksmentioning
confidence: 99%
“…Complying with these regulations can be burdensome, particularly when sharing data across international borders. Non-compliance can result in severe penalties, further deterring data sharing efforts [12].…”
mentioning
confidence: 99%
“…While ML has shown potential to enhance several aspects of CV-QKD, its application needs to be carefully scrutinized with respect to the introduction of security vulnerabilities (e.g., [41,42]), where existing proofs may no longer hold. Finally, ML also has potential for QKD protocol selection (as was investigated in [65] for discrete-variable QKD) and could additionally be expanded to protocol optimization and design.…”
Section: Suggested Future Workmentioning
confidence: 99%