Quantum Key Distribution-based Techniques in IoT
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.3.69Keywords:
Authentication,Cryptography, Internet of Things, Quantum Computing, Quantum Key Distribution.Dimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Quantum key distribution (QKD) is a cryptographic technique that creates a secure channel of communication between two parties by applying the ideas of quantum physics. QKD ensures the confidentiality and integrity of data transmission by providing a unique key that the intended recipient can only access. Secure communication has become paramount with the proliferation of IoT (Internet of Things) devices. IoT devices have confined computational power and storage, making them vulnerable to attacks. QKD provides a safe and efficient solution for securing communication between IoT devices. This paper examines how QKD can be utilized in IoT, discussing its benefits and limitations, followed by the discussion on various QKD protocols suitable for IoT devices. In addition, the paper demonstrates that QKD is a promising solution for securing IoT communication, and its adoption significantly enhances the security and reliability of IoT networks.Abstract
How to Cite
Downloads
Similar Articles
- Kumari Neha, Amrita ., Quantum programming: Working with IBM’S qiskit tool , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- N. Ruba, A. S. A. Khadir, Session password Blum–Goldwasser cryptography based user three layer authentication for secured financial transaction , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- K. Akila, Location-specific trusted third-party authentication model for environment monitoring using internet of things and an enhancement of quality of service , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- K. Mohamed Arif Khan, A.R. Mohamed Shanavas, Optimizing IoT application deployment with fog - cloud paradigm: A resource-aware approach , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- V. Selvi, T. S. Poornappriya, R. Balasubramani, Cloud computing research productivity and collaboration: A scientometric perspective , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Manpreet Kaur, Shweta Mishra, A smart grid data privacy-preserving aggregation approach with authentication , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- R.R. Jenifer, V.S.J. Prakash, Detecting denial of sleep attacks by analysis of wireless sensor networks and the Internet of Things , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- A. Kalaiselvi, A. Chandrabose, Fuzzy logic-driven scheduling for cloud computing operations: a dynamic and adaptive approach , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Sahaya Jenitha A, Sinthu J. Prakash, A general stochastic model to handle deduplication challenges using hidden Markov model in big data analytics , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- J. M. Aslam, K. M. Kumar, Enhancing cloud data security: User-centric approaches and advanced mechanisms , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
You may also start an advanced similarity search for this article.