A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks

The industry-based internet of things (IIoT) describes how IIoT devices enhance and extend their capabilities for production amenities, security, and efficacy. IIoT establishes an enterprise-to-enterprise setup that means industries have several factories and manufacturing units that are dependent o...

Full description

Bibliographic Details
Main Authors: Kranthi Kumar Singamaneni, Gaurav Dhiman, Sapna Juneja, Ghulam Muhammad, Salman A. AlQahtani, John Zaki
Format: Article
Language:English
Published: MDPI AG 2022-09-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/22/18/6741
_version_ 1797482678273966080
author Kranthi Kumar Singamaneni
Gaurav Dhiman
Sapna Juneja
Ghulam Muhammad
Salman A. AlQahtani
John Zaki
author_facet Kranthi Kumar Singamaneni
Gaurav Dhiman
Sapna Juneja
Ghulam Muhammad
Salman A. AlQahtani
John Zaki
author_sort Kranthi Kumar Singamaneni
collection DOAJ
description The industry-based internet of things (IIoT) describes how IIoT devices enhance and extend their capabilities for production amenities, security, and efficacy. IIoT establishes an enterprise-to-enterprise setup that means industries have several factories and manufacturing units that are dependent on other sectors for their services and products. In this context, individual industries need to share their information with other external sectors in a shared environment which may not be secure. The capability to examine and inspect such large-scale information and perform analytical protection over the large volumes of personal and organizational information demands authentication and confidentiality so that the total data are not endangered after illegal access by hackers and other unauthorized persons. In parallel, these large volumes of confidential industrial data need to be processed within reasonable time for effective deliverables. Currently, there are many mathematical-based symmetric and asymmetric key cryptographic approaches and identity- and attribute-based public key cryptographic approaches that exist to address the abovementioned concerns and limitations such as computational overheads and taking more time for crucial generation as part of the encipherment and decipherment process for large-scale data privacy and security. In addition, the required key for the encipherment and decipherment process may be generated by a third party which may be compromised and lead to man-in-the-middle attacks, brute force attacks, etc. In parallel, there are some other quantum key distribution approaches available to produce keys for the encipherment and decipherment process without the need for a third party. However, there are still some attacks such as photon number splitting attacks and faked state attacks that may be possible with these existing QKD approaches. The primary motivation of our work is to address and avoid such abovementioned existing problems with better and optimal computational overhead for key generation, encipherment, and the decipherment process compared to the existing conventional models. To overcome the existing problems, we proposed a novel dynamic quantum key distribution (QKD) algorithm for critical public infrastructure, which will secure all cyber–physical systems as part of IIoT. In this paper, we used novel multi-state qubit representation to support enhanced dynamic, chaotic quantum key generation with high efficiency and low computational overhead. Our proposed QKD algorithm can create a chaotic set of qubits that act as a part of session-wise dynamic keys used to encipher the IIoT-based large scales of information for secure communication and distribution of sensitive information.
first_indexed 2024-03-09T22:35:57Z
format Article
id doaj.art-96e4933ea875402ea3283fd0face4578
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-09T22:35:57Z
publishDate 2022-09-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-96e4933ea875402ea3283fd0face45782023-11-23T18:48:31ZengMDPI AGSensors1424-82202022-09-012218674110.3390/s22186741A Novel QKD Approach to Enhance IIOT Privacy and Computational KnacksKranthi Kumar Singamaneni0Gaurav Dhiman1Sapna Juneja2Ghulam Muhammad3Salman A. AlQahtani4John Zaki5Department of Computer Science and Engineering, School of Technology, GITAM Deemed to be University, Visakhapatnam 530045, Andhra Pradesh, IndiaDepartment of Electrical and Computer Engineering, Lebanese American University, Beirut 1102 2801, LebanonKIET Group of Institutions, Delhi NCR, Ghaziabad 201206, Uttar Pradesh, IndiaResearch Chair of New Emerging Technologies and 5G Networks and Beyond, Computer Engineering Department, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi ArabiaResearch Chair of New Emerging Technologies and 5G Networks and Beyond, Computer Engineering Department, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi ArabiaDepartment of Computer and Systems, Faculty of Engineering, Mansoura University, Mansoura 35516, EgyptThe industry-based internet of things (IIoT) describes how IIoT devices enhance and extend their capabilities for production amenities, security, and efficacy. IIoT establishes an enterprise-to-enterprise setup that means industries have several factories and manufacturing units that are dependent on other sectors for their services and products. In this context, individual industries need to share their information with other external sectors in a shared environment which may not be secure. The capability to examine and inspect such large-scale information and perform analytical protection over the large volumes of personal and organizational information demands authentication and confidentiality so that the total data are not endangered after illegal access by hackers and other unauthorized persons. In parallel, these large volumes of confidential industrial data need to be processed within reasonable time for effective deliverables. Currently, there are many mathematical-based symmetric and asymmetric key cryptographic approaches and identity- and attribute-based public key cryptographic approaches that exist to address the abovementioned concerns and limitations such as computational overheads and taking more time for crucial generation as part of the encipherment and decipherment process for large-scale data privacy and security. In addition, the required key for the encipherment and decipherment process may be generated by a third party which may be compromised and lead to man-in-the-middle attacks, brute force attacks, etc. In parallel, there are some other quantum key distribution approaches available to produce keys for the encipherment and decipherment process without the need for a third party. However, there are still some attacks such as photon number splitting attacks and faked state attacks that may be possible with these existing QKD approaches. The primary motivation of our work is to address and avoid such abovementioned existing problems with better and optimal computational overhead for key generation, encipherment, and the decipherment process compared to the existing conventional models. To overcome the existing problems, we proposed a novel dynamic quantum key distribution (QKD) algorithm for critical public infrastructure, which will secure all cyber–physical systems as part of IIoT. In this paper, we used novel multi-state qubit representation to support enhanced dynamic, chaotic quantum key generation with high efficiency and low computational overhead. Our proposed QKD algorithm can create a chaotic set of qubits that act as a part of session-wise dynamic keys used to encipher the IIoT-based large scales of information for secure communication and distribution of sensitive information.https://www.mdpi.com/1424-8220/22/18/6741chaotic key generatorcybersecurityIIoTnovel dynamic quantum key distribution algorithm5G
spellingShingle Kranthi Kumar Singamaneni
Gaurav Dhiman
Sapna Juneja
Ghulam Muhammad
Salman A. AlQahtani
John Zaki
A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks
Sensors
chaotic key generator
cybersecurity
IIoT
novel dynamic quantum key distribution algorithm
5G
title A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks
title_full A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks
title_fullStr A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks
title_full_unstemmed A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks
title_short A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks
title_sort novel qkd approach to enhance iiot privacy and computational knacks
topic chaotic key generator
cybersecurity
IIoT
novel dynamic quantum key distribution algorithm
5G
url https://www.mdpi.com/1424-8220/22/18/6741
work_keys_str_mv AT kranthikumarsingamaneni anovelqkdapproachtoenhanceiiotprivacyandcomputationalknacks
AT gauravdhiman anovelqkdapproachtoenhanceiiotprivacyandcomputationalknacks
AT sapnajuneja anovelqkdapproachtoenhanceiiotprivacyandcomputationalknacks
AT ghulammuhammad anovelqkdapproachtoenhanceiiotprivacyandcomputationalknacks
AT salmanaalqahtani anovelqkdapproachtoenhanceiiotprivacyandcomputationalknacks
AT johnzaki anovelqkdapproachtoenhanceiiotprivacyandcomputationalknacks
AT kranthikumarsingamaneni novelqkdapproachtoenhanceiiotprivacyandcomputationalknacks
AT gauravdhiman novelqkdapproachtoenhanceiiotprivacyandcomputationalknacks
AT sapnajuneja novelqkdapproachtoenhanceiiotprivacyandcomputationalknacks
AT ghulammuhammad novelqkdapproachtoenhanceiiotprivacyandcomputationalknacks
AT salmanaalqahtani novelqkdapproachtoenhanceiiotprivacyandcomputationalknacks
AT johnzaki novelqkdapproachtoenhanceiiotprivacyandcomputationalknacks