• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种增强 IIoT 隐私和计算能力的新型 QKD 方法。

A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks.

机构信息

Department of Computer Science and Engineering, School of Technology, GITAM Deemed to be University, Visakhapatnam 530045, Andhra Pradesh, India.

Department of Electrical and Computer Engineering, Lebanese American University, Beirut 1102 2801, Lebanon.

出版信息

Sensors (Basel). 2022 Sep 6;22(18):6741. doi: 10.3390/s22186741.

DOI:10.3390/s22186741
PMID:36146089
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9504852/
Abstract

The industry-based internet of things (IIoT) describes how IIoT devices enhance and extend their capabilities for production amenities, security, and efficacy. IIoT establishes an enterprise-to-enterprise setup that means industries have several factories and manufacturing units that are dependent on other sectors for their services and products. In this context, individual industries need to share their information with other external sectors in a shared environment which may not be secure. The capability to examine and inspect such large-scale information and perform analytical protection over the large volumes of personal and organizational information demands authentication and confidentiality so that the total data are not endangered after illegal access by hackers and other unauthorized persons. In parallel, these large volumes of confidential industrial data need to be processed within reasonable time for effective deliverables. Currently, there are many mathematical-based symmetric and asymmetric key cryptographic approaches and identity- and attribute-based public key cryptographic approaches that exist to address the abovementioned concerns and limitations such as computational overheads and taking more time for crucial generation as part of the encipherment and decipherment process for large-scale data privacy and security. In addition, the required key for the encipherment and decipherment process may be generated by a third party which may be compromised and lead to man-in-the-middle attacks, brute force attacks, etc. In parallel, there are some other quantum key distribution approaches available to produce keys for the encipherment and decipherment process without the need for a third party. However, there are still some attacks such as photon number splitting attacks and faked state attacks that may be possible with these existing QKD approaches. The primary motivation of our work is to address and avoid such abovementioned existing problems with better and optimal computational overhead for key generation, encipherment, and the decipherment process compared to the existing conventional models. To overcome the existing problems, we proposed a novel dynamic quantum key distribution (QKD) algorithm for critical public infrastructure, which will secure all cyber-physical systems as part of IIoT. In this paper, we used novel multi-state qubit representation to support enhanced dynamic, chaotic quantum key generation with high efficiency and low computational overhead. Our proposed QKD algorithm can create a chaotic set of qubits that act as a part of session-wise dynamic keys used to encipher the IIoT-based large scales of information for secure communication and distribution of sensitive information.

摘要

工业物联网(IIoT)描述了 IIoT 设备如何增强和扩展其生产设施、安全性和效率的功能。IIoT 建立了一个企业对企业的设置,这意味着各个行业都有几个工厂和制造单位,这些工厂和制造单位依赖于其他部门的服务和产品。在这种情况下,各个行业需要在共享环境中与其他外部部门共享他们的信息,而这个共享环境可能并不安全。检查和检查如此大规模的信息,并对大量的个人和组织信息执行分析保护,需要进行身份验证和保密,以确保在黑客和其他未经授权的人员非法访问后,总数据不会受到威胁。同时,这些大量的机密工业数据需要在合理的时间内进行处理,以提供有效的成果。目前,存在许多基于数学的对称和非对称密钥加密方法以及基于身份和属性的公钥加密方法,以解决上述问题和限制,例如计算开销和在大规模数据隐私和安全的加密和解密过程中关键生成所花费的更多时间。此外,加密和解密过程所需的密钥可以由第三方生成,而第三方可能会受到威胁,导致中间人攻击、暴力攻击等。同时,还有一些其他的量子密钥分发方法可用于在无需第三方的情况下生成加密和解密过程所需的密钥。然而,在这些现有的 QKD 方法中,仍然存在一些攻击,如光子数分裂攻击和伪造状态攻击等。我们工作的主要动机是解决和避免这些现有的问题,并与现有的传统模型相比,在密钥生成、加密和解密过程中具有更好和更优的计算开销。为了克服现有的问题,我们提出了一种新的用于关键公共基础设施的动态量子密钥分发(QKD)算法,该算法将保护 IIoT 中的所有网络物理系统。在本文中,我们使用了新的多量子比特表示来支持高效和低计算开销的增强型动态量子密钥生成。我们提出的 QKD 算法可以创建一组混沌量子比特,作为用于加密基于 IIoT 的大规模信息的会话级动态密钥的一部分,用于安全通信和分发敏感信息。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c8fa/9504852/a8e55ade8709/sensors-22-06741-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c8fa/9504852/5edb579c1a13/sensors-22-06741-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c8fa/9504852/9eeb4e5ef00f/sensors-22-06741-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c8fa/9504852/05091a8e274c/sensors-22-06741-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c8fa/9504852/56b79abd8083/sensors-22-06741-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c8fa/9504852/0264cd10b1be/sensors-22-06741-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c8fa/9504852/3e9720343807/sensors-22-06741-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c8fa/9504852/0198c0c948a1/sensors-22-06741-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c8fa/9504852/a8e55ade8709/sensors-22-06741-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c8fa/9504852/5edb579c1a13/sensors-22-06741-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c8fa/9504852/9eeb4e5ef00f/sensors-22-06741-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c8fa/9504852/05091a8e274c/sensors-22-06741-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c8fa/9504852/56b79abd8083/sensors-22-06741-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c8fa/9504852/0264cd10b1be/sensors-22-06741-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c8fa/9504852/3e9720343807/sensors-22-06741-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c8fa/9504852/0198c0c948a1/sensors-22-06741-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c8fa/9504852/a8e55ade8709/sensors-22-06741-g008.jpg

相似文献

1
A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks.一种增强 IIoT 隐私和计算能力的新型 QKD 方法。
Sensors (Basel). 2022 Sep 6;22(18):6741. doi: 10.3390/s22186741.
2
A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks.面向 5G 网络的工业物联网设备安全在线指纹认证系统。
Sensors (Basel). 2022 Oct 7;22(19):7609. doi: 10.3390/s22197609.
3
ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of Things.ASAP-IIoT:一种用于工业物联网的匿名安全认证协议。
Sensors (Basel). 2024 Feb 15;24(4):1243. doi: 10.3390/s24041243.
4
A Novel Blockchain and Bi-Linear Polynomial-Based QCP-ABE Framework for Privacy and Security over the Complex Cloud Data.一种基于新型区块链和双线性多项式的复杂云数据隐私和安全 QCP-ABE 框架。
Sensors (Basel). 2021 Nov 2;21(21):7300. doi: 10.3390/s21217300.
5
A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.一种基于安全动态身份和混沌映射的电子医疗保健系统用户认证与密钥协商方案
J Med Syst. 2016 Nov;40(11):233. doi: 10.1007/s10916-016-0586-2. Epub 2016 Sep 21.
6
Deep Learning-Based Privacy-Preserving Data Transmission Scheme for Clustered IIoT Environment.基于深度学习的群集 IIoT 环境下隐私保护数据传输方案。
Comput Intell Neurosci. 2022 Jun 8;2022:8927830. doi: 10.1155/2022/8927830. eCollection 2022.
7
Lightweight Digital Certificate Management and Efficacious Symmetric Cryptographic Mechanism over Industrial Internet of Things.轻量级数字证书管理与工业物联网中的高效对称加密机制。
Sensors (Basel). 2021 Apr 16;21(8):2810. doi: 10.3390/s21082810.
8
A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities.工业物联网安全综述:需求、攻击、基于人工智能的解决方案及边缘计算机遇
Sensors (Basel). 2023 Aug 28;23(17):7470. doi: 10.3390/s23177470.
9
Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications.用于医疗应用的无线人体传感器网络中安全通信的增强型BB84量子密码协议。
Pers Ubiquitous Comput. 2023;27(3):875-885. doi: 10.1007/s00779-021-01546-z. Epub 2021 Mar 18.
10
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT.基于新型支持性对偶延迟确定性策略梯度(S-TD3)算法的工业物联网认证和隐私保护联邦迁移学习。
Sensors (Basel). 2021 Nov 23;21(23):7793. doi: 10.3390/s21237793.

引用本文的文献

1
Active regression model for clinical grading of COVID-19.用于 COVID-19 临床分级的主动回归模型。
Front Immunol. 2023 Mar 21;14:1141996. doi: 10.3389/fimmu.2023.1141996. eCollection 2023.
2
Research on the network handoff strategy based on the best access point name decision.基于最佳接入点名称决策的网络切换策略研究
Front Comput Neurosci. 2023 Jan 10;16:1090301. doi: 10.3389/fncom.2022.1090301. eCollection 2022.

本文引用的文献

1
A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in COVID-19 Patients Care.一种用于新冠疫情患者护理中医疗物联网的轻量级且稳健的安全密钥建立协议。
IEEE Internet Things J. 2020 Dec 28;8(21):15694-15703. doi: 10.1109/JIOT.2020.3047662. eCollection 2021 Nov 1.
2
Deep Learning-Based Privacy-Preserving Data Transmission Scheme for Clustered IIoT Environment.基于深度学习的群集 IIoT 环境下隐私保护数据传输方案。
Comput Intell Neurosci. 2022 Jun 8;2022:8927830. doi: 10.1155/2022/8927830. eCollection 2022.
3
Cloud-Based Fault Prediction Using IoT in Office Automation for Improvisation of Health of Employees.
基于云的故障预测使用物联网在办公自动化,以改善员工的健康。
J Healthc Eng. 2021 Nov 3;2021:8106467. doi: 10.1155/2021/8106467. eCollection 2021.
4
A Novel Blockchain and Bi-Linear Polynomial-Based QCP-ABE Framework for Privacy and Security over the Complex Cloud Data.一种基于新型区块链和双线性多项式的复杂云数据隐私和安全 QCP-ABE 框架。
Sensors (Basel). 2021 Nov 2;21(21):7300. doi: 10.3390/s21217300.
5
Round-robin differential-phase-shift quantum key distribution with a passive decoy state method.轮询差分相移量子密钥分发与被动诱骗态方法。
Sci Rep. 2017 Feb 13;7:42261. doi: 10.1038/srep42261.
6
Simple proof of security of the BB84 quantum key distribution protocol.BB84量子密钥分发协议安全性的简单证明。
Phys Rev Lett. 2000 Jul 10;85(2):441-4. doi: 10.1103/PhysRevLett.85.441.
7
Quantum Error Correction for Communication.用于通信的量子纠错
Phys Rev Lett. 1996 Sep 16;77(12):2585-2588. doi: 10.1103/PhysRevLett.77.2585.
8
Quantum cryptography using any two nonorthogonal states.使用任意两个非正交态的量子密码学。
Phys Rev Lett. 1992 May 25;68(21):3121-3124. doi: 10.1103/PhysRevLett.68.3121.