2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) 2019
DOI: 10.1109/percomw.2019.8730749
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Quantum-Safe Security Concept for Wireless Sensor Network Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 22 publications
0
6
0
Order By: Relevance
“…For symmetric and asymmetric methods, especially when using elliptic curves, there may be further problems in the near future. Commonly used asymmetric methods today are vulnerable to attacks via quantum computers [8]. For this, longer keys or new algorithms must be used, which will lead to an increase in energy consumption.…”
Section: Discussionmentioning
confidence: 99%
“…For symmetric and asymmetric methods, especially when using elliptic curves, there may be further problems in the near future. Commonly used asymmetric methods today are vulnerable to attacks via quantum computers [8]. For this, longer keys or new algorithms must be used, which will lead to an increase in energy consumption.…”
Section: Discussionmentioning
confidence: 99%
“…JV Anand 3 proposes an approach that deals with a routing algorithm that relies on compression sensing data and trust-awareness, to handle routing in a clustered WSN. In this approach five optimization methods were used based on a developed methodology that focuses on maximizing trust in the route, minimizing message overhead, number of hops and maximum distance.…”
Section: Related Workmentioning
confidence: 99%
“…Bennett and Brassard introduced the first quantum key distribution protocol in 1984, which has since been documented in a number of publications, as well as proof that it is unconditional. Quantum and classical channels are used in the BB84 protocol 19 for sending polarized light pulses via a quantum channel, such as an optical fiber, with each pulse containing one photon. It allows two parties, Alice as the sender and Bob as the receiver, to create a secret shared key using polarized photons qubits 20,21 WSN nodes often face resource constraints, such as computing capacity, memory space, and power management.…”
Section: -Bb84 Protocolmentioning
confidence: 99%
See 2 more Smart Citations