2021
DOI: 10.1109/access.2021.3117405
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios

Abstract: Internet of Things (IoT) deployments face significant security challenges due to the limited energy and computational power of IoT devices. These challenges are more serious in the quantum communications era, where certain attackers might have quantum computing capabilities, which renders IoT devices more vulnerable. This paper addresses the problem of IoT security by investigating quantum key distribution (QKD) in beyond 5G networks. An algorithm for detecting an attacker between a transmitter and receiver is… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(17 citation statements)
references
References 28 publications
0
17
0
Order By: Relevance
“…FL can also be combined with quantum computing to create a learning model without violating data privacy, which is studied in [51]. Optimal quantum key distribution (QKD) protocol selection and intruder detection during the QKD process can be executed by employing ML algorithms [52], [53].…”
Section: ) Quantum Computingmentioning
confidence: 99%
“…FL can also be combined with quantum computing to create a learning model without violating data privacy, which is studied in [51]. Optimal quantum key distribution (QKD) protocol selection and intruder detection during the QKD process can be executed by employing ML algorithms [52], [53].…”
Section: ) Quantum Computingmentioning
confidence: 99%
“…Wireless Communications and Mobile Computing implementing quantum cryptography for IoT security [29]. Moreover, a quantum-powered algorithm is proposed to detect attackers between a IoT transmitter and IoT receiver by using machine learning techniques [30]. The algorithm combines artificial neural network and deep learning techniques to detect the presence of an attacker without disrupting quantum key distribution process.…”
Section: Related Workmentioning
confidence: 99%
“…While the sensors can only obtain keys from the controller via classical channels due to their size and power limitations. 17…”
Section: The Cv-qc Scheme With a Locked Lomentioning
confidence: 99%
“…Also, they can be used to establish a key with corresponding sensors using traditional key distribution techniques. 17…”
Section: The Cv-qc Scheme With a Locked Lomentioning
confidence: 99%
See 1 more Smart Citation