2022
DOI: 10.1007/s11235-022-00979-y
|View full text |Cite
|
Sign up to set email alerts
|

Quantum secured 6G technology-based applications in Internet of Everything

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 162 publications
0
6
0
Order By: Relevance
“…While quantum vulnerabilities are beyond the scope of this paper, it's important to note that the advent of quantum computing presents new challenges in cybersecurity. With their potential to break traditional encryption methods, Quantum computers could make current security measures obsolete, introducing a new layer of complexity in protecting against intrusions, including those targeted in this research [59].…”
Section: A: Common Security Vulnerabilitiesmentioning
confidence: 99%
“…While quantum vulnerabilities are beyond the scope of this paper, it's important to note that the advent of quantum computing presents new challenges in cybersecurity. With their potential to break traditional encryption methods, Quantum computers could make current security measures obsolete, introducing a new layer of complexity in protecting against intrusions, including those targeted in this research [59].…”
Section: A: Common Security Vulnerabilitiesmentioning
confidence: 99%
“…These techniques could provide secure communication and data protection, even in the face of sophisticated cyberattacks. 88 The purpose of the article is to provide a secure and efficient way to initiate, manage, and terminate multimedia sessions in big data communications, where large amounts of sensitive information are being transmitted and stored. By using a three-factor session initiation protocol, the risk of security breaches is reduced, and the privacy and security of the multimedia data is ensured.…”
Section: Security Threats In Fog Computingmentioning
confidence: 99%
“…The integration of quantum communication techniques with 6G technology could enhance the security and privacy of IoE applications, by leveraging the unique properties of quantum communication, such as QKD and quantum encryption. These techniques could provide secure communication and data protection, even in the face of sophisticated cyberattacks 88 . The purpose of the article is to provide a secure and efficient way to initiate, manage, and terminate multimedia sessions in big data communications, where large amounts of sensitive information are being transmitted and stored.…”
Section: Security Threats In Fog Computingmentioning
confidence: 99%
“…Rahman et al 9 proposed a Deep learning method in the Internet of Things to counter SQL Injection, malware, DNS poisoning, brute force attacks and XSS attacks. Prateek et al 10 discussed about quantum 6G technology based on IoT and IoV smart applications. Network architecture was proposed for secure and efficient Internet‐of‐Everything.…”
Section: Introductionmentioning
confidence: 99%