The theory and experiment of quantum information have been studied extensively in recent years,and the feasibility of quantum communication has been proved.Although the fundamental technology is not yet mature,researc...The theory and experiment of quantum information have been studied extensively in recent years,and the feasibility of quantum communication has been proved.Although the fundamental technology is not yet mature,research on quantum internet should be conducted.To implement quantum internet,an architecture that describes how quantum nodes are linked to form networks and how protocol functions are vertically composed need to be developed urgently.In this paper,we present a novel design of a clusterbased structure to describe how quantum nodes are interconnected,and how the structure can improve the performance of qubit transmission and reduce the network complexity.The idea of the quantum local area network(QLAN)is proposed as an essential component of the quantum internet.Besides,each quantum repeater links to neighboring repeaters to form a core network,and multiple QLANs are connected through the core network.The core network can be grouped into different hierarchical quantum repeater networks according to needed service requirements.For the sake of interoperability and fast prototyping,we adopt the idea of OSI layering model of the current Internet in the design of quantum internet.Finally,we elaborate on the composition of quantum nodes and the realization of end-to-end communication.展开更多
Internet of things (IoT) is a developing technology with a lot of scope in the future. It can ease various different tasks for us. On one hand, IoT is useful for us, on the other hand, it has many serious security thr...Internet of things (IoT) is a developing technology with a lot of scope in the future. It can ease various different tasks for us. On one hand, IoT is useful for us, on the other hand, it has many serious security threats, like data breaches, side-channel attacks, and virus and data authentication. Classical cryptographic algorithms, like the Rivest-Shamir-Adleman (RSA) algorithm, work well under the classical computers. But the technology is slowly shifting towards quantum computing, which has immense processing power and is more than enough to break the current cryptographic algorithms easily. So it is required that we have to design quantum cryptographic algorithms to prevent our systems from security breaches even before quantum computers come in the market for commercial uses. IoT will also be one of the disciplines, which needs to be secured to prevent any malicious activities. In this paper, we review the common security threats in IoT and the presently available solutions with their drawbacks. Then quantum cryptography is introduced with some of its variations. And finally, the analysis has been carried out in terms of the pros and cons of implementing quantum cryptography for IoT security.展开更多
The rapid expansion of the Internet of Things (IoT) has driven the need for advanced computational frameworks capable of handling the complex data processing and security challenges that modern IoT applications demand...The rapid expansion of the Internet of Things (IoT) has driven the need for advanced computational frameworks capable of handling the complex data processing and security challenges that modern IoT applications demand. However, traditional cloud computing frameworks face significant latency, scalability, and security issues. Quantum-Edge Cloud Computing (QECC) offers an innovative solution by integrating the computational power of quantum computing with the low-latency advantages of edge computing and the scalability of cloud computing resources. This study is grounded in an extensive literature review, performance improvements, and metrics data from Bangladesh, focusing on smart city infrastructure, healthcare monitoring, and the industrial IoT sector. The discussion covers vital elements, including integrating quantum cryptography to enhance data security, the critical role of edge computing in reducing response times, and cloud computing’s ability to support large-scale IoT networks with its extensive resources. Through case studies such as the application of quantum sensors in autonomous vehicles, the practical impact of QECC is demonstrated. Additionally, the paper outlines future research opportunities, including developing quantum-resistant encryption techniques and optimizing quantum algorithms for edge computing. The convergence of these technologies in QECC has the potential to overcome the current limitations of IoT frameworks, setting a new standard for future IoT applications.展开更多
This research paper analyzes the urgent topic of quantum cybersecurity and the current federal quantum-cyber landscape. Quantum-safe implementations within existing and future Internet of Things infrastructure are dis...This research paper analyzes the urgent topic of quantum cybersecurity and the current federal quantum-cyber landscape. Quantum-safe implementations within existing and future Internet of Things infrastructure are discussed, along with quantum vulnerabilities in public key infrastructure and symmetric cryptographic algorithms. Other relevant non-encryption-specific areas within cybersecurity are similarly raised. The evolution and expansion of cyberwarfare as well as new developments in cyber defense beyond post-quantum cryptography and quantum key distribution are subsequently explored, with an emphasis on public and private sector awareness and vigilance in maintaining strong security posture.展开更多
随着物联网(Internet of Things,IoT)技术的迅猛发展,数以亿计的设备通过网络互联,物联网安全性问题日益突出。尤其是在量子计算技术的推进下,传统的密码算法面临着前所未有的安全威胁。物联网设备所依赖的传统公钥加密算法在量子计算...随着物联网(Internet of Things,IoT)技术的迅猛发展,数以亿计的设备通过网络互联,物联网安全性问题日益突出。尤其是在量子计算技术的推进下,传统的密码算法面临着前所未有的安全威胁。物联网设备所依赖的传统公钥加密算法在量子计算时代可能失效,给全球范围内的物联网应用带来了巨大的风险。作为抵御量子计算攻击的新型密码体系,后量子密码算法在物联网设备的安全性中起着至关重要的作用。然而,尽管后量子密码算法在理论上能够抵御量子计算的威胁,但在实际实现中,侧信道攻击(Side Channel Attaclss,SCA)风险依然不容忽视。侧信道攻击不依赖破解算法本身,而是通过分析物联网设备在运行加密算法时泄露的物理信息来破坏安全性。在此背景下,针对后量子密码算法的侧信道攻击掩码防护问题,综述了掩码转换方案——布尔到算术转换(Boolean to Arithmetic conversion,B2A)。通过对现有掩码技术的深入分析,详细阐述了B2A算法的原理、实现过程及其在抗侧信道攻击中的优势,为后量子密码算法在物联网设备中的安全实现提供思路,也为我国密码学领域的研究和发展提供参考。展开更多
基金supported in part by Anhui Initiative in Quantum Information Technologies under grant No.AHY150300Youth Innovation Promotion Association Chinese Academy of Sciences(CAS)under grant No.Y202093。
文摘The theory and experiment of quantum information have been studied extensively in recent years,and the feasibility of quantum communication has been proved.Although the fundamental technology is not yet mature,research on quantum internet should be conducted.To implement quantum internet,an architecture that describes how quantum nodes are linked to form networks and how protocol functions are vertically composed need to be developed urgently.In this paper,we present a novel design of a clusterbased structure to describe how quantum nodes are interconnected,and how the structure can improve the performance of qubit transmission and reduce the network complexity.The idea of the quantum local area network(QLAN)is proposed as an essential component of the quantum internet.Besides,each quantum repeater links to neighboring repeaters to form a core network,and multiple QLANs are connected through the core network.The core network can be grouped into different hierarchical quantum repeater networks according to needed service requirements.For the sake of interoperability and fast prototyping,we adopt the idea of OSI layering model of the current Internet in the design of quantum internet.Finally,we elaborate on the composition of quantum nodes and the realization of end-to-end communication.
文摘Internet of things (IoT) is a developing technology with a lot of scope in the future. It can ease various different tasks for us. On one hand, IoT is useful for us, on the other hand, it has many serious security threats, like data breaches, side-channel attacks, and virus and data authentication. Classical cryptographic algorithms, like the Rivest-Shamir-Adleman (RSA) algorithm, work well under the classical computers. But the technology is slowly shifting towards quantum computing, which has immense processing power and is more than enough to break the current cryptographic algorithms easily. So it is required that we have to design quantum cryptographic algorithms to prevent our systems from security breaches even before quantum computers come in the market for commercial uses. IoT will also be one of the disciplines, which needs to be secured to prevent any malicious activities. In this paper, we review the common security threats in IoT and the presently available solutions with their drawbacks. Then quantum cryptography is introduced with some of its variations. And finally, the analysis has been carried out in terms of the pros and cons of implementing quantum cryptography for IoT security.
文摘The rapid expansion of the Internet of Things (IoT) has driven the need for advanced computational frameworks capable of handling the complex data processing and security challenges that modern IoT applications demand. However, traditional cloud computing frameworks face significant latency, scalability, and security issues. Quantum-Edge Cloud Computing (QECC) offers an innovative solution by integrating the computational power of quantum computing with the low-latency advantages of edge computing and the scalability of cloud computing resources. This study is grounded in an extensive literature review, performance improvements, and metrics data from Bangladesh, focusing on smart city infrastructure, healthcare monitoring, and the industrial IoT sector. The discussion covers vital elements, including integrating quantum cryptography to enhance data security, the critical role of edge computing in reducing response times, and cloud computing’s ability to support large-scale IoT networks with its extensive resources. Through case studies such as the application of quantum sensors in autonomous vehicles, the practical impact of QECC is demonstrated. Additionally, the paper outlines future research opportunities, including developing quantum-resistant encryption techniques and optimizing quantum algorithms for edge computing. The convergence of these technologies in QECC has the potential to overcome the current limitations of IoT frameworks, setting a new standard for future IoT applications.
文摘This research paper analyzes the urgent topic of quantum cybersecurity and the current federal quantum-cyber landscape. Quantum-safe implementations within existing and future Internet of Things infrastructure are discussed, along with quantum vulnerabilities in public key infrastructure and symmetric cryptographic algorithms. Other relevant non-encryption-specific areas within cybersecurity are similarly raised. The evolution and expansion of cyberwarfare as well as new developments in cyber defense beyond post-quantum cryptography and quantum key distribution are subsequently explored, with an emphasis on public and private sector awareness and vigilance in maintaining strong security posture.
文摘随着物联网(Internet of Things,IoT)技术的迅猛发展,数以亿计的设备通过网络互联,物联网安全性问题日益突出。尤其是在量子计算技术的推进下,传统的密码算法面临着前所未有的安全威胁。物联网设备所依赖的传统公钥加密算法在量子计算时代可能失效,给全球范围内的物联网应用带来了巨大的风险。作为抵御量子计算攻击的新型密码体系,后量子密码算法在物联网设备的安全性中起着至关重要的作用。然而,尽管后量子密码算法在理论上能够抵御量子计算的威胁,但在实际实现中,侧信道攻击(Side Channel Attaclss,SCA)风险依然不容忽视。侧信道攻击不依赖破解算法本身,而是通过分析物联网设备在运行加密算法时泄露的物理信息来破坏安全性。在此背景下,针对后量子密码算法的侧信道攻击掩码防护问题,综述了掩码转换方案——布尔到算术转换(Boolean to Arithmetic conversion,B2A)。通过对现有掩码技术的深入分析,详细阐述了B2A算法的原理、实现过程及其在抗侧信道攻击中的优势,为后量子密码算法在物联网设备中的安全实现提供思路,也为我国密码学领域的研究和发展提供参考。