Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (185)

Search Parameters:
Keywords = quantum communication network

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
57 pages, 2877 KiB  
Review
A Comprehensive Exploration of 6G Wireless Communication Technologies
by Md Nurul Absar Siddiky, Muhammad Enayetur Rahman, Md Shahriar Uzzal and H. M. Dipu Kabir
Computers 2025, 14(1), 15; https://doi.org/10.3390/computers14010015 - 3 Jan 2025
Viewed by 454
Abstract
As the telecommunications landscape braces for the post-5G era, this paper embarks on delineating the foundational pillars and pioneering visions that define the trajectory toward 6G wireless communication systems. Recognizing the insatiable demand for higher data rates, enhanced connectivity, and broader network coverage, [...] Read more.
As the telecommunications landscape braces for the post-5G era, this paper embarks on delineating the foundational pillars and pioneering visions that define the trajectory toward 6G wireless communication systems. Recognizing the insatiable demand for higher data rates, enhanced connectivity, and broader network coverage, we unravel the evolution from the existing 5G infrastructure to the nascent 6G framework, setting the stage for transformative advancements anticipated in the 2030s. Our discourse navigates through the intricate architecture of 6G, highlighting the paradigm shifts toward superconvergence, non-IP-based networking protocols, and information-centric networks, all underpinned by a robust 360-degree cybersecurity and privacy-by-engineering design. Delving into the core of 6G, we articulate a systematic exploration of the key technologies earmarked to revolutionize wireless communication including terahertz (THz) waves, optical wireless technology, and dynamic spectrum management while elucidating the intricate trade-offs necessitated by the integration of such innovations. This paper not only lays out a comprehensive 6G vision accentuated by high security, affordability, and intelligence but also charts the course for addressing the pivotal challenges of spectrum efficiency, energy consumption, and the seamless integration of emerging technologies. In this study, our goal is to enrich the existing discussions and research efforts by providing comprehensive insights into the development of 6G technology, ultimately supporting the creation of a thoroughly connected future world that meets evolving demands. Full article
Show Figures

Figure 1

26 pages, 2216 KiB  
Article
QCA: Quantum Computational Approach for Internet of Things with 5G Connectivity
by Shitharth Selvarajan, Hariprasath Manoharan, Adil O. Khadidos and Alaa O. Khadidos
Information 2025, 16(1), 5; https://doi.org/10.3390/info16010005 - 25 Dec 2024
Viewed by 361
Abstract
In this paper, the need for a quantum computing approach is analyzed for IoT applications using the 5G resource spectrum. Most of the IoT devices are connected for data transmission to end users with remote monitoring units, but there are no sufficient data [...] Read more.
In this paper, the need for a quantum computing approach is analyzed for IoT applications using the 5G resource spectrum. Most of the IoT devices are connected for data transmission to end users with remote monitoring units, but there are no sufficient data storage units, and more data cannot be processed at minimized time periods. Hence, in the proposed method, quantum information processing protocols and quantum algorithms are integrated where data transmissions are maximized. Further, the system model is designed in such a way for checking the external influence factors that prevent the IoT device from transmitting data to end users. Therefore, with corresponding signal and noise power, it is essential to process the transmissions, thereby increasing data proportions at end connectivity. Once quantum computations are performed, then it is crucial to normalize IoT data units, thus establishing control over entire connected nodes that create a gateway for achieving maximum throughput. The combined system model is tested under four cases where the comparative outcomes prove that with reduced queue reductions of 12%, it is possible to achieve a maximum throughput of 99%. Full article
(This article belongs to the Special Issue Internet of Things and Cloud-Fog-Edge Computing)
Show Figures

Graphical abstract

14 pages, 546 KiB  
Article
Routing Algorithm Within the Multiple Non-Overlapping Paths’ Approach for Quantum Key Distribution Networks
by Evgeniy O. Kiktenko, Andrey Tayduganov and Aleksey K. Fedorov
Entropy 2024, 26(12), 1102; https://doi.org/10.3390/e26121102 - 16 Dec 2024
Viewed by 502
Abstract
We develop a novel key routing algorithm for quantum key distribution (QKD) networks that utilizes a distribution of keys between remote nodes, i.e., not directly connected by a QKD link, through multiple non-overlapping paths. This approach focuses on the security of a QKD [...] Read more.
We develop a novel key routing algorithm for quantum key distribution (QKD) networks that utilizes a distribution of keys between remote nodes, i.e., not directly connected by a QKD link, through multiple non-overlapping paths. This approach focuses on the security of a QKD network by minimizing potential vulnerabilities associated with individual trusted nodes. The algorithm ensures a balanced allocation of the workload across the QKD network links, while aiming for the target key generation rate between directly connected and remote nodes. We present the results of testing the algorithm on two QKD network models consisting of 6 and 10 nodes. The testing demonstrates the ability of the algorithm to distribute secure keys among the nodes of the network in an all-to-all manner, ensuring that the information-theoretic security of the keys between remote nodes is maintained even when one of the trusted nodes is compromised. These results highlight the potential of the algorithm to improve the performance of QKD networks. Full article
(This article belongs to the Special Issue Quantum Communications Networks: Trends and Challenges)
Show Figures

Figure 1

19 pages, 833 KiB  
Article
Secured Real-Time Machine Communication Protocol
by Yifei Ren, Lakmal Rupasinghe, Siavash Khaksar, Nasim Ferdosian and Iain Murray
Network 2024, 4(4), 567-585; https://doi.org/10.3390/network4040028 (registering DOI) - 12 Dec 2024
Viewed by 516
Abstract
In this paper, we introduce the Secured Real-Time Machine Communication Protocol (SRMCP), a novel industrial communication protocol designed to address the increasing demand for security and performance in Industry 4.0 environments. SRMCP integrates post-quantum cryptographic techniques, including the Kyber Key Encapsulation Mechanism (Kyber-KEM) [...] Read more.
In this paper, we introduce the Secured Real-Time Machine Communication Protocol (SRMCP), a novel industrial communication protocol designed to address the increasing demand for security and performance in Industry 4.0 environments. SRMCP integrates post-quantum cryptographic techniques, including the Kyber Key Encapsulation Mechanism (Kyber-KEM) and AES-GCM encryption, to ensure robust protection against both current and future cryptographic threats. We also present an innovative “Port Hopping” mechanism inspired by frequency hopping, enhancing security by distributing communication across multiple channels. Comparative performance analysis was conducted with widely-used protocols such as ModBus and the OPC UA, focusing on key metrics such as connection, reading, and writing times across local and remote networks. Results demonstrate that SRMCP outperforms ModBus in reading and writing operations while offering enhanced security, although it has a higher connection time due to its dual-layer encryption. The OPC UA, while secure, lags significantly in performance, making it less suitable for real-time applications. The findings suggest that SRMCP is a viable solution for secure and efficient machine communication in modern industrial settings, particularly where quantum-safe security is a concern. Full article
Show Figures

Figure 1

24 pages, 1229 KiB  
Article
Asymmetric Bidirectional Quantum Communication with Device Authentication in IoT
by Yonghao Zhu, Dongfen Li, Yangyang Jiang, Xiaoyu Hua, You Fu, Jie Zhou, Yuqiao Tan and Xiaolong Yang
Symmetry 2024, 16(12), 1589; https://doi.org/10.3390/sym16121589 - 28 Nov 2024
Viewed by 405
Abstract
Quantum communication holds great potential for enhancing the security and efficiency of the Internet of Things (IoT). However, existing schemes often overlook device identity authentication, leaving systems vulnerable to unauthorized access, and rely on third-party controllers, which increase complexity and undermine trust. This [...] Read more.
Quantum communication holds great potential for enhancing the security and efficiency of the Internet of Things (IoT). However, existing schemes often overlook device identity authentication, leaving systems vulnerable to unauthorized access, and rely on third-party controllers, which increase complexity and undermine trust. This paper proposes a novel asymmetric bidirectional quantum communication scheme tailored for IoT, integrating device identity authentication and information transmission without requiring third-party controllers. We provide a detailed description of the scheme’s application scenarios in IoT, conduct a security analysis of the identity authentication module, and experimentally validate the feasibility of the information transmission module. Additionally, we analyze the impact of quantum noise on the proposed scheme and compare it with existing approaches, highlighting its advantages in terms of resource consumption and efficiency. Full article
(This article belongs to the Section Physics)
Show Figures

Figure 1

9 pages, 325 KiB  
Article
Quantum Computing in Community Detection for Anti-Fraud Applications
by Yanbo (Justin) Wang, Xuan Yang, Chao Ju, Yue Zhang, Jun Zhang, Qi Xu, Yiduo Wang, Xinkai Gao, Xiaofeng Cao, Yin Ma and Jie Wu
Entropy 2024, 26(12), 1026; https://doi.org/10.3390/e26121026 - 27 Nov 2024
Viewed by 825
Abstract
Fraud detection within transaction data is crucial for maintaining financial security, especially in the era of big data. This paper introduces a novel fraud detection method that utilizes quantum computing to implement community detection in transaction networks. We model transaction data as an [...] Read more.
Fraud detection within transaction data is crucial for maintaining financial security, especially in the era of big data. This paper introduces a novel fraud detection method that utilizes quantum computing to implement community detection in transaction networks. We model transaction data as an undirected graph, where nodes represent accounts and edges indicate transactions between them. A modularity function is defined to measure the community structure of the graph. By optimizing this function through the Quadratic Unconstrained Binary Optimization (QUBO) model, we identify the optimal community structure, which is then used to assess the fraud risk within each community. Using a Coherent Ising Machine (CIM) to solve the QUBO model, we successfully divide 308 nodes into four communities. We find that the CIM computes faster than the classical Louvain and simulated annealing (SA) algorithms. Moreover, the CIM achieves better community structure than Louvain and SA as quantified by the modularity function. The structure also unambiguously identifies a high-risk community, which contains almost 70% of all the fraudulent accounts, demonstrating the practical utility of the method for banks’ anti-fraud business. Full article
(This article belongs to the Special Issue Quantum Information: Working towards Applications)
Show Figures

Figure 1

16 pages, 6173 KiB  
Article
Control Power in Continuous Variable Controlled Quantum Teleportation
by Yuehan Tian, Dunbo Cai, Nengfei Gong, Yining Li, Ling Qian, Runqing Zhang, Zhiguo Huang and Tiejun Wang
Entropy 2024, 26(12), 1017; https://doi.org/10.3390/e26121017 - 25 Nov 2024
Viewed by 451
Abstract
Controlled quantum teleportation is an important extension of multipartite quantum teleportation, which plays an indispensable role in building quantum networks. Compared with discrete variable counterparts, continuous variable controlled quantum teleportation can generate entanglement deterministically and exhibit higher superiority of the supervisor’s authority. Here, [...] Read more.
Controlled quantum teleportation is an important extension of multipartite quantum teleportation, which plays an indispensable role in building quantum networks. Compared with discrete variable counterparts, continuous variable controlled quantum teleportation can generate entanglement deterministically and exhibit higher superiority of the supervisor’s authority. Here, we define a measure to quantify the control power in continuous variable controlled quantum teleportation via Greenberger–Horne–Zeilinger-type entangled coherent state channels. Our results show that control power in continuous variable controlled quantum teleportation increases with the mean photon number of coherent states. Its upper bound is 1/2, which exceeds the upper bound in discrete variable controlled quantum teleportation (1/3). The robustness of the protocol is analyzed with photon absorption. The results show that the improving ability of the control power will descend by the increasing photon loss, with the upper bound unchanged and robust. Our results illuminate the role of control power in multipartite continuous variable quantum information processing and provide a criterion for evaluating the quality of quantum communication networks. Full article
(This article belongs to the Special Issue Quantum Information: Working towards Applications)
Show Figures

Figure 1

12 pages, 374 KiB  
Review
Exploring the Percolation Phenomena in Quantum Networks
by Chuanxin Wang, Xinqi Hu and Gaogao Dong
Mathematics 2024, 12(22), 3568; https://doi.org/10.3390/math12223568 - 15 Nov 2024
Viewed by 569
Abstract
Quantum entanglement as a non-local correlation between particles is critical to the transmission of quantum information in quantum networks (QNs); the key challenge lies in establishing long-distance entanglement transmission between distant targets. This issue aligns with percolation theory, and as a result, an [...] Read more.
Quantum entanglement as a non-local correlation between particles is critical to the transmission of quantum information in quantum networks (QNs); the key challenge lies in establishing long-distance entanglement transmission between distant targets. This issue aligns with percolation theory, and as a result, an entanglement distribution scheme called “Classical Entanglement Percolation” (CEP) has been proposed. While this scheme provides an effective framework, “Quantum Entanglement Percolation” (QEP) indicates a lower percolation threshold through quantum preprocessing strategies, which will modify the network topology. Meanwhile, an emerging statistical theory known as “Concurrence Percolation” reveals the unique advantages of quantum networks, enabling entanglement transmission under lower conditions. It fundamentally belongs to a different universality class from classical percolation. Although these studies have made significant theoretical advancements, most are based on an idealized pure state network model. In practical applications, quantum states are often affected by thermal noise, resulting in mixed states. When these mixed states meet specific conditions, they can be transformed into pure states through quantum operations and further converted into singlets with a certain probability, thereby facilitating entanglement percolation in mixed state networks. This finding greatly broadens the application prospects of quantum networks. This review offers a comprehensive overview of the fundamental theories of quantum percolation and the latest cutting-edge research developments. Full article
(This article belongs to the Special Issue Complex Network Modeling: Theory and Applications, 2nd Edition)
Show Figures

Figure 1

35 pages, 663 KiB  
Article
A Cross-Layer Secure and Energy-Efficient Framework for the Internet of Things: A Comprehensive Survey
by Rashid Mustafa, Nurul I. Sarkar, Mahsa Mohaghegh and Shahbaz Pervez
Sensors 2024, 24(22), 7209; https://doi.org/10.3390/s24227209 - 11 Nov 2024
Viewed by 1319
Abstract
This survey delves into cross-layer energy-efficient solutions and cutting-edge security measures for Internet of Things (IoT) networks. The conventional security techniques are considered inadequate, leading to the suggestion of AI-powered intrusion detection systems and novel strategies such as blockchain integration. This research aims [...] Read more.
This survey delves into cross-layer energy-efficient solutions and cutting-edge security measures for Internet of Things (IoT) networks. The conventional security techniques are considered inadequate, leading to the suggestion of AI-powered intrusion detection systems and novel strategies such as blockchain integration. This research aims to promote the development of smart cities by enhancing sustainability, security, and efficiency in the industrial and agricultural sectors through the use of IoT, blockchain, AI, and new communication technologies like 5G. In this paper, we provide a comprehensive review and analysis of secure and energy-efficient cross-layer IoT frameworks based on survey of more than 100 published research articles. We highlight the significance of developing IoT security for robust and sustainable connected systems. We discuss multi-layered security approaches and ways to enhance the energy efficiency of resource-constrained devices in IoT networks. Finally, we identify open research issues and future research directions in the emerging field of cross-layer design for secure and energy-efficient IoT networks. In order to improve cybersecurity and efficiency in smart cities, the research also focuses on developing a secure, energy-efficient IoT framework integrating blockchain, artificial intelligence, and quantum-safe cryptography. Full article
(This article belongs to the Special Issue Sensors and Smart City)
Show Figures

Figure 1

30 pages, 1152 KiB  
Review
Review of Physical Layer Security in Integrated Satellite–Terrestrial Networks
by Rajnish Kumar and Shlomi Arnon
Electronics 2024, 13(22), 4414; https://doi.org/10.3390/electronics13224414 - 11 Nov 2024
Viewed by 982
Abstract
With the success and commercialization of 5G, 3GPP has started working toward the sixth generation of communication systems. While 5G explored the concept of non-terrestrial networks like satellites and unmanned aerial vehicles working alongside terrestrial networks, 6G is expected to take this integration [...] Read more.
With the success and commercialization of 5G, 3GPP has started working toward the sixth generation of communication systems. While 5G explored the concept of non-terrestrial networks like satellites and unmanned aerial vehicles working alongside terrestrial networks, 6G is expected to take this integration a step further, aiming to achieve a more coherent network where satellites and terrestrial infrastructure work together seamlessly. However, the complexity and uniqueness of such networks create numerous attack surfaces that make them vulnerable to cyberattacks. The solution to such cyberattacks can be addressed by encryption and other upper-layer authentication methods. However, with the move to higher-frequency bands, such encryption techniques are difficult to scale for low-latency networks. In addition, the recent progress in quantum computing will make networks more vulnerable. To address such challenges, physical layer security (PLS) is proposed as a secure and quantum-resistant way to implement security by taking advantage of the physics of the channel and transceiver. This article reviews the latest trends and progress in PLS in integrated satellite–terrestrial networks (ISTNs) from a signal processing perspective. This work provides a comprehensive survey of the state-of-the-art research conducted, challenges, and future directions in the PLS of ISTNs. Full article
(This article belongs to the Special Issue Advances in Future Wireless Networks)
Show Figures

Figure 1

22 pages, 3454 KiB  
Article
An Applied Analysis of Securing 5G/6G Core Networks with Post-Quantum Key Encapsulation Methods
by Paul Scalise, Robert Garcia, Matthew Boeding, Michael Hempel and Hamid Sharif
Electronics 2024, 13(21), 4258; https://doi.org/10.3390/electronics13214258 - 30 Oct 2024
Viewed by 1460
Abstract
Fifth Generation (5G) cellular networks have been adopted worldwide since the rollout began around 2019. It brought with it many innovations and new services, such as Enhanced Mobile Broadband (eMBB), Ultra Reliable and Low-Latency Communications (URLLC), and Massive Internet of Things (mIoT). Furthermore, [...] Read more.
Fifth Generation (5G) cellular networks have been adopted worldwide since the rollout began around 2019. It brought with it many innovations and new services, such as Enhanced Mobile Broadband (eMBB), Ultra Reliable and Low-Latency Communications (URLLC), and Massive Internet of Things (mIoT). Furthermore, 5G introduced a more scalable approach to network operations using fully software-based Virtualized Network Functions (VNF) in Core Networks (CN) rather than the prior hardware-based approach. However, while this shift towards a fully software-based system design provides numerous significant benefits, such as increased interoperability, scalability, and cost-effectiveness, it also brings with it an increased cybersecurity risk. Security is crucial to maintaining trust between vendors, operators, and consumers. Cyberattacks are rapidly increasing in number and sophistication, and we are seeing a shift towards zero-trust approaches. This means that even communications between VNFs inside a 5G core must be scrutinized and hardened against attacks, especially with the advent of quantum computers. The National Institute of Standards and Technology (NIST), over the past 10 years, has led efforts to standardize post-quantum cryptography (PQC) to protect against quantum attacks. This paper covers a custom implementation of the open-source free5GC CN, to expand its HTTPS capabilities for VNFs by introducing PQC Key Encapsulation Methods (KEM) for Transport Layer Security (TLS) v1.3. This paper provides the details of this integration with a focus on the latency of different PQC KEMs in initial handshakes between VNFs, on packet size, and the implications in a 5G environment. This work also conducts a security comparison between the PQC-equipped free5GC and other open-source 5G CNs. The presented results indicate a negligible increase in UE connection setup duration and a small increase in connection setup data requirements, strongly indicating that PQC KEM’s benefits far outweigh any downsides when integrated into 5G and 6G core services. To the best of our knowledge, this is the first work incorporating PQC into an open-source 5G core. Furthermore, the results from this effort demonstrate that employing PQC ciphers for securing VNF communications results in only a negligible impact on latency and bandwidth usage, thus demonstrating significant benefits to 5G cybersecurity. Full article
Show Figures

Figure 1

32 pages, 2926 KiB  
Article
Mitigating Security Vulnerabilities in 6G Networks: A Comprehensive Analysis of the DMRN Protocol Using SVO Logic and ProVerif
by Ilsun You, Jiyoon Kim, I Wayan Adi Juliawan Pawana and Yongho Ko
Appl. Sci. 2024, 14(21), 9726; https://doi.org/10.3390/app14219726 - 24 Oct 2024
Viewed by 1044
Abstract
The rapid evolution of mobile and optical communication technologies is driving the transition from 5G to 6G networks. This transition inevitably brings about changes in authentication scenarios, as new security demands emerge that go beyond the capabilities of existing frameworks. Therefore, it is [...] Read more.
The rapid evolution of mobile and optical communication technologies is driving the transition from 5G to 6G networks. This transition inevitably brings about changes in authentication scenarios, as new security demands emerge that go beyond the capabilities of existing frameworks. Therefore, it is necessary to address these evolving requirements and the associated key challenges: ensuring Perfect Forward Secrecy (PFS) to protect communications even if long-term keys are compromised and integrating Post-Quantum Cryptography (PQC) techniques to defend against the threats posed by quantum computing. These are essential for both radio and optical communications, which are foundational elements of future 6G infrastructures. The DMRN Protocol, introduced in 2022, represents a major advancement by offering both PFS and PQC while maintaining compatibility with existing 3rd Generation Partnership Project (3GPP) standards. Given the looming quantum-era challenges, it is imperative to analyze the protocol’s security architecture through formal verification. Accordingly, we formally analyze the DMRN Protocol using SVO logic and ProVerif to assess its effectiveness in mitigating attack vectors, such as malicious or compromised serving networks (SNs) and home network (HN) masquerading. Our research found that the DMRN Protocol has vulnerabilities in key areas such as mutual authentication and key exchange. In light of these findings, our study provides critical insights into the design of secure and quantum-safe authentication protocols for the transition to 6G networks. Furthermore, by identifying the vulnerabilities in and discussing countermeasures to address the DMRN Protocol, this study lays the groundwork for the future standardization of secure 6G Authentication and Key Agreement protocols. Full article
(This article belongs to the Special Issue Intelligent Optical Signal Processing in Optical Fiber Communication)
Show Figures

Figure 1

17 pages, 630 KiB  
Article
Quantum-Based Maximum Likelihood Detection in MIMO-NOMA Systems for 6G Networks
by Helen Urgelles, David Garcia-Roger and Jose F. Monserrat
Quantum Rep. 2024, 6(4), 533-549; https://doi.org/10.3390/quantum6040036 - 22 Oct 2024
Viewed by 1407
Abstract
As wireless networks advance toward the Sixth Generation (6G), which will support highly heterogeneous scenarios and massive data traffic, conventional computing methods may struggle to meet the immense processing demands in a resource-efficient manner. This paper explores the potential of quantum computing (QC) [...] Read more.
As wireless networks advance toward the Sixth Generation (6G), which will support highly heterogeneous scenarios and massive data traffic, conventional computing methods may struggle to meet the immense processing demands in a resource-efficient manner. This paper explores the potential of quantum computing (QC) to address these challenges, specifically by enhancing the efficiency of Maximum-Likelihood detection in Multiple-Input Multiple-Output (MIMO) Non-Orthogonal Multiple Access (NOMA) communication systems, an essential technology anticipated for 6G. The study proposes the use of the Quantum Approximate Optimization Algorithm (QAOA), a variational quantum algorithm known for providing quantum advantages in certain combinatorial optimization problems. While current quantum systems are not yet capable of managing millions of physical qubits or performing high-fidelity, long gate sequences, the results indicate that QAOA is a promising QC approach for radio signal processing tasks. This research provides valuable insights into the potential transformative impact of QC on future wireless networks. This sets the stage for discussions on practical implementation challenges, such as constrained problem sizes and sensitivity to noise, and opens pathways for future research aimed at fully harnessing the potential of QC for 6G and beyond. Full article
(This article belongs to the Special Issue Exclusive Feature Papers of Quantum Reports in 2024–2025)
Show Figures

Figure 1

21 pages, 3725 KiB  
Article
An Efficient CNN-Based Intrusion Detection System for IoT: Use Case Towards Cybersecurity
by Amogh Deshmukh and Kiran Ravulakollu
Technologies 2024, 12(10), 203; https://doi.org/10.3390/technologies12100203 - 17 Oct 2024
Viewed by 3170
Abstract
Today’s environment demands that cybersecurity be given top priority because of the increase in cyberattacks and the development of quantum computing capabilities. Traditional security measures have relied on cryptographic techniques to safeguard information systems and networks. However, with the adaptation of artificial intelligence [...] Read more.
Today’s environment demands that cybersecurity be given top priority because of the increase in cyberattacks and the development of quantum computing capabilities. Traditional security measures have relied on cryptographic techniques to safeguard information systems and networks. However, with the adaptation of artificial intelligence (AI), there is an opportunity to enhance cybersecurity through learning-based methods. IoT environments, in particular, work with lightweight systems that cannot handle the large data communications typically required by traditional intrusion detection systems (IDSs) to find anomalous patterns, making it a challenging problem. A deep learning-based framework is proposed in this study with various optimizations for automatically detecting and classifying cyberattacks. These optimizations involve dimensionality reduction, hyperparameter tuning, and feature engineering. Additionally, the framework utilizes an enhanced Convolutional Neural Network (CNN) variant called Intelligent Intrusion Detection Network (IIDNet) to detect and classify attacks efficiently. Layer optimization at the architectural level is used to improve detection performance in IIDNet using a Learning-Based Intelligent Intrusion Detection (LBIID) algorithm. The experimental study conducted in this paper uses a benchmark dataset known as UNSW-NB15 and demonstrated that IIDNet achieves an outstanding accuracy of 95.47% while significantly reducing training time and excellent scalability, outperforming many existing intrusion detection models. Full article
(This article belongs to the Special Issue IoT-Enabling Technologies and Applications)
Show Figures

Figure 1

15 pages, 3517 KiB  
Article
Scenarios for Optical Encryption Using Quantum Keys
by Luis Velasco, Morteza Ahmadian, Laura Ortiz, Juan P. Brito, Antonio Pastor, Jose M. Rivas, Sima Barzegar, Jaume Comellas, Vicente Martin and Marc Ruiz
Sensors 2024, 24(20), 6631; https://doi.org/10.3390/s24206631 - 15 Oct 2024
Viewed by 818
Abstract
Optical communications providing huge capacity and low latency remain vulnerable to a range of attacks. In consequence, encryption at the optical layer is needed to ensure secure data transmission. In our previous work, we proposed LightPath SECurity (LPSec), a secure cryptographic solution for [...] Read more.
Optical communications providing huge capacity and low latency remain vulnerable to a range of attacks. In consequence, encryption at the optical layer is needed to ensure secure data transmission. In our previous work, we proposed LightPath SECurity (LPSec), a secure cryptographic solution for optical transmission that leverages stream ciphers and Diffie–Hellman (DH) key exchange for high-speed optical encryption. Still, LPSec faces limitations related to key generation and key distribution. To address these limitations, in this paper, we rely on Quantum Random Number Generators (QRNG) and Quantum Key Distribution (QKD) networks. Specifically, we focus on three meaningful scenarios: In Scenario A, the two optical transponders (Tp) involved in the optical transmission are within the security perimeter of the QKD network. In Scenario B, only one Tp is within the QKD network, so keys are retrieved from a QRNG and distributed using LPSec. Finally, Scenario C extends Scenario B by employing Post-Quantum Cryptography (PQC) by implementing a Key Encapsulation Mechanism (KEM) to secure key exchanges. The scenarios are analyzed based on their security, efficiency, and applicability, demonstrating the potential of quantum-enhanced LPSec to provide secure, low-latency encryption for current optical communications. The experimental assessment, conducted on the Madrid Quantum Infrastructure, validates the feasibility of the proposed solutions. Full article
Show Figures

Figure 1

Back to TopTop