Abstract
The Internet of Things (IoT) has experienced rapid growth, resulting in a proliferation of interconnected devices in domains such as smart homes, cities, and healthcare applications. Ensuring secure communication within IoT networks is crucial for protecting privacy and data. The BB84 protocol, a quantum key distribution (QKD) protocol, shows promise in enhancing IoT communication security. This paper presents a comprehensive security analysis of the BB84 protocol in IoT networks, examining key aspects including entropy, execution time, quantum bit error rate (QBER), and cryptographic key generation efficiency. The analysis aims to evaluate the protocol's resilience against potential attacks and its suitability for securing IoT communications. We delve into the evaluation of entropy levels in the key generation process to ensure strong cryptographic properties. We also examine the correlation between execution time and QBER to determine the protocol's efficiency and ability to counter timing-based attacks. Additionally, we analyze the efficiency of the keys generated by the BB84 protocol, taking into consideration factors such as key size, generation rate, and computational overhead. These evaluations allow us to assess the protocol's suitability for resource-constrained IoT devices
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Trends in Computer Science and Engineering
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.