Abstract
The Internet of Things (IoT) has experienced rapid growth, resulting in a proliferation of interconnected devices in domains such as smart homes, cities, and healthcare applications. Ensuring secure communication within IoT networks is crucial for protecting privacy and data. The BB84 protocol, a quantum key distribution (QKD) protocol, shows promise in enhancing IoT communication security. This paper presents a comprehensive security analysis of the BB84 protocol in IoT networks, examining key aspects including entropy, execution time, quantum bit error rate (QBER), and cryptographic key generation efficiency. The analysis aims to evaluate the protocol's resilience against potential attacks and its suitability for securing IoT communications. We delve into the evaluation of entropy levels in the key generation process to ensure strong cryptographic properties. We also examine the correlation between execution time and QBER to determine the protocol's efficiency and ability to counter timing-based attacks. Additionally, we analyze the efficiency of the keys generated by the BB84 protocol, taking into consideration factors such as key size, generation rate, and computational overhead. These evaluations allow us to assess the protocol's suitability for resource-constrained IoT devices
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have