• English
    • العربية
  • العربية
  • Login
  • QU
  • QU Library
  •  Home
  • Communities & Collections
  • Help
    • Item Submission
    • Publisher policies
    • User guides
    • FAQs
  • About QSpace
    • Vision & Mission
View Item 
  •   Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Engineering
  • Computer Science & Engineering
  • View Item
  • Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Engineering
  • Computer Science & Engineering
  • View Item
  •      
  •  
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    On the Use of Quantum Communications for Securing IoT Devices in the 6G Era

    View/Open
    On_The_Use_of_Quantum_Communications_for_Securing_IoT_Devices_in_the_6G_Era.pdf (874.3Kb)
    Date
    2021-06
    Author
    Al-Mohammed, Hasan Abbas
    Yaacoub, Elias
    Metadata
    Show full item record
    Abstract
    The Internet of Things (IoT) connects billions of machines that can interact with each other. IoT is one of the fastest-growing areas in the history of computing, and will continue in this direction in the 6G era. New security problems have been raised, however, since implementing protection mechanisms for IoT devices, such as encryption, authentication, and so on, is inefficient, due to their inherent flaws. Therefore, a new method of protecting IoT devices needs to be sought. Quantum security depends on the natural physical phenomenon (quantum mechanics) and offers an appropriate and powerful security technique. This paper suggests a new approach for simulating the quantum key distribution between IoT devices and a server to encrypt the data sent to the server. It also demonstrates the simplicity of this new method, and its efficiency in producing a quantum key distribution (QKD) simulation. In addition, it describes the use of the final length key for symmetrical security for IoT devices. Moreover, the simulation of the attacker between the server and IoT devices is performed.
    URI
    https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85112812313&origin=inward
    DOI/handle
    http://dx.doi.org/10.1109/ICCWorkshops50388.2021.9473793
    http://hdl.handle.net/10576/60323
    Collections
    • Computer Science & Engineering [‎2428‎ items ]

    entitlement


    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Home

    Submit your QU affiliated work

    Browse

    All of Digital Hub
      Communities & Collections Publication Date Author Title Subject Type Language Publisher
    This Collection
      Publication Date Author Title Subject Type Language Publisher

    My Account

    Login

    Statistics

    View Usage Statistics

    About QSpace

    Vision & Mission

    Help

    Item Submission Publisher policiesUser guides FAQs

    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Video