Uploaded by Maryam Al hefaity

Quantum Cryptography for IoT Security

advertisement
Quantum Cryptography for IoT security
Maryam Alhefeiti
College of Engineer and computer Science
Abu Dhabi University
1079231@students.adu.ac.ae
Abstract—Internet of Things (IoT) is a new creation that our
world is tending to move towards. This invention will be part of
our lives and it is simply referring to more than billions of
physical devices around the world which are now connected to
the internet, and all of these devices are able to collect and share
data. Now some may ask; what type of physical objects can be
transformed into IoT device? Well, any device can be
transformed into IoT device if it can be connected to the Internet
to be controlled or if it is used to communicate and share
information. For example, If the lightbulb is controlled by
smartphone, then this is an IoT device. Even the IoT technology
tend to ease our life, on the other hand there are a lot of concerns
related to IoT security must be taking in considerable. For
example, data infringements, side-channel attacks and
authentication of viruses and data. The common classical
cryptographic algorithms may work well with the classical
computers like RSA (Rivest-Shamir-Adleman) algorithm,
however, since the new technology is shifting towards quantum
computing, that has immense processing power and is more than
enough to break the current cryptographic algorithms easily. For
that reason, there was a need for new robust cryptographic
algorithm which is Quantum Cryptography so that our systems
are prevented from violating safety even before supercomputers
are commercially available. The IoT will be the one of the areas
to ensure that malicious activity may be prevented. Equally
quantum computing, can pose as a threat to classical
cryptography due to its rapid computation speed and processing
power. Therefore, the need arises to design quantum-resistant
cryptographic algorithm which are considered protected even
when attacked by a quantum computer. Apart from traditional
cryptography which encrypts information to bits, quantum
encryption in turn utilizes qubits i.e., photons and photon
polarization to encode data
Index Terms—IoT, Quantum Cryptography, QKD, qubit
(Quantum bit)
I. INTRODUCTION
These days, computers provide us various kinds of services.
It makes our lives easier for so many chores. However, every
task they execute may also carry a security risk. Therefore, it is
crucial for us that our valuable and personal data are
completely secure
Sustainable computer security includes the use of
appropriate anticipatory measures, the detection of emerging
vulnerabilities, potential compulsive and endangered systems
and incidents of handling [1]. Due to the extensive usage of
internet, Wi-Fi, & Bluetooth, computer safety is becoming
Zarrin Hassain
College of Engineer and computer Science
Abu Dhabi University
1030496@students.adu.ac.ae
increasingly crucial. Misuse of a computer network, such as
Hacking, phishing, Computer viruses, worms or Trojans can
happen in various sorts. Damage to hardware, software or
technological data sources may also result from misuse. With
the advancement of technology, the Internet of Things is
indeed a new topic of interest that automates additional
processes and provides further data for users on the Internet.
For that the demand for security is raised [2].
Multi-technological
convergence,
machine-learning,
sensors of goods, wireless sensors, management systems,
automatics, all contribute to optional IoT. IoT consists of
expanding the website on the far side of common devices,
including desktops, laptops, phones and tablets, towards any
variation in physical equipment and daily things which were
historically unable to use the Internet. Incorporated with
technology, these gadgets communicate and move through the
net and may be watched and controlled remotely. IoT is
susceptible to several security attacks and violations due to
these ubiquitous applications. So, when designing or using IoT
applications we must be more attentive [3].
Digital applications and services are becoming the
mainstream in today's society in response to the rapid invention
of Computers and the Internet of Things (IoT) technology. This
trend makes it possible to transfer more data and information
via the Internet. Thus, complete encryption techniques are
provided to safeguard the confidentiality of the data and ensure
authentication between sender and receiver in the digital age. It
is a vital responsibility of cryptography to create secure
encrypted keys via untrusted networks. The session key for end
users/applications was related to theoretical security, however
existing public-key cryptography are based on computer
complicated mathematical challenges [2] (e.g. RSA or Diffie
Hellman public key protocol) that can deliver the session key
distributor. Therefore, the need arises to design quantumresistant cryptographic algorithm which will be presented in
the rest of this research paper [4].
The rest of this paper is organized as follows: Section 2
explains the background of Quantum computing. Section 3 lists
the security issues in IoT system. Section 4 identifying
different traditional security techniques. And section 5 explains
the Quantum node. In section 6 Quantum Cryptography is
shown. After that, the Quantum link is explained in section 7.
Quantum cryptography implementation with IoT is explained
in section 8. Section 9 is about QKD Network type. We
conclude our paper in section 10.
II. BACKGROUND
In quantum cryptography, the characteristics of
quantum mechanics have been utilized by Bennet and
Brassard [2] to create very first Quantum Keys Distribution
(QKD) method - the BB84 protocol – which used to
distribute session key for two end users. In addition, certain
investigations have found that the BB84 protocols is a
binding security protocol; that means, the BB84 session key
belongs to unconditionally security keys. Just a one-time
pad may comply with unconditional safety cyphers in
classical encryption.
Various QKD techniques were proposed in
accordance with the BB84 protocol. The semi-quantum
distributing key protocols and the independent
measurement instrument (MDI) QKD Key. These two keys
were presented to enhance the feasibility of QKD protocols
under present of quantum technologies. Various sorts of
quantum protocol for various applications have also been
suggested. For example, quantum secure direct interaction,
quantum secrecy (QSS), quantum comparison of private
use, and quantum information sharing [2]. However,
instead of existing public-key cryptographic systems in the
existing network environment, QKD protocols cannot
provide the service of key distribution as a core
infrastructure, due to limits of quantum computing (e.g., the
reachable distance of qubit transmission and the accuracy
of the qubit detector). Furthermore, due to the peculiarity of
quantum links & network organization, QKD protocols
could be incorporated instantly with the existing network
protocols.
The concept and structure of the QKD networks have
been developed to help the remote users and applications
distribution of security keys inside the existing network
environment, to solve the above-mentioned problem [5].
The QKD network extends the range of QKD
protocol and consists of numerous static quantum nodes
with full quantum capacity (e.g., one photon / punch state,
qubit storage and unit quantum operation). In order to
distribute safe key (also called local key) across
surrounding nodes, Quantum nodes run QKD (e.g., the
prototype BB84) and hop-by-hop is used to help remote
users and applications to transfer unconditional security
public key. The QKD network includes quantum nodes &
quantum connections, and the network framework can be
separated into 3 layers as it is illustrated in Figure 1. First,
the Data Communication layer, which is the top layer that
performs the routing operations and provides the API to
enable end users and applications to obtain secure QKD
protocol session keys. second, the medium layer is the main
managing layer which manages the key distributed energy
in the quantum layers to efficiently use the resources on
quantum devices. Last, the lower layer is the quantum
layer, it is an important management layer and a quantum
overlay. It consists of many quantum devices, but it
considered as an authorized classical public channel, also it
runs the QKD protocol to share local keys with nearby knot
[6].
Figure 1 QKD network layers
III. SECURITY ISSUES IN IOT SYSTEM
As discussed earlier there are a lot of security concerns
related to IoT system that must be taken in considerable. In this
section we focus on these several security problems associated
to IoT.
A. Intrusions of data
Tons of user’s data are collected by IoT applications to
make these application work properly. Some of these data,
maybe sensitive and personal like ID number, credit card
number or general information about where she/he lives.
Therefore, encryption must be protected.
B. Authentication of data
When data is encrypted correctly, the probability of the
system itself being hacked remains. If the validity of the data
transmitted to or from the IoT device is not determined, then
the security shall be granted [7].
C. Attacks on the side channel
Those attacks depend on the information and data gathered
from a system's implementation and not the flaws of the
implementation algorithm. A system can be exploited
sufficiently by its power consumption, electromagnetic leaks,
or sound [8].
D. Updates/No Irregular
In the next few years, IoT devices are anticipated to
increase in number. During device development, developers
typically do not consider future device upgrades, so a device
which is considered safe when made cannot remain secure after
two, three years if not continually updated [1].
E. Malware and rescue services
The Mirai Botnet, which contains IoT devices running on
the reduction of Argonaut instruction sets (ARC) CPUs, may
be a malware example. It is quite easy for Mirai - infect a
device if the default login and password combinations is not
updated for the device. Ransomware is malicious software
which tends to lock users from their devices and to threaten
users with their personal information until a ransom is paid
[1].
IV. TRADITIONAL SECURITY TECHNIQUES
There are several advantages and concerns associated with
IoT. Since the safety of all communications is a priority, this
section describes standard security methods for IoT.
A. Passwords hashed
Hashing is a typical method of encrypting device
passwords. Hash is an input string function which produces a
single and clarify objectives of bits. A technique called a
rainbow table can be used to crack the hash code. This is a
table with the hash key for the highly popular password strings,
which helps everyone search the password quickly. An entity
known as salt can prevent the reverse looking-up of the
rainbow table. It is a tiny random string attached to each and
every Hash key that is unique to each key [9]. To create a
rainbow table is a time consuming and costly process for such
long periods.
B. Authentication of the private key
The asymmetrical encryption of private keys gives two
keys, one public and one private. If data is encrypted using the
private key, only the public key can be decrypted, and vice
versa. This preserves the system's security and improves
connection with other devices. This can be beneficial for
connecting a new device to the IoT system and verifying
messages across systems [10].
C. Firmware signed
The developer makes a secret digital certificate during the
production of the firmware, which prevents hackers from
changing the actual version with a Malicious firmware, as
verified signatures are not replicated. A secure boot mechanism
is also used to check whether any code running on this device
is properly signed. All these aforementioned strategies in real
life systems owing to resource restrictions cannot be achieved
very effectively. A limited quantity of memory and processing
power is a huge obstacle for developers. These solutions are
theoretically flawless, yet we may nevertheless detect security
violations in IoT devices in a variety of instances [11]. Some
Examples of harmful assaults are as follow:
• Botnet or assault by Dyn Mirai.
• Hackable St. Jude cardiac surveillance devices.
• Vulnerabilities for the Wi-Fi Baby Monitor.
• The webcam of TREND.
• Stuxnet.
In order to avoid the above-mentioned risks, we clearly
need more effective cryptographic and security techniques.
V. QUANTUM NODE
A quantum node has various devices needed to run the
QKD technique, including qubit producers, qubit measuring
equipment and qubit memory. Quantum device technologies
and types rely on the QKD protocol kinds (E.g., QKD or
continuous QKD based on variable disclosures) [7].
Quantum nodes according to the functionality of the
quantum node may be divided into three categories:
a) The node of repeat.
b) The node of access.
c) Central hub of control.
The repeater node helps others to send session-key packets
via an appropriate routing path, with the primary feature of the
accessing node being the API, whereby end-users/applications
access the session-key(s) [6]. The central control knot is the
routing server that manages the whole root node of the QKD
network on a given QKD network (i.e. the client-server
architecture).
Moreover, because key generation rate & key demand for
services are dynamic, a balance between both the key supply
side cannot be maintained at all times. Thus, a buffer (called
key storage) must require the quantum node to store local keys
to increase the dynamic environment tolerance in a QKD
network. It is a crucial duty to protect local keys in key storage.
A relevant key management method for managing and
protecting key production, storage and use in key storage has
therefore to be implemented [9].
VI. QUANTUM CRYPTOGRAPHY
Quantum cryptography is really a highly exciting area,
using quantum mechanical concepts to construct the most
secure cryptosystem. No one can break it, without the
transmitter or the recipient of the message being noticed.
Quantum crypto graphing is based on photons and their
essential quantum features for developing an indestructible
cryptosystem, as without disturbing the system it is not
important to identify the quantum state of every system.
Nowadays, cryptography is used to construct efficient
cryptosystems based on mathematical concepts. The 'key' is a
combination of a wide range of prime factors, created using
random numbers as one example of a mathematical
cryptography procedure.
The cracking of those keys may have been a difficult task,
but it is not impossible with a conventional computer. Thus,
researchers have moved from mathematics to physics and have
tried to design systems that will replace the systems that are
currently employed. Quantum mechanics are thought to be
100% un-hackable and safe to send/receive messages [12].
The foundation of quantum cryptography is that it exploits
the smallest single particles in nature. Photons have the trait of
existing in more than one state simultaneously and only alter
their conditions when measured. This is the principal property
used by quantum algorithms. Whenever a message passes from
the sender to the recipient via the channel, and every malicious
entity attempts to intercept the communication, the
sender/receiver immediately sees a change in photon status.
There is also a version of a strategy that uses a phenomenon
called quantum interplay [13].
Quantum enclosure is a trait in which a change of one
photon leads to a change in another, even if 2 quantum
particles/photons are divided by a physical distance, so that the
intruder in a network may simply be detected [10].
communication distance performance and the key generation
rate remains an important research problem for QKD networks
[7].
In general, the use of fiber channels to create a QKD
network can improve the performance of communication
distance or key generation rates as compared to empty space.
Nevertheless, expenses are still high (including expenditures of
a precise single photon detector and specialized fiber).
VIII. QUANTUM CRYPTOGRAPHY IMPLEMENTATION WITH IOT
VII. QUANTUM LINK
A quantum link between two remote QKD nodes consists
of a quantum channel, or a classical authenticated public
connection as shown in Figure 2. The quantum channel is used
to transmit qubits while the public channel utilized for the post
processing of QKD protocol information by the traditional
channel and traditional cryptographic technologies (i.e.,
universal hash function) [11].
Figure 2 Channels of quantum link
There are two basic strategies for implementing quantum
channels in practical ways: first is direct optical fibers and the
second one is free point-to-point view (P2P) systems. In many
cases it is not possible to implement QKD protocols using
dedicated fibers, despite the widespread use of optical fibers
for transferring qubits.
A free space connection is occasionally convenient even
though it has some disadvantages, such as adequate air
conditions, a visible light route, and an acceptable signal-tonoise ratio. It should be noted that the viability of the
transmission of quantum and classical information across
shared optically fibers, namely that the quantum nodes can
transmit based on quantum information using the same optical
fiber, has been proven [8]. The technique could greatly
minimize the cost of installing new fiber connections from the
deployment viewpoint.
Different quantum channel types also relate to various
QKD protocol types. In other words, the fiber channel usually
includes discrete, variable QKD based protocols whereas the
free space links are used for the continuous variable QKD
protocols.
The distance and the key rate of generation are the essential
issues for the implementation of quantum connections. While
the key generation rate is reduced exponentially by the increase
in the known communication distance, improving both the
IoT system have several security flaws related to users,
devices, and networks. There are no provisions for the
detection of eavesdroppers on the channel in the existing art
and architecture of the IoT. The IoT network can also be
attacked when just one device in the network is infected by a
virus and another device is trusted by that infected device. The
failure can only be recognized late, and plentiful amount of
data can then be passed on to any malicious actor. Some
viruses can harm the systems in such a way that they can be
destroyed only through rebooting and the manufacturing and
commercial systems are not restarted very often [14].
The Internet of Things is particularly vulnerable to attacks
due to its many vulnerability areas. Our purpose here is to
examine a possible quantum encryption solution for IoT
security. The quantum key distribution, mentioned above, is a
very fundamental feature of quantum cryptography. The
channel's ability to detect the existence of eavesdropper in the
system design is the best characteristic in a quantum key
distribution. It contrasts sharply with standard cryptography
algorithms [15].
The quantum cryptography prototype BB84 varies severally,
but the principal difficulty in physical execution is the greatest
distance which photons can travel. In essence, photons are light
particles and can be distorted by natural or environmental
disasters. In circumstances where IoT networks are broad and
include numerous towns and nations, the photons have to travel
a really long distance. Quantum computing does not do this
here. Quantum devices are also exceedingly large,
cumbersome, and costly so not each organization cannot afford
this. The existing protocol for the quantum key distribution
works with only 2 devices. This is not theoretically possible in
a real IoT system that connects thousands of devices to interact
[13].
IX. QKD NETWORK TYPE
Regarding the type of QKD network, there are three classes
of QKD network based on the experiments and research papers
currently available which are [11]:
a) Active networks of optical switches.
b) Networks of trusted nodes
c) Networks for Quantum Replay
Here, it is possible to establish a convenient QKD Network
using hybrid network types, rather than a single type. For
instance, a fiber sensor switches and the trusted QKD Network
could be applied to form a QKD network. The following lines
will give a brief about each QKD network type.
A. Active Optical Switch network
An active optical switching technique is used to construct a
direct optical P2P-quantum channel among two quantum nodes
in the optical sensing switch network. The switching technique
allows for a clear relationship and perform the QKD protocol
using two quantum nodes without the assistance of other
nodes, but there are two problems with this framework which
are:
• The communication distance of a QKD network is still
limited by the maximum communications distance
between the two quantum nodes.
• The application may be limited by all quantum
technologies used on the network.
However, the challenges of implementation of the physical
layer active optical switch still impact the effectiveness of
qubit communications. The active optical switch, for example,
causes additional photon losses and reduces the quantum
channel maximum distance. An optical sensing switch with
limited risk and noise and without disrupting the state of qubits
is therefore a key issue [16].
[6]
[7]
[8]
[9]
[10]
[11]
[12]
X. CONCLUSION
Finally, it has been decided that, although computer
technology and quantum cryptography have grown very
effectively, progress needs to be made in the business systems.
Several algorithms are an enhanced version, such as the
consistent one-way quantum key algorithm (COW), which
aims to correct the inconvinces of the first quantum key
method [8]. But the practical implementation of quantum
systems for IoT is a huge barrier because of the large-scale and
costly quantum appliances not available by each company.
Furthermore, the distance between quantum communications is
much lower because of the qualities of photons that restrict
them to lengthy distances. If these questions are addressed, we
can apply quantum cryptography to successful IoT systems that
make them to the day the safest systems [17].
[13]
[14]
[15]
[16]
XI. REFERENCES
[17]
[1]
[2]
[3]
[4]
[5]
V. K. a. M. K. a. I. P. a. N. Bardis, "Reliability and Security
Issues for IoT-based Smart Business Center: Architecture and
Markov Model," 2016 Third International Conference on
Mathematics and Computers in Sciences and in Industry
(MCSI), pp. 313-318, 2016.
I. a. G. M. a. H. S. a. K. B.-S. a. K. K. M. a. A. M. a. A. S. H.
Ud Din, "The Internet of Things: A Review of Enabled
Technologies and Future Challenges," vol. 7, no.
10.1109/ACCESS.2018.2886601, pp. 7606-7640, 2019.
Symantic, "Internet Security Threat Report," no. 04/16
21365088, 2016.
J. Stankovic, "Research Directions for the Internet of Things,"
no. 10.1109/JIOT.2014.2312291, 2019.
T.-Q. Z. X.-C. C. J. L. a. W. S. J. Shen, "Anonymous and
Traceable Group Data Sharing in Cloud Computing," IEEE
TRANSACTIONS ON INFORMATION FORENSICS AND
SECURITY, vol. 13, pp. 912-925, 2018.
R. P. Feynman, "Simulating physics with computers,"
International Journal of Theoretical Physics, vol. 21, no.
10.1007/BF02650179, pp. 467-488, 1982.
D. a. H.-K. L. Gottesman, "Proof of security of quantum key
distribution with two-way classical communications," IEEE
Transactions on Information Theory, vol. 49, no.
10.1109/TIT.2002.807289, pp. 457-475, 2003.
S. p. f. q.-k.-d. s. w. t. detectors, "Security proof for quantumkey-distribution systems with threshold detectors," Phys. Rev.
A, vol. 78, no. 3, p. 032302, 2008.
A. B. a. A. E. David Elieser Deutsch, "Universality in quantum
computation," Proc. of the Royal Society A: Mathematical and
Physical Sciences, vol. 449, no. 1937, pp. 669-677, 1995.
M. B. A. K. a. N. G. Nicolas J. Cerf, "Security of Quantum Key
Distribution Using d-level systems," Phys. Rev. Lett, vol. 88,
no. 12, p. 127902, 2002.
Y. a. W. L. a. Y. G. a. L. L. a. Z. H. Yang, "A Survey on
Security and Privacy Issues in Internet-of-Things," IEEE
Internet of Things Journal, vol. pp, no.
10.1109/JIOT.2017.2694844, pp. 1-1, 2017.
G. L. L. a. X. S. Liu, "Theoretically efficient high-capacity
quantum-key-distribution scheme," Phys. Rev. A, vol. 65, no.
10.1103/PhysRevA.65.032302, p. 032302, 2002.
G. B. Charles H. Bennett, "Quantum Cryptography: Public Key
Distribution and Coin Tossing. In Proceedings of the IEEE
International Conference on Computers, Systems and Signal
Processing.," Theoretical Computer Science, vol. 1, no.
10.1016/j.tcs.2014.05.025, p. 175–179, 1984.
y. J. Kelleher, "Will Enterprise Prioritize IoT Security Over
Innovation in 2019?," 11 February 2019. [Online]. Available:
https://www.veridify.com/will-enterprise-prioritize-iot-securityover-innovation-in-2019/.
G. V. A. J. W. R. B. N. J. C. P. G. F.Grosshans, "Quantum key
distribution using gaussian-modulated coherent states," Nature
(London) 421, 238 (2003), vol. 1, no. 10.1038/nature01289, p.
8, 2003.
C. H. a. B. G. a. M. N. D. Bennett, "Quantum cryptography
without Bell's theorem," Phys. Rev. Lett., vol. 68, no.
10.1103/PhysRevLett.68.557, pp. 557--559, 1992.
W.-Y. Hwang*, "Quantum Key Distribution with High Loss:
Toward Global Secure Communication," vol. 91, no.
10.1103/PhysRevLett.91.057901, 2003.
Download