مشخصات مقاله | |
ترجمه عنوان مقاله | یک بررسی جامع از جنبه های رمزنگاری برجسته برای امنیت ارتباط در شبکه های IoT پس از کوانتومی |
عنوان انگلیسی مقاله | A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum IoT networks |
انتشار | مقاله سال 2020 |
تعداد صفحات مقاله انگلیسی | 23 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه الزویر |
نوع نگارش مقاله |
مقاله مروری (Review Article) |
مقاله بیس | این مقاله بیس نمیباشد |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
شناسه ISSN | 2542-6605 |
مدل مفهومی | ندارد |
پرسشنامه | ندارد |
متغیر | ندارد |
رفرنس | دارد |
رشته های مرتبط | مهنذسی کامپیوتر، مهندسی فناوری اطلاعات |
گرایش های مرتبط | امنیت اطلاعات، اینترنت و شبکه های گسترده |
نوع ارائه مقاله |
ژورنال |
مجله | اینترنت اشیا – Internet of Things |
دانشگاه | University Institute of Engineering and Technology, Kurukshetra University, India |
کلمات کلیدی | اینترنت اشیا، امنیت، رمزنگاری، توزیع کلید کوانتومی، رمزنگاری پس از کوانتومی |
کلمات کلیدی انگلیسی | Internet of things، Security، Cryptography، Quantum key distribution، Post-quantum cryptography |
شناسه دیجیتال – doi |
https://doi.org/10.1016/j.iot.2020.100174 |
کد محصول | E14641 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract 1. Introduction 2. Background, statistics, and motivation 3. IOT architectural challenges, security attacks, and countermeasures 4. Conventional cryptograhphic mechanisms for IOT security 5. Quantum cryptography 6. Open challenges and future research directions 7. Conclusion Declaration of Competing Interest References |
بخشی از متن مقاله: |
Abstract
Internet of Things (IoT) ideates smart and inter-connected things capable of sharing their perceptions through the Internet. These devices are different from conventional Internetconnected devices in the sense that these are able to perform skill-full things on their own with minimal or no human interaction. Unfortunately, with the advent of amalgamate technologies, security has become a major concern for IoT networks. Recent efforts include re-inventing cryptographic solutions through the use of light-weight operations. However, after witnessing the growth of quantum computers, it can be inferred that the cryptographic techniques based on mathematical problems are not reliable enough. Therefore, there is need to develop solutions that can easily resist the adversarial effects and are suitable for the post-quantum world. In this paper, we perform in-depth analysis over the role of post-quantum cryptographic techniques for securing IoT networks and also explore ongoing research efforts in the field. In addition, we discuss the open research challenges and future research directions in the field. Introduction Internet of Things (IoT) is a cluster of technologies that requires different set of protocols, infrastructures, data storage mechanisms, and ways of communication associated with Information Technology (IT). Resource allocation in a smart manner is one of the key requirements while dealing with IoT devices as they are constrained in terms of energy, storage and computational resources. Communication technology for actuating and managing the data is also of great concern [1–3]. As a matter of fact, IoT ecosystem faces a lot of challenges associated with a number of aspects as shown in Fig. 1. This new paradigm of connected objects needs an assimilation of next generation technologies. In order to simultaneously provide ultra-reliability of communication, following technologies can be integrated – • Software Defined Networks (SDN) for managing haptic communications, • 5G technology for providing tactile Internet, and • The new era of distributed Cloud computing, i.e., edge computing for managing the resources. Significant increase in the use of IoT devices is bringing numerous business opportunities. However, manufacturers are still unable to ensure their customers that these devices are secure. Hence, despite all of the advantages, the security issues of these devices are acting as a huge rock in the way of letting this paradigm making a colossal impact on our lives. |