ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Security Analysis of the BB84 Protocol in IoT Networks

Journal: International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE) (Vol.13, No. 4)

Publication Date:

Authors : ;

Page : 169-174

Keywords : nternet of Things; Quantum Key Distribution; BB84 Protocol; Security Analysis; Cryptographic Key Generation;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The Internet of Things (IoT) has experienced rapid growth, resulting in a proliferation of interconnected devices in domains such as smart homes, cities, and healthcare applications. Ensuring secure communication within IoT networks is crucial for protecting privacy and data. The BB84 protocol, a quantum key distribution (QKD) protocol, shows promise in enhancing IoT communication security. This paper presents a comprehensive security analysis of the BB84 protocol in IoT networks, examining key aspects including entropy, execution time, quantum bit error rate (QBER), and cryptographic key generation efficiency. The analysis aims to evaluate the protocol's resilience against potential attacks and its suitability for securing IoT communications. We delve into the evaluation of entropy levels in the key generation process to ensure strong cryptographic properties. We also examine the correlation between execution time and QBER to determine the protocol's efficiency and ability to counter timing-based attacks. Additionally, we analyze the efficiency of the keys generated by the BB84 protocol, taking into consideration factors such as key size, generation rate, and computational overhead. These evaluations allow us to assess the protocol's suitability for resource-constrained IoT devices.

Last modified: 2024-08-18 01:12:01