A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks

The industry-based internet of things (IIoT) describes how IIoT devices enhance and extend their capabilities for production amenities, security, and efficacy. IIoT establishes an enterprise-to-enterprise setup that means industries have several factories and manufacturing units that are dependent o...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Sensors (Basel, Switzerland) Ročník 22; číslo 18; s. 6741
Hlavní autori: Singamaneni, Kranthi Kumar, Dhiman, Gaurav, Juneja, Sapna, Muhammad, Ghulam, AlQahtani, Salman A., Zaki, John
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Basel MDPI AG 01.09.2022
MDPI
Predmet:
ISSN:1424-8220, 1424-8220
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract The industry-based internet of things (IIoT) describes how IIoT devices enhance and extend their capabilities for production amenities, security, and efficacy. IIoT establishes an enterprise-to-enterprise setup that means industries have several factories and manufacturing units that are dependent on other sectors for their services and products. In this context, individual industries need to share their information with other external sectors in a shared environment which may not be secure. The capability to examine and inspect such large-scale information and perform analytical protection over the large volumes of personal and organizational information demands authentication and confidentiality so that the total data are not endangered after illegal access by hackers and other unauthorized persons. In parallel, these large volumes of confidential industrial data need to be processed within reasonable time for effective deliverables. Currently, there are many mathematical-based symmetric and asymmetric key cryptographic approaches and identity- and attribute-based public key cryptographic approaches that exist to address the abovementioned concerns and limitations such as computational overheads and taking more time for crucial generation as part of the encipherment and decipherment process for large-scale data privacy and security. In addition, the required key for the encipherment and decipherment process may be generated by a third party which may be compromised and lead to man-in-the-middle attacks, brute force attacks, etc. In parallel, there are some other quantum key distribution approaches available to produce keys for the encipherment and decipherment process without the need for a third party. However, there are still some attacks such as photon number splitting attacks and faked state attacks that may be possible with these existing QKD approaches. The primary motivation of our work is to address and avoid such abovementioned existing problems with better and optimal computational overhead for key generation, encipherment, and the decipherment process compared to the existing conventional models. To overcome the existing problems, we proposed a novel dynamic quantum key distribution (QKD) algorithm for critical public infrastructure, which will secure all cyber–physical systems as part of IIoT. In this paper, we used novel multi-state qubit representation to support enhanced dynamic, chaotic quantum key generation with high efficiency and low computational overhead. Our proposed QKD algorithm can create a chaotic set of qubits that act as a part of session-wise dynamic keys used to encipher the IIoT-based large scales of information for secure communication and distribution of sensitive information.
AbstractList The industry-based internet of things (IIoT) describes how IIoT devices enhance and extend their capabilities for production amenities, security, and efficacy. IIoT establishes an enterprise-to-enterprise setup that means industries have several factories and manufacturing units that are dependent on other sectors for their services and products. In this context, individual industries need to share their information with other external sectors in a shared environment which may not be secure. The capability to examine and inspect such large-scale information and perform analytical protection over the large volumes of personal and organizational information demands authentication and confidentiality so that the total data are not endangered after illegal access by hackers and other unauthorized persons. In parallel, these large volumes of confidential industrial data need to be processed within reasonable time for effective deliverables. Currently, there are many mathematical-based symmetric and asymmetric key cryptographic approaches and identity- and attribute-based public key cryptographic approaches that exist to address the abovementioned concerns and limitations such as computational overheads and taking more time for crucial generation as part of the encipherment and decipherment process for large-scale data privacy and security. In addition, the required key for the encipherment and decipherment process may be generated by a third party which may be compromised and lead to man-in-the-middle attacks, brute force attacks, etc. In parallel, there are some other quantum key distribution approaches available to produce keys for the encipherment and decipherment process without the need for a third party. However, there are still some attacks such as photon number splitting attacks and faked state attacks that may be possible with these existing QKD approaches. The primary motivation of our work is to address and avoid such abovementioned existing problems with better and optimal computational overhead for key generation, encipherment, and the decipherment process compared to the existing conventional models. To overcome the existing problems, we proposed a novel dynamic quantum key distribution (QKD) algorithm for critical public infrastructure, which will secure all cyber-physical systems as part of IIoT. In this paper, we used novel multi-state qubit representation to support enhanced dynamic, chaotic quantum key generation with high efficiency and low computational overhead. Our proposed QKD algorithm can create a chaotic set of qubits that act as a part of session-wise dynamic keys used to encipher the IIoT-based large scales of information for secure communication and distribution of sensitive information.The industry-based internet of things (IIoT) describes how IIoT devices enhance and extend their capabilities for production amenities, security, and efficacy. IIoT establishes an enterprise-to-enterprise setup that means industries have several factories and manufacturing units that are dependent on other sectors for their services and products. In this context, individual industries need to share their information with other external sectors in a shared environment which may not be secure. The capability to examine and inspect such large-scale information and perform analytical protection over the large volumes of personal and organizational information demands authentication and confidentiality so that the total data are not endangered after illegal access by hackers and other unauthorized persons. In parallel, these large volumes of confidential industrial data need to be processed within reasonable time for effective deliverables. Currently, there are many mathematical-based symmetric and asymmetric key cryptographic approaches and identity- and attribute-based public key cryptographic approaches that exist to address the abovementioned concerns and limitations such as computational overheads and taking more time for crucial generation as part of the encipherment and decipherment process for large-scale data privacy and security. In addition, the required key for the encipherment and decipherment process may be generated by a third party which may be compromised and lead to man-in-the-middle attacks, brute force attacks, etc. In parallel, there are some other quantum key distribution approaches available to produce keys for the encipherment and decipherment process without the need for a third party. However, there are still some attacks such as photon number splitting attacks and faked state attacks that may be possible with these existing QKD approaches. The primary motivation of our work is to address and avoid such abovementioned existing problems with better and optimal computational overhead for key generation, encipherment, and the decipherment process compared to the existing conventional models. To overcome the existing problems, we proposed a novel dynamic quantum key distribution (QKD) algorithm for critical public infrastructure, which will secure all cyber-physical systems as part of IIoT. In this paper, we used novel multi-state qubit representation to support enhanced dynamic, chaotic quantum key generation with high efficiency and low computational overhead. Our proposed QKD algorithm can create a chaotic set of qubits that act as a part of session-wise dynamic keys used to encipher the IIoT-based large scales of information for secure communication and distribution of sensitive information.
The industry-based internet of things (IIoT) describes how IIoT devices enhance and extend their capabilities for production amenities, security, and efficacy. IIoT establishes an enterprise-to-enterprise setup that means industries have several factories and manufacturing units that are dependent on other sectors for their services and products. In this context, individual industries need to share their information with other external sectors in a shared environment which may not be secure. The capability to examine and inspect such large-scale information and perform analytical protection over the large volumes of personal and organizational information demands authentication and confidentiality so that the total data are not endangered after illegal access by hackers and other unauthorized persons. In parallel, these large volumes of confidential industrial data need to be processed within reasonable time for effective deliverables. Currently, there are many mathematical-based symmetric and asymmetric key cryptographic approaches and identity- and attribute-based public key cryptographic approaches that exist to address the abovementioned concerns and limitations such as computational overheads and taking more time for crucial generation as part of the encipherment and decipherment process for large-scale data privacy and security. In addition, the required key for the encipherment and decipherment process may be generated by a third party which may be compromised and lead to man-in-the-middle attacks, brute force attacks, etc. In parallel, there are some other quantum key distribution approaches available to produce keys for the encipherment and decipherment process without the need for a third party. However, there are still some attacks such as photon number splitting attacks and faked state attacks that may be possible with these existing QKD approaches. The primary motivation of our work is to address and avoid such abovementioned existing problems with better and optimal computational overhead for key generation, encipherment, and the decipherment process compared to the existing conventional models. To overcome the existing problems, we proposed a novel dynamic quantum key distribution (QKD) algorithm for critical public infrastructure, which will secure all cyber–physical systems as part of IIoT. In this paper, we used novel multi-state qubit representation to support enhanced dynamic, chaotic quantum key generation with high efficiency and low computational overhead. Our proposed QKD algorithm can create a chaotic set of qubits that act as a part of session-wise dynamic keys used to encipher the IIoT-based large scales of information for secure communication and distribution of sensitive information.
Audience Academic
Author Muhammad, Ghulam
Dhiman, Gaurav
AlQahtani, Salman A.
Singamaneni, Kranthi Kumar
Zaki, John
Juneja, Sapna
AuthorAffiliation 3 University Centre for Research and Development, Department of Computer Science and Engineering, Chandigarh University, Gharuan, Mohali 140413, Punjab, India
7 Computer Engineering Department, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia
8 Department of Computer and Systems, Faculty of Engineering, Mansoura University, Mansoura 35516, Egypt
2 Department of Electrical and Computer Engineering, Lebanese American University, Beirut 1102 2801, Lebanon
4 Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun 248002, Uttarakhand, India
1 Department of Computer Science and Engineering, School of Technology, GITAM Deemed to be University, Visakhapatnam 530045, Andhra Pradesh, India
5 KIET Group of Institutions, Delhi NCR, Ghaziabad 201206, Uttar Pradesh, India
6 Research Chair of New Emerging Technologies and 5G Networks and Beyond, Computer Engineering Department, College of Computer and Information Sciences, K
AuthorAffiliation_xml – name: 3 University Centre for Research and Development, Department of Computer Science and Engineering, Chandigarh University, Gharuan, Mohali 140413, Punjab, India
– name: 1 Department of Computer Science and Engineering, School of Technology, GITAM Deemed to be University, Visakhapatnam 530045, Andhra Pradesh, India
– name: 7 Computer Engineering Department, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia
– name: 2 Department of Electrical and Computer Engineering, Lebanese American University, Beirut 1102 2801, Lebanon
– name: 6 Research Chair of New Emerging Technologies and 5G Networks and Beyond, Computer Engineering Department, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia
– name: 4 Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun 248002, Uttarakhand, India
– name: 5 KIET Group of Institutions, Delhi NCR, Ghaziabad 201206, Uttar Pradesh, India
– name: 8 Department of Computer and Systems, Faculty of Engineering, Mansoura University, Mansoura 35516, Egypt
Author_xml – sequence: 1
  givenname: Kranthi Kumar
  orcidid: 0000-0002-8643-9246
  surname: Singamaneni
  fullname: Singamaneni, Kranthi Kumar
– sequence: 2
  givenname: Gaurav
  orcidid: 0000-0002-6343-5197
  surname: Dhiman
  fullname: Dhiman, Gaurav
– sequence: 3
  givenname: Sapna
  orcidid: 0000-0003-4601-7679
  surname: Juneja
  fullname: Juneja, Sapna
– sequence: 4
  givenname: Ghulam
  orcidid: 0000-0002-9781-3969
  surname: Muhammad
  fullname: Muhammad, Ghulam
– sequence: 5
  givenname: Salman A.
  orcidid: 0000-0003-1233-1774
  surname: AlQahtani
  fullname: AlQahtani, Salman A.
– sequence: 6
  givenname: John
  orcidid: 0000-0002-2192-6852
  surname: Zaki
  fullname: Zaki, John
BookMark eNptkk1v2zAMhoWhw_qxHfYPDOyyHdLqy5Z0GRBkWRu0WDegOwu0LCXKbMmVnQD991PjoliLQQcJ5MuHpMhTdBRisAh9JPicMYUvBkqJrAQnb9AJ4ZTPJKX46J_3MTodhi3GlDEm36FjVhFeYalO0HJe_Ih72xa_rr8V875PEcymGGOxDBsIxhar1e1d8TP5PZiHAkJTLGLX70YYfQzQFtcBzJ_hPXrroB3sh6f7DP3-vrxbXM1ubi9Xi_nNzHBZjjNHiXLWVQ0V2NVU1CBYQ61Vpq6Ykrx2gGshiCQgiJGN4MxYRQRRtVK4VOwMrSZuE2Gr--Q7SA86gtcHQ0xrDWn0prVaVZYrxixIUXJMLTAqmWuwA2N5KWRmfZ1Y_a7ubGNsGBO0L6AvPcFv9DrutSpx7oZmwOcnQIr3OzuMuvODsW0LwcbdoKkgopIC4zJLP72SbuMu5f87qKpSclY9As8n1RpyAz64mPOafBrbeZNH7ny2zwWvSkbJoYIvU4BJcRiSdc_VE6wfN0M_b0bWXrzSGj9NMSfx7X8i_gIpw7e-
CitedBy_id crossref_primary_10_1109_TII_2023_3326544
crossref_primary_10_3390_electronics11213510
crossref_primary_10_1080_07391102_2023_2226215
crossref_primary_10_3389_fenrg_2022_1090033
crossref_primary_10_1007_s00500_023_09166_w
crossref_primary_10_3389_fevo_2023_1122682
crossref_primary_10_1108_IMDS_06_2024_0605
crossref_primary_10_1080_07391102_2023_2203257
crossref_primary_10_1109_JIOT_2023_3346397
crossref_primary_10_1109_TCE_2023_3331306
crossref_primary_10_1007_s10586_024_04586_1
crossref_primary_10_1007_s42235_023_00394_2
crossref_primary_10_1016_j_comnet_2023_109844
crossref_primary_10_1007_s11518_024_5607_y
crossref_primary_10_1109_TII_2023_3299385
crossref_primary_10_1109_TII_2024_3424508
crossref_primary_10_1007_s11042_023_17863_9
crossref_primary_10_1007_s11042_024_19431_1
crossref_primary_10_1016_j_cma_2023_116307
crossref_primary_10_1016_j_comnet_2024_110401
crossref_primary_10_1109_TII_2024_3379643
crossref_primary_10_1007_s00500_022_07697_2
crossref_primary_10_1109_TII_2023_3268749
crossref_primary_10_3389_fncom_2022_1090301
crossref_primary_10_1007_s11042_023_16922_5
crossref_primary_10_1080_07391102_2023_2298736
crossref_primary_10_1016_j_engappai_2023_106697
crossref_primary_10_1007_s00500_023_09174_w
crossref_primary_10_3389_fimmu_2023_1141996
crossref_primary_10_1109_TCE_2024_3349490
crossref_primary_10_3390_electronics12030714
crossref_primary_10_3390_electronics13214153
crossref_primary_10_1109_TCE_2024_3413768
crossref_primary_10_1051_e3sconf_202343001073
crossref_primary_10_1109_JIOT_2025_3551679
crossref_primary_10_3390_economies11030090
Cites_doi 10.1166/jctn.2019.7985
10.1007/s00521-021-06352-5
10.1080/03772063.2021.1982418
10.1109/TII.2021.3084753
10.1016/j.future.2018.02.040
10.1103/PhysRevLett.68.3121
10.1103/RevModPhys.81.1301
10.1142/S0219749908003256
10.1109/ICWT.2018.8527822
10.1103/PhysRevLett.77.2585
10.1109/JIOT.2020.3047662
10.1145/367701.367709
10.1016/j.future.2014.10.010
10.3390/su14137961
10.1155/2022/8927830
10.1080/03772063.2022.2043788
10.1016/j.comcom.2022.06.032
10.1109/JIOT.2018.2878707
10.1109/QCE52317.2021.00084
10.1109/ACCESS.2020.3016937
10.1155/2022/4206000
10.1007/s11082-022-03880-9
10.1103/PhysRevLett.85.441
10.1103/RevModPhys.74.145
10.1080/03772063.2022.2038288
10.1016/j.inffus.2021.06.007
10.1109/MWC.015.2100177
10.1155/2021/4912486
10.1109/MCE.2021.3089880
10.1016/j.ipm.2021.102736
10.3390/s21217300
10.1109/GCAT52182.2021.9587708
10.1108/WJE-04-2021-0195
10.1109/TNSE.2022.3177748
10.3390/fi14030073
10.1038/srep42261
10.3166/isi.23.5.213-222
10.1155/2021/8106467
ContentType Journal Article
Copyright COPYRIGHT 2022 MDPI AG
2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
2022 by the authors. 2022
Copyright_xml – notice: COPYRIGHT 2022 MDPI AG
– notice: 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: 2022 by the authors. 2022
DBID AAYXX
CITATION
3V.
7X7
7XB
88E
8FI
8FJ
8FK
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
COVID
DWQXO
FYUFA
GHDGH
K9.
M0S
M1P
PHGZM
PHGZT
PIMPY
PJZUB
PKEHL
PPXIY
PQEST
PQQKQ
PQUKI
PRINS
7X8
5PM
DOA
DOI 10.3390/s22186741
DatabaseName CrossRef
ProQuest Central (Corporate)
ProQuest Health & Medical Collection
ProQuest Central (purchase pre-March 2016)
Medical Database (Alumni Edition)
Hospital Premium Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
ProQuest One Community College
Coronavirus Research Database
ProQuest Central
Health Research Premium Collection
Health Research Premium Collection (Alumni)
ProQuest Health & Medical Complete (Alumni)
Health & Medical Collection (Alumni Edition)
PML(ProQuest Medical Library)
ProQuest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
MEDLINE - Academic
PubMed Central (Full Participant titles)
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest Health & Medical Complete (Alumni)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Central China
ProQuest Central
ProQuest Health & Medical Research Collection
Health Research Premium Collection
Health and Medicine Complete (Alumni Edition)
ProQuest Central Korea
Health & Medical Research Collection
ProQuest Central (New)
ProQuest Medical Library (Alumni)
ProQuest One Academic Eastern Edition
Coronavirus Research Database
ProQuest Hospital Collection
Health Research Premium Collection (Alumni)
ProQuest Hospital Collection (Alumni)
ProQuest Health & Medical Complete
ProQuest Medical Library
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
MEDLINE - Academic
DatabaseTitleList MEDLINE - Academic

CrossRef
Publicly Available Content Database


Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1424-8220
ExternalDocumentID oai_doaj_org_article_96e4933ea875402ea3283fd0face4578
PMC9504852
A746532152
10_3390_s22186741
GeographicLocations New Jersey
India
GeographicLocations_xml – name: New Jersey
– name: India
GrantInformation_xml – fundername: Deanship of Scientific Research at King Saud University
GroupedDBID ---
123
2WC
53G
5VS
7X7
88E
8FE
8FG
8FI
8FJ
AADQD
AAHBH
AAYXX
ABDBF
ABUWG
ACUHS
ADBBV
ADMLS
AENEX
AFFHD
AFKRA
AFZYC
ALMA_UNASSIGNED_HOLDINGS
BENPR
BPHCQ
BVXVI
CCPQU
CITATION
CS3
D1I
DU5
E3Z
EBD
ESX
F5P
FYUFA
GROUPED_DOAJ
GX1
HH5
HMCUK
HYE
IAO
ITC
KQ8
L6V
M1P
M48
MODMG
M~E
OK1
OVT
P2P
P62
PHGZM
PHGZT
PIMPY
PJZUB
PPXIY
PQQKQ
PROAC
PSQYO
RNS
RPM
TUS
UKHRP
XSB
~8M
3V.
7XB
8FK
AZQEC
COVID
DWQXO
K9.
PKEHL
PQEST
PQUKI
PRINS
7X8
5PM
ID FETCH-LOGICAL-c485t-f219fef6d270fb27ba73d2ee9cb63984bfa0b77181a71c8d743ce91719b990593
IEDL.DBID 7X7
ISICitedReferencesCount 37
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000857587600001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1424-8220
IngestDate Mon Nov 10 04:34:12 EST 2025
Tue Nov 04 02:07:12 EST 2025
Sun Nov 09 09:56:50 EST 2025
Tue Oct 07 07:12:20 EDT 2025
Tue Nov 04 18:17:13 EST 2025
Sat Nov 29 07:17:02 EST 2025
Tue Nov 18 21:41:53 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 18
Language English
License Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c485t-f219fef6d270fb27ba73d2ee9cb63984bfa0b77181a71c8d743ce91719b990593
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0002-9781-3969
0000-0002-6343-5197
0000-0002-2192-6852
0000-0002-8643-9246
0000-0003-4601-7679
0000-0003-1233-1774
OpenAccessLink https://www.proquest.com/docview/2716584362?pq-origsite=%requestingapplication%
PMID 36146089
PQID 2716584362
PQPubID 2032333
ParticipantIDs doaj_primary_oai_doaj_org_article_96e4933ea875402ea3283fd0face4578
pubmedcentral_primary_oai_pubmedcentral_nih_gov_9504852
proquest_miscellaneous_2717687005
proquest_journals_2716584362
gale_infotracacademiconefile_A746532152
crossref_primary_10_3390_s22186741
crossref_citationtrail_10_3390_s22186741
PublicationCentury 2000
PublicationDate 2022-09-01
PublicationDateYYYYMMDD 2022-09-01
PublicationDate_xml – month: 09
  year: 2022
  text: 2022-09-01
  day: 01
PublicationDecade 2020
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Sensors (Basel, Switzerland)
PublicationYear 2022
Publisher MDPI AG
MDPI
Publisher_xml – name: MDPI AG
– name: MDPI
References Singh (ref_47) 2022; 193
ref_50
Kumar (ref_54) 2021; 1
Ramana (ref_10) 2021; 21
ref_53
ref_52
Kumar (ref_11) 2022; 54
Tang (ref_15) 2022; 23
ref_51
Singamaneni (ref_6) 2022; 22
Bennett (ref_46) 1992; 68
ref_17
ref_16
Vaishnav (ref_42) 2021; 1
Muhammad (ref_25) 2021; 28
Masud (ref_40) 2021; 8
Singamaneni (ref_4) 2018; 51
ref_24
ref_23
ref_22
ref_21
Juneja (ref_44) 2021; 11
ref_29
ref_28
ref_27
Renner (ref_32) 2008; 6
ref_26
Gisin (ref_20) 2002; 74
Singamaneni (ref_8) 2020; 24
Scarani (ref_31) 2009; 81
Ekert (ref_18) 1996; 77
ref_36
ref_35
ref_34
Ali (ref_13) 2018; 85
ref_30
Rieffel (ref_19) 2000; 32
ref_37
Gebremichael (ref_1) 2020; 8
Shukla (ref_55) 2022; 2
Upadhyay (ref_41) 2021; 19
Shor (ref_33) 2000; 85
Singamaneni (ref_7) 2019; 33
Chaudhary (ref_14) 2018; 6
Padamvathi (ref_38) 2019; 5
ref_43
Muhammad (ref_45) 2021; 76
ref_3
Mohammed (ref_2) 2019; 16
Bhatt (ref_39) 2019; 17
ref_49
ref_48
ref_9
ref_5
Yao (ref_12) 2014; 49
References_xml – volume: 16
  start-page: 971
  year: 2019
  ident: ref_2
  article-title: A Hybrid Approach to Design Key Generator of Cryptosystem
  publication-title: J. Comput. Theor. Nanosci.
  doi: 10.1166/jctn.2019.7985
– volume: 1
  start-page: 22
  year: 2021
  ident: ref_42
  article-title: Analytical review analysis for screening COVID-19 disease
  publication-title: Int. J. Mod. Res.
– volume: 23
  start-page: 1
  year: 2022
  ident: ref_15
  article-title: Lattice-based public-key encryption with conjunctive keyword search in multiuser set-ting for IIoT
  publication-title: Clust. Comput.
– ident: ref_26
  doi: 10.1007/s00521-021-06352-5
– ident: ref_52
  doi: 10.1080/03772063.2021.1982418
– ident: ref_51
– ident: ref_23
  doi: 10.1109/TII.2021.3084753
– volume: 85
  start-page: 76
  year: 2018
  ident: ref_13
  article-title: Edge-centric multimodal authentication system using encrypted biometric templates
  publication-title: Futur. Gener. Comput. Syst.
  doi: 10.1016/j.future.2018.02.040
– volume: 68
  start-page: 3121
  year: 1992
  ident: ref_46
  article-title: Quantum cryptography using any two nonorthogonal states
  publication-title: Phys. Rev. Lett.
  doi: 10.1103/PhysRevLett.68.3121
– volume: 81
  start-page: 1301
  year: 2009
  ident: ref_31
  article-title: The security of practical quantum key distribution
  publication-title: Rev. Mod. Phys.
  doi: 10.1103/RevModPhys.81.1301
– volume: 6
  start-page: 1
  year: 2008
  ident: ref_32
  article-title: Security of quantum key distribution
  publication-title: Int. J. Quantum Inf.
  doi: 10.1142/S0219749908003256
– ident: ref_27
  doi: 10.1109/ICWT.2018.8527822
– volume: 51
  start-page: 283
  year: 2018
  ident: ref_4
  article-title: Efficient quantum cryptography technique for key distribution
  publication-title: J. Eur. Des Syst. Autom.
– volume: 77
  start-page: 2585
  year: 1996
  ident: ref_18
  article-title: Quantum Error Correction for Communication
  publication-title: Phys. Rev. Lett.
  doi: 10.1103/PhysRevLett.77.2585
– volume: 8
  start-page: 15694
  year: 2021
  ident: ref_40
  article-title: A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in COVID-19 Patients Care
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2020.3047662
– volume: 32
  start-page: 300
  year: 2000
  ident: ref_19
  article-title: An introduction to quantum computing for non-physicists
  publication-title: ACM Comput. Surv.
  doi: 10.1145/367701.367709
– volume: 49
  start-page: 104
  year: 2014
  ident: ref_12
  article-title: A lightweight attribute-based encryption scheme for the Internet of Things
  publication-title: Futur. Gener. Comput. Syst.
  doi: 10.1016/j.future.2014.10.010
– ident: ref_21
  doi: 10.3390/su14137961
– ident: ref_24
  doi: 10.1155/2022/8927830
– ident: ref_53
  doi: 10.1080/03772063.2022.2043788
– volume: 193
  start-page: 1
  year: 2022
  ident: ref_47
  article-title: IoT enabled HELMET to safeguard the health of mine workers
  publication-title: Comput. Commun.
  doi: 10.1016/j.comcom.2022.06.032
– volume: 6
  start-page: 4897
  year: 2018
  ident: ref_14
  article-title: Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2018.2878707
– volume: 2
  start-page: 17
  year: 2022
  ident: ref_55
  article-title: Self-aware execution environment model (SAE2) for the performance improvement of multicore systems
  publication-title: Int. J. Mod. Res.
– ident: ref_29
  doi: 10.1109/QCE52317.2021.00084
– volume: 17
  start-page: 213
  year: 2019
  ident: ref_39
  article-title: Quantum cryptography for internet of things security
  publication-title: J. Electron. Sci. Technol.
– ident: ref_17
– volume: 8
  start-page: 152351
  year: 2020
  ident: ref_1
  article-title: Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3016937
– ident: ref_9
  doi: 10.1155/2022/4206000
– volume: 11
  start-page: 38
  year: 2021
  ident: ref_44
  article-title: Predicting Diabetes Mellitus with Machine Learning Techniques Using Multi-Criteria Decision Making
  publication-title: Int. J. Inf. Retr. Res.
– volume: 54
  start-page: 1
  year: 2022
  ident: ref_11
  article-title: Wavelength assignment in optical fiber with intelligent optimization and assignment scheme for static and dynamic traffic intensity based Photonic networks
  publication-title: Opt. Quantum Electron.
  doi: 10.1007/s11082-022-03880-9
– volume: 85
  start-page: 441
  year: 2000
  ident: ref_33
  article-title: Simple Proof of Security of the BB84 Quantum Key Distribution Protocol
  publication-title: Phys. Rev. Lett.
  doi: 10.1103/PhysRevLett.85.441
– volume: 74
  start-page: 145
  year: 2002
  ident: ref_20
  article-title: Quantum cryptography
  publication-title: Rev. Mod. Phys.
  doi: 10.1103/RevModPhys.74.145
– ident: ref_43
  doi: 10.1080/03772063.2022.2038288
– ident: ref_3
– volume: 1
  start-page: 1
  year: 2021
  ident: ref_54
  article-title: A comparative study of fuzzy optimization through fuzzy number
  publication-title: Int. J. Mod. Res.
– ident: ref_34
– volume: 22
  start-page: 336
  year: 2022
  ident: ref_6
  article-title: An efficient quantum hash-based CP-ABE framework on cloud storage data
  publication-title: Int. J. Adv. Intell. Paradig.
– volume: 76
  start-page: 355
  year: 2021
  ident: ref_45
  article-title: A comprehensive survey on multimodal medical signals fusion for smart healthcare systems
  publication-title: Inf. Fusion
  doi: 10.1016/j.inffus.2021.06.007
– volume: 28
  start-page: 42
  year: 2021
  ident: ref_25
  article-title: Deep-Reinforcement-Learning-Based Sustainable Energy Distribution for Wireless Communication
  publication-title: IEEE Wirel. Commun.
  doi: 10.1109/MWC.015.2100177
– ident: ref_50
  doi: 10.1155/2021/4912486
– volume: 24
  start-page: 145
  year: 2020
  ident: ref_8
  article-title: An improved dynamic polynomial integrity based QCP-ABE framework on large cloud data security
  publication-title: Int. J. Knowl.-Based Intell. Eng. Syst.
– ident: ref_16
  doi: 10.1109/MCE.2021.3089880
– ident: ref_37
– ident: ref_49
  doi: 10.1016/j.ipm.2021.102736
– volume: 21
  start-page: 7300
  year: 2021
  ident: ref_10
  article-title: A Novel Blockchain and Bi-Linear Polynomial-Based QCP-ABE Framework for Privacy and Security over the Complex Cloud Data
  publication-title: Sensors
  doi: 10.3390/s21217300
– ident: ref_30
  doi: 10.1109/GCAT52182.2021.9587708
– volume: 33
  start-page: 33
  year: 2019
  ident: ref_7
  article-title: IBLIND Quantum Computing and HASBE for Secure Cloud Data Storage and Accessing
  publication-title: Rev. d’Intell. Artif.
– volume: 5
  start-page: 144
  year: 2019
  ident: ref_38
  article-title: Quantum cryptography and quantum key distribution protocols: A survey
  publication-title: Int. J. Adv. Res. Ideas Innov. Technol.
– volume: 19
  start-page: 195
  year: 2021
  ident: ref_41
  article-title: Multi-criteria analysis of social isolation barriers amid COVID-19 using fuzzy AHP
  publication-title: World, J. Eng.
  doi: 10.1108/WJE-04-2021-0195
– ident: ref_36
  doi: 10.1109/TNSE.2022.3177748
– ident: ref_28
  doi: 10.3390/fi14030073
– ident: ref_35
  doi: 10.1038/srep42261
– ident: ref_22
– ident: ref_5
  doi: 10.3166/isi.23.5.213-222
– ident: ref_48
  doi: 10.1155/2021/8106467
SSID ssj0023338
Score 2.5765803
Snippet The industry-based internet of things (IIoT) describes how IIoT devices enhance and extend their capabilities for production amenities, security, and efficacy....
SourceID doaj
pubmedcentral
proquest
gale
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Enrichment Source
Index Database
StartPage 6741
SubjectTerms Algorithms
chaotic key generator
Comparative analysis
Confidentiality
Cybersecurity
Decision making
Employee motivation
IIoT
Information storage
Internet of Things
novel dynamic quantum key distribution algorithm
Privacy
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3dS8MwED9EfNAH8ROrU6II-lLWj7RpH6dOHIM5QWFvIU0vOJBOtjnwv_fSdmNTwRdfm3u43CV390uT3wFcBmgyFHHm6lwnLs-1cJWvlIuaiudYa48br2w2IXq9ZDBI-0utvuydsIoeuDJcM42RE-hGRYU1YR1UISVEk3tGaeS03Gz09UQ6B1M11AoJeVU8QiGB-uYksK2XBPdXsk9J0v8zFH-_HrmUb-53YLsuFFmrUnAX1rDYg60l-sB9aLdYbzTDN_bUvWOtmhycTUesXbxaZ7JO5_GZ9cfDmdKfTBU5q3o41Od_rFvYB_YH8HLffr59cOu2CK7mSTR1DQUZgybOA-GZLBCZEmEeIKY6o3Ij4ZlRXiYo5_hK-DrJqUbQSKjMTzNKPVEaHsJ6MSrwCJiXJibhKtJhzrkQsYqjEIUxmowbJko5cD03l9Q1Z7htXfEmCTtYy8qFZR24WIi-V0QZvwndWJsvBCy3dfmBPC5rj8u_PO7AlfWYtDuQlCFdq4cENCXLZSVbwnLG2X69DjTmTpX11pzIgBAiVV2UuB04XwzTprJ_SlSBo49ShmCYoAjlgFhZDCuqr44Uw9eSnjuNKCpGwfF_zPUENgP73qK81NaA9en4A09hQ8-mw8n4rFzzXwZqB0A
  priority: 102
  providerName: Directory of Open Access Journals
Title A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks
URI https://www.proquest.com/docview/2716584362
https://www.proquest.com/docview/2717687005
https://pubmed.ncbi.nlm.nih.gov/PMC9504852
https://doaj.org/article/96e4933ea875402ea3283fd0face4578
Volume 22
WOSCitedRecordID wos000857587600001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: DOA
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: M~E
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: BENPR
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Health & Medical Collection
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: 7X7
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/healthcomplete
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: PIMPY
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3Nb9MwFH-CjQMc-J4IjMogJLhES2InTk6og05U00pAQyqnyHFsVmlKRttV4sLfznuO262AuHDJwbaUlzy_L3_8fgCvEmNrI7M61I3OQ9FoGapYqdBoTJ4zrSNhI0c2ISeTfDotSr_gtvDHKtc-0TnqptO0Rn6QYGKPwRL97duL7yGxRtHuqqfQuAm7RJtN81xOrwoujvVXjybEsbQ_WCREwCRFvBWDHFT_nw7590OS16LO0b3_lfc-3PX5Jhv2E-QB3DDtQ7hzDYXwEYyGbNKtzDn7dPyeDT3GOFt2bNSe0Zxg4_HHU1bOZyulfzDVNqyngvDLiOy4pXv6j-HL0ej03YfQsyuEWuTpMrToq6yxWZPIyNaJrJXkTWJMoWvMWnJRWxXVEkNXrGSs8wZTDW2wuIuLGiNYWvA92Gm71jwBFhW5zYVKNW-EkDJTWcqNtFYrbXiuVABv1v-70h56nBgwzissQUg11UY1AbzcDL3o8Tb-NuiQlLYZQBDZrqGbf6u8xVVFZkTBuVFYkWGRbBTHTMo2kUWhBPqpAF6TyisyZBQGZe3vI-AnESRWNZQEPUe0vwHsr1VceQtfVFf6DeDFphttkzZcVGu6SzcGqzmJji4AuTWbtkTf7mlnZw7lu0jRuabJ03-__BncTuhChjv1tg87y_mleQ639Go5W8wHzhzcMx_A7uFoUn4euFUHfJ78HGFbOT4pv_4CiiIbzQ
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1db9MwFL2aBhLwwDciMMAgELxESxwnTh4QKqzTqo4ypCL1zTiOvVWakq3tivan-I3cm49uBcTbHniNLcWOj8_1je1zAF5z63Irk9w3hUl9URjp61Br3xpcPCfGBMIFtdmEHI3SySQ72ICf3V0YOlbZcWJN1EVl6B_5NseFPQZL5NsPJ6c-uUbR7mpnodHAYmjPf2DKNn8_2MHxfcP5bn_8ac9vXQV8I9J44Tuco866pOAycDmXuZZRwa3NTI7ROhW500EukbJDLUOTFhhijcWkJsxyZO6YxJeQ8q8hj0tK9uTkIsGLMN9r1IuiKAu255wMn6QI12JebQ3wZwD4_VDmpSi3e-d_-z534Xa7nma9ZgLcgw1b3odbl1QWH0C_x0bV0h6zr8Md1ms11NmiYv3yiDDPBoMvY3Ywmy61OWe6LFhjddH-JmXDknQIHsK3K-nHI9gsq9I-BhZkqUuFjk1UCCFlopM4stI5o42NUq09eNeNrzKttDo5fBwrTLEICmoFBQ9eraqeNHoif6v0kUCyqkAS4PWDanaoWkZRWWJFFkVWY8YpAm51hCtFVwQOGyWQhz14SxBTRFTYGGxrc98Cu0SSX6onSVqPbI092OogpVoGm6sLPHnwclWM3EMbSrq01VldB7NViUTugVxD71rT10vK6VGtYp7FGDxi_uTfL38BN_bGn_fV_mA0fAo3OV0-qU_4bcHmYnZmn8F1s1xM57Pn9VRk8P2qsf0LPtZybw
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1db9MwFL2aOoTggW9EYIBBIHiJmjhOnDwgVGgrokIJ0pC2J-M4Nqs0JaPtivbX-HVc54sVEG974DWxFCc-Pvfe2D4H4BnVJtc8yl1VqNhlheKu9KV0tcLkOVLKY8arzSb4fB4fHCTZDvzozsLYbZUdJ9ZEXVTK_iMfUkzsMVgi3w5Nuy0iG09fn3xzrYOUXWnt7DQaiMz02Xcs31av0jGO9XNKp5P9t-_c1mHAVSwO167B-Wq0iQrKPZNTnkseFFTrROUYuWOWG-nlHOnbl9xXcYHhVmkscPwkRxYPrRAT0v8upuSMDmA3Sz9kh325F2D112gZBUHiDVfU2j9x5m9FwNoo4M9w8PsWzXMxb3r9f_5aN-Bam2mTUTM1bsKOLm_B1XP6i7dhMiLzaqOPyafZmIxadXWyrsikPLKzgaTpx32SLRcbqc6ILAvSmGC0P1DJrLQKBXfg84W8x10YlFWp7wHxktjETIYqKBjjPJJRGGhujJJKB7GUDrzsxlqoVnTden8cCyy-LCxEDwsHnvZNTxqlkb81emMB0zew4uD1hWr5VbRcI5JIsyQItMRalHlUywBzSFN4BjvFkKEdeGHhJiyFYWewr81JDHwlKwYmRtyK7lnDYwf2OniJlttW4he2HHjS30ZWsktNstTVad0G61iOFO8A30LyVte375SLo1rfPAkxrIT0_r8f_hguI6TF-3Q-ewBXqD2VUm_924PBenmqH8IltVkvVstH7bwk8OWiwf0TK5h8vg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Novel+QKD+Approach+to+Enhance+IIOT+Privacy+and+Computational+Knacks&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Singamaneni%2C+Kranthi+Kumar&rft.au=Dhiman%2C+Gaurav&rft.au=Juneja%2C+Sapna&rft.au=Muhammad%2C+Ghulam&rft.date=2022-09-01&rft.pub=MDPI&rft.eissn=1424-8220&rft.volume=22&rft.issue=18&rft_id=info:doi/10.3390%2Fs22186741&rft_id=info%3Apmid%2F36146089&rft.externalDocID=PMC9504852
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon