A New Mechanism for Enhancing the Security of Military Internet of Things by Using Quantum and Classic Cryptography

Document Type : Original Article

Author

Supreme National Defense University Group for Mine, Defensive Technologies and Passive Defense

Abstract

One of the dangers that is inflicted to the world by quantum algorithms is their usage to break the security of some systems based on classical cryptography. Nonetheless, the security of systems based on quantum cryptographic algorithms is safe from this risk. Another useful feature of quantum cryptography algorithms is the ability to figuring out any eavesdropping in the communication channel. Also, it is possible to safely distribute shares from the stock maker to the shareholders in the quantum secret sharing algorithm, while this is not possible in the classic secret sharing algorithm. One of the most important applications of the Internet of Things (IoT) network is the Military Internet of Things (MIoT). Due to the fact that MIoT has a direct impact on battlefields, military usage of IoT is more important than civilian applications. Therefore, security issues related to various parts of the MIoT are very critical. In this paper, we have presented a new design using a combination of classical cryptography (specifically the newly introduced digital signature scheme) and quantum cryptography (specifically quantum secret sharing) to improve the security of MIoT. Compared to similar research that have been conducted in this area, the introduced scheme provides more security requirements and is resistant to almost most of famous attacks on this network.

Keywords


[1]     L. Yushi, J. Fei, and Y. Hui, “Study on application modes of military Internet of Things (MIOT),” 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE) , pp. 630-634, 2012.##
[2]     R. P Feynman, “Simulating physics with computers,” International journal of theoretical physics 21.6-7, pp.      467-488, 1982.##
[3]     A. M. Childs and et al., “Quantum walks on graphs,” Proceedings of 35th ACM Symposium on Theory of Computing STOC, 2003.##
[4]     H. C. Bennett and G. Brassard, “Quantum Cryptography: Public Key Distribution and Coin Tossing,” IEEE International Conference on Computers Systems and Signal Processing, vol. 560, pp. 175-179, 1984.##
[5]     “IoT Roadmap - Iran Telecommunication Research Center,” 1396. (In Persian) [Online]. Available: https: //iot.itrc.ac.ir/sites/default/files/PRESENTATION%20-IOT.pdf.##
[6]     “The Guardian,” 2016. [Online]. Available: https: //www.theguardian.com/technology/2016/feb/09/internet-of-things-smart-home-devices-government-surveillance-james-clapper.##
[7]     “Military Applications Iot,” 2018. [Online]. Available: http: //wfiot2018.iot.ieee.org/sps2-military-applications-iot/.##
[8]     “Global Research,” 2015. [Online]. Available: https: //www.globalresearch.ca/nsa-cyber-war-will-use-internet-of-things-as-weapons-platform-your-home-is-the-battlefield/5425526.##
[9]     “The Hill,” Morgan Wright, Opinion Contributor- 03/14/18 06: 00 AM EDT, 2018. [Online]. Available: https: //thehill.com/opinion/technology/378286-for-national-security-the-internet-of-things-is-the-internet-of-trouble.##
[10]     “High Council of Cyberspace,” 1396. (In Persian) [Online]. Available: http: //www.ion.ir/News/305245.html.##
 [11]     “The need for national coordination in the use of the Internet of Things,” Establishment of Internet of Things Working Group at the National Cyberspace Center, 1396. (In Persian) [Online]. Available: majazi.ir.##
[12]     “Goals and Achievements - Internet of Things,” 1396. (In Persian). [Online]. Available: https: //iot.itrc.ac.ir/node/83##
[13]     M. A. Jan, F. Khan, M. Alam, and M. Usman, “A       payload-based mutual authentication scheme for Internet of Things,” Future Generation Computer Systems 92, pp.   1028-1039, 2019.##
[14]     L. Zhou, X. Li, K.-H. Yeh, C. Su, and W. Chiu, “Lightweight IoT-based authentication scheme in cloud computing circumstance,” Future Generation Computer Systems 91, pp. 244-251, 2019.##
[15]     D. Chen, N. Zhang, and Z. Qin, “S2M: a lightweight acoustic fingerprints based wireless device authentication protocol,” IEEE Internet of Things Journal, vol. 4, no. 1, pp. 88-100, 2017.##
Volume 9, Issue 2 - Serial Number 34
Serial No. 34, Summer Quarterly
June 2021
Pages 29-49
  • Receive Date: 11 July 2020
  • Revise Date: 26 January 2021
  • Accept Date: 11 January 2021
  • Publish Date: 22 June 2021