A solution for wireless sensor networks security by improving the key distribution method

Publish Year: 1403
نوع سند: مقاله کنفرانسی
زبان: English
View: 60

This Paper With 5 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

CONFIT01_0978

تاریخ نمایه سازی: 4 مهر 1403

Abstract:

The study of cryptographic methods aimed at protecting classical cryptography against quantum attackers are called post-quantum cryptography. The primary challenge of post-quantum cryptography within the realm of wireless sensor networks and the Internet of Things is to find the optimal method given the inherent limitations of this type of embedded system. Due to these limitations, the preparation of a security system for classical procedures is complicated. To address this challenge, numerous methods have been proposed. Among them, the most practical approach involves altering the key management schemes. One of the notably successful methods involves integrating the public key pre-distribution method with hash functions. The main components under scrutiny in this research encompass the applicability of the public key pre-distribution method utilizing hash functions, along with the proposition of employing quantum computing for key preloading in nodes via Quantum Key Pre-Distribution methods. In the end, through a rigorous comparison of the obtained results, we will present a secure and optimal method for using cryptography in wireless sensor networks and demonstrate its efficiency by the mathematical induction method.

Keywords:

Post-quantum cryptography , Wireless Sensor Network Security , Internet of things Security , IoT Security

Authors

Soheil Samanabadi

University of Mazandaran, Babolsar, Iran

Sahar Khatir

University of Mazandaran, Babolsar, Iran