A solution for wireless sensor networks security by improving the key distribution method
عنوان مقاله: A solution for wireless sensor networks security by improving the key distribution method
شناسه ملی مقاله: CONFIT01_0978
منتشر شده در اولین کنفرانس بین المللی فناوری اطلاعات، مدیریت و کامپیوتر در سال 1403
شناسه ملی مقاله: CONFIT01_0978
منتشر شده در اولین کنفرانس بین المللی فناوری اطلاعات، مدیریت و کامپیوتر در سال 1403
مشخصات نویسندگان مقاله:
Soheil Samanabadi - University of Mazandaran, Babolsar, Iran
Sahar Khatir - University of Mazandaran, Babolsar, Iran
خلاصه مقاله:
Soheil Samanabadi - University of Mazandaran, Babolsar, Iran
Sahar Khatir - University of Mazandaran, Babolsar, Iran
The study of cryptographic methods aimed at protecting classical cryptography against quantum attackers are called post-quantum cryptography. The primary challenge of post-quantum cryptography within the realm of wireless sensor networks and the Internet of Things is to find the optimal method given the inherent limitations of this type of embedded system. Due to these limitations, the preparation of a security system for classical procedures is complicated. To address this challenge, numerous methods have been proposed. Among them, the most practical approach involves altering the key management schemes. One of the notably successful methods involves integrating the public key pre-distribution method with hash functions. The main components under scrutiny in this research encompass the applicability of the public key pre-distribution method utilizing hash functions, along with the proposition of employing quantum computing for key preloading in nodes via Quantum Key Pre-Distribution methods. In the end, through a rigorous comparison of the obtained results, we will present a secure and optimal method for using cryptography in wireless sensor networks and demonstrate its efficiency by the mathematical induction method.
کلمات کلیدی: Post-quantum cryptography, Wireless Sensor Network Security, Internet of things Security, IoT Security
صفحه اختصاصی مقاله و دریافت فایل کامل: https://civilica.com/doc/2084272/