An integration of quantum systems using BB84 for enhanced security in aeroponic smart farming (original) (raw)

2024, TELKOMNIKA Telecommunication Computing Electronics and Control

Modern aeroponic systems leverage internet of things (IoT) technology for automated control of climate, lighting, and nutrient delivery, rendering them susceptible to unauthorized access and network attacks. Such disruptions can lead to financial losses and impair agricultural productivity by altering essential growth conditions. To mitigate these risks, robust security measures including encryption and firewalls are essential, alongside continuous monitoring and updates to combat evolving threats. Addressing cyber threats in urban aeroponic systems, implementing quantum encryption emerges as a promising solution. Quantum key distribution (QKD) ensures highly secure encryption keys using quantum states that change upon eavesdropping, thereby thwarting intrusion attempts effectively. Integrating quantum encryption in aeroponic control systems safeguards data integrity and operational continuity against cyber threats, bolstering urban agriculture resilience. Our findings demonstrate the efficacy of quantum BB84 protocol integrated with application programming interface (API) for Eve’s security. Quantum bit error rate (QBER) measurements revealed minimal interference (0.015) for Alice and Bob, contrasting with higher initial QBER (up to 1.0) for Eve, indicative of intrusion attempts. Histogram analysis further underscored quantum security’s effectiveness in identifying and mitigating breaches. For future research, enhancing quantum encryption protocols and integrating advanced detection mechanisms will be essential.

Secure quantum key distribution system by applying decoy states protocol

TELKOMNIKA, 2022

Secure quantum key distribution (QKD) promises a revolutionizing in optical applications such as encryption, and imaging. However, their implementation in real-world scenarios continues to be challenged. The goal of this work is to verify the presence of photon number splitting (PNS) attack in quantum cryptography system based on BB84 protocol and to obtain a maximum secure key length as possible. This was realized through randomly interleaving decoy states with mean photon numbers of 5.38, 1.588, and 0.48 between the signal states with mean photon numbers of 2.69, 0.794, and 0.24. Experiment results show that a maximum secure key length obtained from our system, which ignores eavesdropping cases, is 125 with 20% decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Journal of Computer Science and Information Security December 2012

Since May 2009, the International Journal of Computer Science and Information Security (IJCSIS), promotes dissemination of knowledge in research areas of computer applications and practices, and advances in information security. The research themes focus mainly on innovative developments, research issues/solutions in computer science and related technologies. IJCSIS archives publications, abstracting/indexing, editorial board and other important information are available online on homepage. IJCSIS editorial board consisting of reputable experts solicits your research contribution to the journal with your research papers, projects, surveying works and industrial experiences. https://sites.google.com/site/ijcsis/

Provable entanglement and information cost for qubit-based quantum key-distribution protocols

European Physical Journal D, 2006

Provable entanglement has been shown to be a necessary precondition for unconditionally secure key generation in the context of quantum cryptographic protocols. We estimate the maximal threshold disturbance up to which the two legitimate users can prove the presence of quantum correlations in their data, in the context of the four- and six-state quantum key-distribution protocols, under the assumption of coherent attacks. Moreover, we investigate the conditions under which an eavesdropper can saturate these bounds, by means of incoherent and two-qubit coherent attacks. A direct connection between entanglement distillation and classical advantage distillation is also presented.

Loading...

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.