686 research outputs found
IMPROVING SMART GRID SECURITY USING MERKLE TREES
AbstractâPresently nations worldwide are starting to convert their aging electrical power infrastructures into modern, dynamic power grids. Smart Grid offers much in the way of efficiencies and robustness to the electrical power grid, however its heavy reliance on communication networks will leave it more vulnerable to attack than present day grids. This paper looks at the threat to public key cryptography systems from a fully realized quantum computer and how this could impact the Smart Grid. We argue for the use of Merkle Trees in place of public key cryptography for authentication of devices in wireless mesh networks that are used in Smart Grid applications
The Role of Cryptography in Our Information-Based Society
Presentation given virtually at TAMUQ on 2 July 202
Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis
Key management in wireless sensor networks faces several new challenges. The
scale, resource limitations, and new threats such as node capture necessitate
the use of an on-line key generation by the nodes themselves. However, the cost
of such schemes is high since their secrecy is based on computational
complexity. Recently, several research contributions justified that the
wireless channel itself can be used to generate information-theoretic secure
keys. By exchanging sampling messages during movement, a bit string can be
derived that is only known to the involved entities. Yet, movement is not the
only possibility to generate randomness. The channel response is also strongly
dependent on the frequency of the transmitted signal. In our work, we introduce
a protocol for key generation based on the frequency-selectivity of channel
fading. The practical advantage of this approach is that we do not require node
movement. Thus, the frequent case of a sensor network with static motes is
supported. Furthermore, the error correction property of the protocol mitigates
the effects of measurement errors and other temporal effects, giving rise to an
agreement rate of over 97%. We show the applicability of our protocol by
implementing it on MICAz motes, and evaluate its robustness and secrecy through
experiments and analysis.Comment: Submitted to IEEE Transactions on Dependable and Secure Computin
Demonstration of microwave single-shot quantum key distribution
Security of modern classical data encryption often relies on computationally
hard problems, which can be trivialized with the advent of quantum computers. A
potential remedy for this is quantum communication which takes advantage of the
laws of quantum physics to provide secure exchange of information. Here,
quantum key distribution (QKD) represents a powerful tool, allowing for
unconditionally secure quantum communication between remote parties. At the
same time, microwave quantum communication is set to play an important role in
future quantum networks because of its natural frequency compatibility with
superconducting quantum processors and modern near-distance communication
standards. To this end, we present an experimental realization of a
continuous-variable QKD protocol based on propagating displaced squeezed
microwave states. We use superconducting parametric devices for generation and
single-shot quadrature detection of these states. We demonstrate unconditional
security in our experimental microwave QKD setting. We show that security
performance can be improved by adding finite trusted noise to the preparation
side. Our results indicate feasibility of secure microwave quantum
communication with the currently available technology in both open-air (up to
80 m) and cryogenic (over 1000 m) conditions.Comment: 9 pages, 3 figures, 1 supplementary information fil
Towards a framework for the implementation of a secure quantum teleportation infrastructure in South Africa
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2019The availability of high-speed/high-volume Data Link Layer (Layer 2) transmission networks fuelled by the implementation of mission critical and performance-intensive technologies, such as Cloud and Data Centre services transmitting sensitive data over the wide area network (WAN) has shifted the attention of hackers, eavesdroppers, cyber-criminals and other malicious attackers to the exploitation of these data transmission technologies. It is argued that security on the current classical technologies that store, transmit and manipulate information on the OSI Layer 2 have historically not been adequately addressed when it comes to secure communication and exchange of information. Quantum teleportation (QT) stemming from quantum communication a branch of quantum information science (QIS) has emerged as a technology that promise unconditional security and providing new ways to design and develop frameworks that operate based on the laws of quantum physics. It is argued that it has a potential to address the data transmission security GAP for OSI layer 2 technologies.
This research study aims to propose a framework for the implementation of secure quantum teleportation infrastructures in South Africa. There is currently a lack of generic models and methods to guide the implementation of QT infrastructures that will enable secure transmission of information. A design science research (DSR) was undertaken in order to develop a secure quantum teleportation artefact called (SecureQT-Framework). SecureQT-Framework is a generic model and method that guides the selection and implementation of QT infrastructures motivated by multi-disciplinary domains such as QIS, Quantum Physics, Computer Science as well as information and communication technology (ICT). The DSR process employed a primary DSR cycle with four DSR sub-cycles which involved the awareness and suggestion phase guided by a systematic literature review (SLR), development and evaluation phase guided by Software Defined Networkâs OpenFlow, Mininet, Mininet-Wifi and computer simulations for QT using SQUANCH framework.
We investigated, examined and collected credible QT techniques and its variant protocols to develop and simulate secure transmission of information over the WAN, We studied their features and challenges. We concluded the study by describing the QT techniques, protocols and implementations that has potential to bridge the security GAP for OSI Layer 2 technologies over the WAN. The results gained were used in the construction of a framework for the implementation of a secure quantum teleportation infrastructure in South Africa. The framework describes the main factors that need to be taken into consideration when implementing quantum teleportation infrastructures
Electronic Communication Data Link Encryption Simulation Based on Wireless Communication
In order to improve the simulation effect of electronic communication data
link encryption, the author proposes a solution based on wireless
communication. The main content of this technology is based on the research of
wireless communication, improve the elliptic curve cryptographic algorithm to
build a system encryption model, obtain legal and valid node private keys,
evaluate and analyze the relevant security attributes of the system, verify the
security of the keys, and realize the encryption optimization of wireless
network communication. Experimental results show that: Using the improved
elliptic curve to simulate the system data chain encryption under the
certificateless public key cryptosystem in network communication, the time is
only 2.31 milliseconds, which is lower than other algorithms. Conclusion: It is
proved that the technology research based on wireless communication can
effectively improve the encryption simulation effect of electronic
communication data link
- âŠ