首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Quantum-Inspired Blockchain-Based Cybersecurity: Securing Smart Edge Utilities in IoT-Based Smart Cities
Authors:Ahmed A Abd El-Latif  Bassem Abd-El-Atty  Irfan Mehmood  Khan Muhammad  Salvador E Venegas-Andraca  Jialiang Peng
Institution:1. Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, 32511, Egypt;2. Center of Excellence in Cybersecurity, Quantum Information Processing, and Artificial Intelligence, Menoufia University, 32511, Egypt;3. Centre for Visual Computing, Faculty of Engineering and Informatics, University of Bradford, Bradford BD71DP, U.K;4. Visual Analytics for Knowledge Laboratory (VIS2KNOW Lab), School of Convergence, College of Computing and Informatics, Sungkyunkwan University, Seoul 03063, Republic of Korea;5. Tecnologico de Monterrey, Escuela de Ingenieria y Ciencias. Ave. Eugenio Garza Sada 2501, Monterrey, NL 64849, Mexico;6. School of Data Science and Technology, Heilongjiang University, Harbin 150080, China
Abstract:Blockchain plays a vital task in cybersecurity. With the exerted efforts for realising large-scale quantum computers, most current cryptographic mechanisms may be hacked. Accordingly, we need a quantum tool utilised for designing blockchain frameworks to have the ability to be executed in the level of digital computers and resist the probable attacks from both digital and quantum computers. Quantum walks may be utilised as a quantum-inspired model for designing new cryptographic algorithms. In this paper, we present a new authentication and encryption protocol based on quantum-inspired quantum walks (QIQW). The proposed protocol is utilized to build a blockchain framework for secure data transmission among IoT devices. Instead of using classical cryptographic hash functions, quantum hash functions based on QIQW are employed for linking blocks of the chain. The main advantages of the presented framework are helping IoT nodes to effectively share their data with other nodes and full control of their records. Security analysis demonstrates that our proposed protocol can defend against message attack and impersonation attacks, thus ensuring secure transmission of data among IoT devices.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号