Explorative Implementation of Quantum Key Distribution Algorithms for Secure Consumer Electronics Networks | IEEE Journals & Magazine | IEEE Xplore

Explorative Implementation of Quantum Key Distribution Algorithms for Secure Consumer Electronics Networks


Abstract:

Key distribution techniques are indispensable for maintaining privacy, preventing unauthorized access, and safeguarding sensitive data in consumer electronics networks. S...Show More

Abstract:

Key distribution techniques are indispensable for maintaining privacy, preventing unauthorized access, and safeguarding sensitive data in consumer electronics networks. Several recent research works focused on developing conventional key distribution protocols for consumer electronics networks. However, conventional key distribution algorithms face several limitations in consumer electronic networks, like key management complexity, key storage issues, and cost and resource constraints with increasing consumer electronic devices. Quantum Key Distribution (QKD) techniques overcome the limitations of conventional key distribution techniques and have several advantages, such as eavesdropping detection, intercept-resend attack resilience, trusted party independence, etc. Despite such advantages, no research has explored the potential of QKD techniques in consumer electronics networks. Addressing this research gap, in this work, we conduct a comparative analysis between QKD techniques like BB84, BB92, and E91 and conventional key distribution techniques with a broad evaluation framework that includes metrics including key generation rate, error rate, security level, and time complexity. We have also analyzed the QKD algorithms regarding several resource usage parameters like CPU, memory, disk space, and network usage. We also examine the principles, advantages, limitations, and applicability of securing Web transactions in consumer electronics networks.
Published in: IEEE Transactions on Consumer Electronics ( Volume: 70, Issue: 3, August 2024)
Page(s): 5576 - 5584
Date of Publication: 13 June 2024

ISSN Information:


I. Introduction

Key distribution techniques play an essential role in establishing the functionality and security of consumer electronics-based networks such as smart home appliances, home automation systems, and Internet of Things (IoT) devices [1]. The key distribution techniques are indispensable for maintaining privacy, preventing unauthorized access, and safeguarding sensitive data [2]. In recent years, several pivotal developments have reshaped the landscape of consumer electronics security. These advancements, which continue to evolve, profoundly influence how individuals interact with and safeguard their devices. Below, we delve into some of the most significant facts in this dynamic arena.

Device Authentication: Key distribution techniques prevent unauthorized devices from gaining access to the network by allowing devices to authenticate one another securely [1].

Secure Multi-Party Computation (SMPC): SMPC can be applied in scenarios where multiple parties want to collaborate on computations without revealing their individual inputs. In consumer electronics, this could be relevant for scenarios like collaborative data analysis, where multiple users want to analyze data collectively without exposing their specific data points [3].

Homomorphic Encryption: Homomorphic encryption is particularly useful in scenarios where data privacy is crucial. In consumer electronics, it can be applied to secure data in the cloud, allowing computations to be performed on encrypted data without the need for decryption. This can benefit applications like secure data analytics and processing sensitive information on devices with limited trust [4].

Contact IEEE to Subscribe

References

References is not available for this document.