A Quantum Technology-Based LiFi Security Using Quantum Key Distribution

Author:

Kumar Vinoth1,Niveditha V. R.2ORCID,Muthukumaran V.3,Kumar S.Satheesh3ORCID,Kumta Samyukta D.3,R. Murugesan3

Affiliation:

1. MVJ College of Engineering, India

2. Dr. M. G. R. Educational and Research Institute, Chennai, India

3. REVA University, India

Abstract

Light fidelity (Li-Fi) is a technology that is used to design a wireless network for communication using light. Current technology based on wireless fidelity (Wi-Fi) has some drawbacks that include speed and bandwidth limit, security issues, and attacks by malicious users, which yield Wi-Fi as less reliable compared to LiFi. The conventional key generation techniques are vulnerable to the current technological improvement in terms of computing power, so the solution is to introduce physics laws based on quantum technology and particle nature of light. Here the authors give a methodology to make the BB84 algorithm, a quantum cryptographic algorithm to generate the secret keys which will be shared by polarizing photons and more secure by eliminating one of its limitations that deals with dependency on the classical channel. The result obtained is sequence of 0 and 1, which is the secret key. The authors make use of the generated shared secret key to encrypt data using a one-time pad technique and transmit the encrypted data using LiFi and removing the disadvantage of the existing one-time pad technique.

Publisher

IGI Global

Reference16 articles.

1. Experimental quantum cryptography

2. Bennett, C. H., & Brassard, G. (1984). Quantum cryptography: Public key distribution and coin tossing. Proc. IEEE Int. Conf. Comput., Syst. Signal Process., 475–480.

3. El Rifai, M. (2016). Quantum secure communication using polarization hopping multi-stage protocols (Ph.D. dissertation). School Elect. Comput. Eng., Univ. Oklahoma, Norman, OK.

4. Quantum cryptography

5. Evaluation of Parameters Effect in Multiphoton Quantum Key Distribution Over Fiber Optic

Cited by 8 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Securing the light escaping in a Li-Fi network environment;Procedia Computer Science;2022

2. Efficient key exchange protocol for industrial internet of things;INDUSTRIAL, MECHANICAL AND ELECTRICAL ENGINEERING;2022

3. Efficient authenticated key establishment protocol for telecare medicine information systems;INDUSTRIAL, MECHANICAL AND ELECTRICAL ENGINEERING;2022

4. E-Collaboration for Management Information Systems Using Deep Learning Technique;Advances in Social Networking and Online Communities;2022

5. The Interaction Between Technologies, Techniques, and People in Higher Education Through Participatory Learning;Advances in Social Networking and Online Communities;2022

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3