Posted in | News | Quantum Computing

Quantum Secure Communication Strengthens IoV Networks

In a paper published in the journal IScience, researchers discussed the security vulnerabilities of Internet of Vehicles (IoV) networks against future quantum computers due to Shor's algorithm. They proposed a continuous-variable quantum secure direct communication (CV-QSDC) protocol using orbital angular momentum (OAM) as the information carrier to resist quantum attacks. The protocol leveraged the compatibility of continuous-variable quantum systems with standard telecommunication technology and the higher information capacity of OAM eigenstates.

Quantum Secure Communication Strengthens IoV Networks
Study: Quantum Secure Direct Communication in Internet of Vehicles. Image Credit: AlinStock/Shutterstock.com

Related Work

Past work on IoV security highlighted vulnerabilities in cryptographic algorithms against quantum computing, particularly through Shor’s algorithm, which compromised Rivest–Shamir–Adleman (RSA) and elliptic curve cryptography (ECC). Researchers proposed QSDC as a solution, eliminating key distribution vulnerabilities using a single quantum communication channel.

Initial breakthroughs in QSDC protocols, measurement-device-independent (MDI) structures, and high-dimensional encoding improved security and efficiency, establishing the basis for discrete-variable (DV) and continuous-variable (CV) quantum communication in IoV networks.

Quantum Security in IoV

Quantum IoV security has emerged as a crucial concern due to the vulnerabilities posed by quantum computing advancements. Traditional cryptographic algorithms like RSA and ECC rely on complex mathematical problems, such as integer factorization and discrete logarithms, for security. However, Shor’s algorithm has shown that these methods can be compromised by future quantum computers, rendering them theoretically insecure.

Researchers proposed QSDC as a promising alternative to address this issue. QSDC eliminates the need for pre-shared keys, a major vulnerability in classical systems, using a single quantum communication channel to transmit secret messages directly between trusted parties. This approach significantly reduces the risk of key distribution attacks and enhances overall security for IoV networks.

Key breakthroughs in developing QSDC include the two-step protocol, which further streamlined communication processes, and the introduction of MDI structures, which mitigated vulnerabilities related to device imperfections. High-dimensional encoding also improved the security and efficiency of these protocols, making them more robust against potential eavesdropping attacks.

These advancements laid the foundation for DV and CV quantum communication systems in IoV networks. DV systems rely on single-photon detection, while CV systems use continuous light and homodyne detectors, providing better compatibility with existing telecommunication technologies. Together, they offer a secure framework for the future of IoV communication in the face of quantum threats.

Asymptotic and Finite-Size Security

The section on asymptotic regime security in the CV-QSDC protocol discusses how detection light beams (S1 and S2) are transmitted through the same atmospheric turbulence channel, ensuring the protocol's security. The entanglement-based (EB) model is utilized to analyze the effective information of detection light.

Alice prepares a pair of two-mode squeezed states, and the covariance matrix is defined to reflect the state after passing through the turbulence. Key parameters, such as transmittance and excess noise, are introduced to represent the system's characteristics, allowing for the evaluation of effective information about atmospheric turbulence and noise levels.

The effective information for the CV-QSDC protocol with reverse reconciliation is mathematically expressed, considering mutual information, detection-added noise, and total noise. The Holevo quantity is also defined, facilitating security assessment against collective attacks. This framework provides insights into the protocol's performance under various noise conditions, revealing its robustness against excess noise.

Results illustrate that the effective information remains relatively stable across different scenarios, reinforcing the protocol's security in practical applications. Transitioning to finite-size security, the discussion highlights that previous effective information calculations assumed infinite signals, which is not feasible in practice.

Instead, this section focuses on a finite-size regime, where Alice and Bob exchange a finite number of signals. The effective information is redefined to account for the number of signals utilized for parameter estimation and privacy amplification, considering the implications of finite signal lengths on security.

The relationship between effective information and transmission distance is explored. It demonstrates that while the maximum effective details in the finite-size regime are lower than those in the asymptotic regime, it provides a more realistic representation of the protocol's capabilities. As the number of signals increases, the transmission distance improves, but it remains bounded by practical limitations. Overall, the findings provide a solid foundation for implementing QSDC protocols in IoV networks, emphasizing the balance between theoretical security and real-world applicability.

Conclusion

To summarize, this study introduced a CV-QSDC protocol for IoV networks to deliver secret messages directly while ensuring compatibility with standard telecommunication technology for imperceptibility and security. OAM eigenstates served as information carriers, boosting wireless communication capacity.

The protocol calculated effective information and maximum transmission distance in both asymptotic and finite-size regimes, with the latter providing a more realistic perspective. Information block mapping was utilized in the message transmission stage to reduce security risks from one-eigenstate distribution, emphasizing its importance for emergency communication scenarios. The protocol demonstrated significant potential for enhancing secure communications in various practical applications.

Journal Reference

Zhao, W., et al. (2024). Quantum Secure Direct Communication in Internet of Vehicles. IScience, 110942–110942. DOI: 10.1016/j.isci.2024.110942, https://www.sciencedirect.com/science/article/pii/S2589004224021679

Disclaimer: The views expressed here are those of the author expressed in their private capacity and do not necessarily represent the views of AZoM.com Limited T/A AZoNetwork the owner and operator of this website. This disclaimer forms part of the Terms and conditions of use of this website.

Silpaja Chandrasekar

Written by

Silpaja Chandrasekar

Dr. Silpaja Chandrasekar has a Ph.D. in Computer Science from Anna University, Chennai. Her research expertise lies in analyzing traffic parameters under challenging environmental conditions. Additionally, she has gained valuable exposure to diverse research areas, such as detection, tracking, classification, medical image analysis, cancer cell detection, chemistry, and Hamiltonian walks.

Citations

Please use one of the following formats to cite this article in your essay, paper or report:

  • APA

    Chandrasekar, Silpaja. (2024, October 02). Quantum Secure Communication Strengthens IoV Networks. AZoQuantum. Retrieved on October 02, 2024 from https://www.azoquantum.com/News.aspx?newsID=10520.

  • MLA

    Chandrasekar, Silpaja. "Quantum Secure Communication Strengthens IoV Networks". AZoQuantum. 02 October 2024. <https://www.azoquantum.com/News.aspx?newsID=10520>.

  • Chicago

    Chandrasekar, Silpaja. "Quantum Secure Communication Strengthens IoV Networks". AZoQuantum. https://www.azoquantum.com/News.aspx?newsID=10520. (accessed October 02, 2024).

  • Harvard

    Chandrasekar, Silpaja. 2024. Quantum Secure Communication Strengthens IoV Networks. AZoQuantum, viewed 02 October 2024, https://www.azoquantum.com/News.aspx?newsID=10520.

Tell Us What You Think

Do you have a review, update or anything you would like to add to this news story?

Leave your feedback
Your comment type
Submit

While we only use edited and approved content for Azthena answers, it may on occasions provide incorrect responses. Please confirm any data provided with the related suppliers or authors. We do not provide medical advice, if you search for medical information you must always consult a medical professional before acting on any information provided.

Your questions, but not your email details will be shared with OpenAI and retained for 30 days in accordance with their privacy principles.

Please do not ask questions that use sensitive or confidential information.

Read the full Terms & Conditions.