Quantum Computing for IoT Security

Quantum Computing for IoT Security

ISBN13: 9798369316382|ISBN13 Softcover: 9798369346310|EISBN13: 9798369316399
DOI: 10.4018/979-8-3693-1638-2.ch001
Cite Chapter Cite Chapter

MLA

Tripathy, B. K., et al. "Quantum Computing for IoT Security." Fostering Cross-Industry Sustainability With Intelligent Technologies, edited by Brojo Kishore Mishra, IGI Global, 2024, pp. 1-20. https://doi.org/10.4018/979-8-3693-1638-2.ch001

APA

Tripathy, B. K., Goel, S., & Guha, A. (2024). Quantum Computing for IoT Security. In B. Mishra (Ed.), Fostering Cross-Industry Sustainability With Intelligent Technologies (pp. 1-20). IGI Global. https://doi.org/10.4018/979-8-3693-1638-2.ch001

Chicago

Tripathy, B. K., Sarthak Goel, and Anamika Guha. "Quantum Computing for IoT Security." In Fostering Cross-Industry Sustainability With Intelligent Technologies, edited by Brojo Kishore Mishra, 1-20. Hershey, PA: IGI Global, 2024. https://doi.org/10.4018/979-8-3693-1638-2.ch001

Export Reference

Mendeley
Favorite

Abstract

As we approach Web 4.0, which relates to the uprising of internet of things (IoT)-enabled smart manufacturing devices that serve as data generator devices for companies, the responsibility of managing and securing this data is an overhead. Since the data can contain sensitive information, it is vulnerable to cyber-attacks. As advanced encryption-decryption cryptography algorithms are deficient to handle the situation, the uprising of quantum computing is making today's security mechanisms imperiled. Therefore, a quantum wall (QW) needs to be deployed for key generation which can resist potential attacks. Quantum-inspired IoT (QIoT) implies harnessing power imparted by quantum computing (QC) to secure IoT applications. It promises secure management of data throughout its life cycle. This chapter summarizes the recent relevant work conducted in this domain by conducting an intensive literature review around IoT, security implications, and how QC is making an impact in mitigating the cyber risks involved in data transfers in IoT.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.