Abstract
The industrial internet of things (IIoT) refers to a system of interconnected equipment, sensors, and devices deployed within industrial environments whose primary function is to collect and facilitate the exchange of data. IIoT has gained significant traction in several domains, encompassing remote monitoring, equipment management, and condition tracking. The utilization of IIoT in different environments gives rise to apprehensions regarding the security of data. As a result of this, it is imperative to ensure that rigorous safety measures are in place to safeguard the confidentiality of the sensitive information being transmitted. The utilization of elliptic curve cryptography (ECC) and quantum key exchange (QKE) in IIoT networks holds promise for achieving robust and predictable security measures. ECC is a widely adopted type of public-key cryptography due to its efficiency and security. It has gained significant popularity in contemporary systems. QKE is an innovative methodology that originates from the fundamental principles of quantum physics. The system has the ability to generate a secret key that is impervious to hacking attempts, as it leverages natural principles instead of conventional mathematical procedures. Due to this characteristic, quantum key distribution (QKD) is widely recognized as one of the most reliable methods for key exchange. The combination has led to the creation of a novel cryptographic model that integrates elliptic curve cryptography (ECC) and quantum key exchange (QKE) techniques for the generation and distribution of cryptographic keys. The model leads to an increase in the base probability of the Bennett–Brassard protocol (BB84) from 0.5 to 1. Subsequently, the keys that are produced are employed for the encryption of data through a streamlined and adapted variant of the Advanced Encryption Standard (AES), thereby expediting the secure exchange of data while upholding its level of safeguarding.
Similar content being viewed by others
Availability of data and materials
Datasets: medical reports and IoT data have been used for the experimental analysis.
References
Abo-Taleb AS, Shalaby M, Nabil M, Elramly S (2020) A side-channel attack resistive ECDSA. J Phys Conf Ser 1454(1):012003
Bhattacharjee S, Nandi C (2019) Implementation of industrial internet of things in the renewable energy sector. In: The internet of things in the industrial sector, pp 223–259. https://doi.org/10.1007/978-3-030-24892-5_10
Chamola V, Jolfaei A, Chanana V, Parashari P, Hassija V (2021) Information security in the post quantum era for 5G and beyond networks: threats to existing cryptography, and post-quantum cryptography. Comput Commun 176:99–118
Devi A, Rathee G, Saini H (2022) Industrial IoT with secure authentication mechanism through blockchain technology. In: Proceedings of third doctoral symposium on computational intelligence: DoSCI 2022. Springer Nature Singapore, Singapore, pp 297–306
Di Scala AJ, Gangemi A, Romeo G, Vernetti G (2022) Special subsets of addresses for blockchains using the secp256k1 curve. Mathematics 10(15):2746
Hafsa A, Sghaier A, Malek J, Machhout M (2021) Image encryption method based on improved ECC and modified AES algorithm. Multimed Tools Appl 80:19769–19801
Hammi B, Fayad A, Khatoun R, Zeadally S, Begriche Y (2020) A lightweight ECC-based authentication scheme for Internet of Things (IoT). IEEE Syst J 14(3):3440–3450
Javaid M, Haleem A, Singh RP, Rab S, Suman R (2021a) Significance of sensors for industry 4.0: roles, capabilities, and applications. Sensors Int 2:100110
Javaid M, Haleem A, Singh RP, Rab S, Suman R (2021b) Upgrading the manufacturing sector via applications of industrial internet of things (IIoT). Sensors Int 2:100129
Job D, Paul V (2022) Challenges, security mechanisms, and research areas in IoT and IioT. In: Mohanty SN, Chatterjee JM, Satpathy S (eds) Internet of things and its applications. Springer, Cham, pp 523–538
Khan IA, Keshk M, Pi D, Khan N, Hussain Y, Soliman H (2022) Enhancing IIoT networks protection: a robust security model for attack detection in internet industrial control systems. Ad Hoc Netw 134:102930
Khujamatov H, Reypnazarov E, Khasanov D, Akhmedov N (2021) IoT, IIoT, and cyber-physical systems integration. Emergence of cyber physical system and IoT in smart automation and robotics: computer engineering in automation. Springer International Publishing, Cham, pp 31–50
Lauer F, Schöffel M, Rheinländer CC, Wehn N (2023) Exploration of thermoelectric energy harvesting for secure, TLS-based industrial IoT Nodes. In: Internet of things—ICIOT 2022: 7th international conference, held as part of the services conference federation, SCF 2022, Honolulu, HI, USA, December 10–14, 2022, proceedings. Springer Nature Switzerland, Cham, pp 92–107
Lee J, Cameron I, Hassall M (2019) Improving process safety: what roles for digitalization and industry 4.0? Process Saf Environ Protect 132:325–339
Liu J, Wen J, Zhang B, Dong S, Tang B, Yu Y (2023) A post quantum secure multi-party collaborative signature with deterability in the Industrial Internet of Things. Futur Gener Comput Syst 141:663–676
Mukherjee A, Goswami P, Yang L, Tyagi SKS, Samal UC, Mohapatra SK (2020) Deep neural network-based clustering technique for secure IIoT. Neural Comput Appl 32:16109–16117
Patel C, Bashir AK, AlZubi AA, Jhaveri R (2022) EBAKE-SE: a novel ECC-based authenticated key exchange between industrial IoT devices using secure element. Digit Commun Netw 9(2):358–366
Priyanka J, Ramakrishna M (2020) Performance analysis of attribute based encryption and cloud health data security. In: 2020 4th International conference on intelligent computing and control systems (ICICCS). IEEE, pp 989–994
Sengupta J, Ruj S, Bit SD (2020) A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J Netw Comput Appl 149:102481
Tabaa M, Monteiro F, Bensag H, Dandache A (2020) Green industrial internet of things from a smart industry perspectives. Energy Rep 6:430–446
Tang Y, Ba Y, Li L, Wang X, Yan X (2022) Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT. Cluster Comput 25(4):2305–2316
Ullah S, Jiangbin Z, Hussain MT, Din N, Ullah F, Farooq MU (2022) A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments. J Inf Secur Appl 70:103346
Urooj S, Lata S, Ahmad S, Mehfuz S, Kalathil S (2023) Cryptographic data security for reliable wireless sensor network. Alexandria Eng J 72:37–50
Wang EK, Liang Z, Chen C-M, Kumari S, Khan MK (2020) PoRX: a reputation incentive scheme for blockchain consensus of IIoT. Future Gener Comput Syst 102:140–151
Williams B, Soulet M, Siraj A (2022) A taxonomy of cyber attacks in smart manufacturing systems. 6th EAI international conference on management of manufacturing systems. Springer International Publishing, Cham, pp 77–97
Yaacoub J-PA, Noura HN, Salman O, Chehab A (2022) Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations. Int J Inf Secur 21:1–44
Funding
No funding is available for the research.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
Competing interests do not exist in our research work.
Ethical approval
The ethical approval is not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Krishna, H.V., Sekhar, K.R. Enhancing security in IIoT applications through efficient quantum key exchange and advanced encryption standard. Soft Comput 28, 2671–2681 (2024). https://doi.org/10.1007/s00500-023-09585-9
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-023-09585-9