Skip to main content
Log in

Enhancing security in IIoT applications through efficient quantum key exchange and advanced encryption standard

  • Application of soft computing
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

The industrial internet of things (IIoT) refers to a system of interconnected equipment, sensors, and devices deployed within industrial environments whose primary function is to collect and facilitate the exchange of data. IIoT has gained significant traction in several domains, encompassing remote monitoring, equipment management, and condition tracking. The utilization of IIoT in different environments gives rise to apprehensions regarding the security of data. As a result of this, it is imperative to ensure that rigorous safety measures are in place to safeguard the confidentiality of the sensitive information being transmitted. The utilization of elliptic curve cryptography (ECC) and quantum key exchange (QKE) in IIoT networks holds promise for achieving robust and predictable security measures. ECC is a widely adopted type of public-key cryptography due to its efficiency and security. It has gained significant popularity in contemporary systems. QKE is an innovative methodology that originates from the fundamental principles of quantum physics. The system has the ability to generate a secret key that is impervious to hacking attempts, as it leverages natural principles instead of conventional mathematical procedures. Due to this characteristic, quantum key distribution (QKD) is widely recognized as one of the most reliable methods for key exchange. The combination has led to the creation of a novel cryptographic model that integrates elliptic curve cryptography (ECC) and quantum key exchange (QKE) techniques for the generation and distribution of cryptographic keys. The model leads to an increase in the base probability of the Bennett–Brassard protocol (BB84) from 0.5 to 1. Subsequently, the keys that are produced are employed for the encryption of data through a streamlined and adapted variant of the Advanced Encryption Standard (AES), thereby expediting the secure exchange of data while upholding its level of safeguarding.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Availability of data and materials

Datasets: medical reports and IoT data have been used for the experimental analysis.

References

  • Abo-Taleb AS, Shalaby M, Nabil M, Elramly S (2020) A side-channel attack resistive ECDSA. J Phys Conf Ser 1454(1):012003

    Article  Google Scholar 

  • Bhattacharjee S, Nandi C (2019) Implementation of industrial internet of things in the renewable energy sector. In: The internet of things in the industrial sector, pp 223–259. https://doi.org/10.1007/978-3-030-24892-5_10

  • Chamola V, Jolfaei A, Chanana V, Parashari P, Hassija V (2021) Information security in the post quantum era for 5G and beyond networks: threats to existing cryptography, and post-quantum cryptography. Comput Commun 176:99–118

    Article  Google Scholar 

  • Devi A, Rathee G, Saini H (2022) Industrial IoT with secure authentication mechanism through blockchain technology. In: Proceedings of third doctoral symposium on computational intelligence: DoSCI 2022. Springer Nature Singapore, Singapore, pp 297–306

  • Di Scala AJ, Gangemi A, Romeo G, Vernetti G (2022) Special subsets of addresses for blockchains using the secp256k1 curve. Mathematics 10(15):2746

    Article  Google Scholar 

  • Hafsa A, Sghaier A, Malek J, Machhout M (2021) Image encryption method based on improved ECC and modified AES algorithm. Multimed Tools Appl 80:19769–19801

    Article  Google Scholar 

  • Hammi B, Fayad A, Khatoun R, Zeadally S, Begriche Y (2020) A lightweight ECC-based authentication scheme for Internet of Things (IoT). IEEE Syst J 14(3):3440–3450

    Article  Google Scholar 

  • Javaid M, Haleem A, Singh RP, Rab S, Suman R (2021a) Significance of sensors for industry 4.0: roles, capabilities, and applications. Sensors Int 2:100110

    Article  Google Scholar 

  • Javaid M, Haleem A, Singh RP, Rab S, Suman R (2021b) Upgrading the manufacturing sector via applications of industrial internet of things (IIoT). Sensors Int 2:100129

    Article  Google Scholar 

  • Job D, Paul V (2022) Challenges, security mechanisms, and research areas in IoT and IioT. In: Mohanty SN, Chatterjee JM, Satpathy S (eds) Internet of things and its applications. Springer, Cham, pp 523–538

    Chapter  Google Scholar 

  • Khan IA, Keshk M, Pi D, Khan N, Hussain Y, Soliman H (2022) Enhancing IIoT networks protection: a robust security model for attack detection in internet industrial control systems. Ad Hoc Netw 134:102930

    Article  Google Scholar 

  • Khujamatov H, Reypnazarov E, Khasanov D, Akhmedov N (2021) IoT, IIoT, and cyber-physical systems integration. Emergence of cyber physical system and IoT in smart automation and robotics: computer engineering in automation. Springer International Publishing, Cham, pp 31–50

    Chapter  Google Scholar 

  • Lauer F, Schöffel M, Rheinländer CC, Wehn N (2023) Exploration of thermoelectric energy harvesting for secure, TLS-based industrial IoT Nodes. In: Internet of things—ICIOT 2022: 7th international conference, held as part of the services conference federation, SCF 2022, Honolulu, HI, USA, December 10–14, 2022, proceedings. Springer Nature Switzerland, Cham, pp 92–107

  • Lee J, Cameron I, Hassall M (2019) Improving process safety: what roles for digitalization and industry 4.0? Process Saf Environ Protect 132:325–339

    Article  Google Scholar 

  • Liu J, Wen J, Zhang B, Dong S, Tang B, Yu Y (2023) A post quantum secure multi-party collaborative signature with deterability in the Industrial Internet of Things. Futur Gener Comput Syst 141:663–676

    Article  Google Scholar 

  • Mukherjee A, Goswami P, Yang L, Tyagi SKS, Samal UC, Mohapatra SK (2020) Deep neural network-based clustering technique for secure IIoT. Neural Comput Appl 32:16109–16117

    Article  Google Scholar 

  • Patel C, Bashir AK, AlZubi AA, Jhaveri R (2022) EBAKE-SE: a novel ECC-based authenticated key exchange between industrial IoT devices using secure element. Digit Commun Netw 9(2):358–366

    Article  Google Scholar 

  • Priyanka J, Ramakrishna M (2020) Performance analysis of attribute based encryption and cloud health data security. In: 2020 4th International conference on intelligent computing and control systems (ICICCS). IEEE, pp 989–994

  • Sengupta J, Ruj S, Bit SD (2020) A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J Netw Comput Appl 149:102481

    Article  Google Scholar 

  • Tabaa M, Monteiro F, Bensag H, Dandache A (2020) Green industrial internet of things from a smart industry perspectives. Energy Rep 6:430–446

    Article  Google Scholar 

  • Tang Y, Ba Y, Li L, Wang X, Yan X (2022) Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT. Cluster Comput 25(4):2305–2316

    Article  Google Scholar 

  • Ullah S, Jiangbin Z, Hussain MT, Din N, Ullah F, Farooq MU (2022) A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments. J Inf Secur Appl 70:103346

    Google Scholar 

  • Urooj S, Lata S, Ahmad S, Mehfuz S, Kalathil S (2023) Cryptographic data security for reliable wireless sensor network. Alexandria Eng J 72:37–50

    Article  Google Scholar 

  • Wang EK, Liang Z, Chen C-M, Kumari S, Khan MK (2020) PoRX: a reputation incentive scheme for blockchain consensus of IIoT. Future Gener Comput Syst 102:140–151

    Article  Google Scholar 

  • Williams B, Soulet M, Siraj A (2022) A taxonomy of cyber attacks in smart manufacturing systems. 6th EAI international conference on management of manufacturing systems. Springer International Publishing, Cham, pp 77–97

    Google Scholar 

  • Yaacoub J-PA, Noura HN, Salman O, Chehab A (2022) Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations. Int J Inf Secur 21:1–44

    Article  Google Scholar 

Download references

Funding

No funding is available for the research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hosakota Vamshi Krishna.

Ethics declarations

Conflict of interest

Competing interests do not exist in our research work.

Ethical approval

The ethical approval is not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Krishna, H.V., Sekhar, K.R. Enhancing security in IIoT applications through efficient quantum key exchange and advanced encryption standard. Soft Comput 28, 2671–2681 (2024). https://doi.org/10.1007/s00500-023-09585-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-023-09585-9

Keywords

Navigation