Abstract
The Internet of Things (IoT) is playing a growing role in society, and includes control over a range from household appliances to municipal power grids and nationwide assets. As a result, hackers from a national level down to low level criminals are looking to take advantage of important IoT infrastructures. These present an immediate target for cyber-terrorists as well as more mundane attacks by thieves and personal enemies, and it is imperative to devise defensive measures. In this work, we describe potential possible attacks on several IoT systems. As a result, vendors of the IoT infrastructure employ conventional encryption which is based on complexity to fight against hackers. However the emerging technology of quantum computing will make deciphering of the conventional encryption an easy task. This leads us to propose a scheme for use of QKD (quantum key distribution) which could be effective as a countermeasure. In this paper we will describe the feasibility study of weather effect design guidelines for a small, short range, mobile QKD system from drone to IoT on the ground.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
https://money.cnn.com/2017/01/09/technology/fda-st-jude-cardiac-hack/
https://info.entrustdatacard.com/iot-tesla?_ga=2.95926104.559287255.1513006603-146162010.1496333764
https://www.kaspersky.com/blog/blackhat-jeep-cherokee-hack-explained/9493/
https://hackernoon.com/smart-car-hacking-a-major-problem-for-iot-a66c14562419
https://it.slashdot.org/story/18/05/19/200225/ibm-warns-quantum-computing-will-break-encryption
Liao, S.-K., et al.: Satellite-relayed intercontinental quantum network. Phys. Rev. Lett. 120(3), 030501 (2018)
Bernstein, D.J.: Introduction to post-quantum cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 1–14. Springer, Berlin (2009). https://doi.org/10.1007/978-3-540-88702-7_1
Hill, A.D., Chapman, J., Herndon, K., Chopp, C., Gauthier, D.J., Kwiat, P.: Drone-based quantum key distribution. Urbana 51, 61801–63003 (2017)
Chun, H., et al.: Handheld free space quantum key distribution with dynamic motion compensation. Optics Express 25(6), 6784–6795 (2017)
Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, vol. 175, p. 8, New York (1984)
Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67(6), 661 (1991)
Tentrup, T.B.H., et al.: Large-alphabet Quantum Key Distribution using spatially encoded light. arXiv preprint arXiv:1808.02823 (2018)
Arnon, S., Kopeika, N.S.: Laser satellite communication network-vibration effect and possible solutions. Proc. IEEE 85(10), 1646–1661 (1997)
Arnon, S.: Effects of atmospheric turbulence and building sway on optical wireless-communication systems. Opt. Lett. 28(2), 129–131 (2003)
Yang, F., Cheng, J., Tsiftsis, T.A.: Free-space optical communication with nonzero boresight pointing errors. IEEE Trans. Commun. 62(2), 713–725 (2014)
Chen, C.-C., Gardner, C.S.: Impact of random pointing and tracking errors on the design of coherent and incoherent optical intersatellite communication links. IEEE Trans. Commun. 37(3), 252–260 (1989)
Kopeika, N.: A System Engineering Approach to Imaging, 700 p. SPIE Press (1998). (2nd printing. April 2000)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Arnon, S., Kupferman, J. (2019). Effects of Weather on Drone to IoT QKD. In: Dolev, S., Hendler, D., Lodha, S., Yung, M. (eds) Cyber Security Cryptography and Machine Learning. CSCML 2019. Lecture Notes in Computer Science(), vol 11527. Springer, Cham. https://doi.org/10.1007/978-3-030-20951-3_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-20951-3_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-20950-6
Online ISBN: 978-3-030-20951-3
eBook Packages: Computer ScienceComputer Science (R0)