Abstract
Security in sensor networks, though an important issue for widely available wireless networks, has been studied less extensively than other properties of these networks, such as, for example, their reliability. The few security schemes proposed so far are based on classical cryptography. In contrast, the present paper develops a totally new security solution, based on quantum cryptography. The scheme developed here comes with the advantages quantum cryptography has over classical cryptography, namely, effectively unbreakable keys and therefore unbreakable messages. Our security system ensures privacy of the measured data field in the presence of an intruder listening to messages broadcasted in the field.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
AboElFotoh, H.M.F., ElMallah, E.S., Hassanein, H.S.: On the reliability of wireless sensor networks. In: IEEE International Conference on Communications (ICC), June 2006, pp. 3455–3460 (2006)
Bennett, C.H., Brassard, G., Crepeau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical Einstein-Podolsky-Rosen channels. Physical Review Letters 70, 1895–1899 (1993)
Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, December, pp. 175–179. IEEE, New York (1984)
Bennett, C.H., Brassard, G., Mermin, D.N.: Quantum cryptography without Bell’s theorem. Physical Review Letters 68(5), 557–559 (1992)
Ekert, A.: Quantum cryptography based on Bell’s theorem. Physical Review Letters 67, 661–663 (1991)
Halder, M., Beveratos, A., Gisin, N., Scarani, V., Simon, C., Zbinden, H.: Entangling independent photons by time measurement. Nature Physics 3, 659–692 (2007)
Nagy, N., Nagy, M., Akl, S.G.: Key distribution versus key enhancement in quantum cryptography. Technical Report 2007-542, School of Computing, Queen’s University, Kingston, Ontario (2007)
Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)
Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: security protocols for sensor netowrks. In: Mobile Computing and Networking, pp. 189–199 (2001)
Lomonaco Jr., S.J.: A Talk on Quantum Cryptography or How Alice Outwits Eve. In: Proceedings of Symposia in Applied Mathematics, Washington, DC, January 2006, vol. 58, pp. 237–264 (2002)
Shi, B.-S., Li, J., Liu, J.-M., Fan, X.-F., Guo, G.-C.: Quantum key distribution and quantum authentication based on entangled states. Physics Letters A 281(2-3), 83–87 (2001)
Vaidman, L.: Teleportation of quantum states. Phys. Rev. A 49(2), 1473–1476 (1994)
Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802–803 (1982)
Zhao, F., Guibas, L.: Wireless Sensor Networks - An Information Processing Approach. Elsevier, Amsterdam (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nagy, N., Nagy, M., Akl, S.G. (2008). Quantum Wireless Sensor Networks. In: Calude, C.S., Costa, J.F., Freund, R., Oswald, M., Rozenberg, G. (eds) Unconventional Computing. UC 2008. Lecture Notes in Computer Science, vol 5204. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85194-3_15
Download citation
DOI: https://doi.org/10.1007/978-3-540-85194-3_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-85193-6
Online ISBN: 978-3-540-85194-3
eBook Packages: Computer ScienceComputer Science (R0)