Abstract
Security in sensor networks, though an important issue for widely available wireless networks, has been studied less extensively than other properties of these networks, such as, for example, their reliability. The few security schemes proposed so far are based on classical cryptography. In contrast, the present paper develops a new security solution, based on quantum cryptography. The scheme developed here comes with the advantages quantum cryptography has over classical cryptography, namely, effectively unbreakable keys and therefore effectively unconditionally secure messages. Our security system ensures privacy of the measured data field in the presence of an intruder who listens to messages broadcast in the field.
Similar content being viewed by others
References
AboElFotoh HMF, ElMallah ES, Hassanein HS (2006) On the reliability of wireless sensor networks. In: IEEE international conference on communications (ICC), June 2006, pp 3455–3460
Bennett CH, Brassard G (1984) Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE international conference on computers, systems and signal processing. IEEE, New York, 1984. Bangalore, India, December 1984, pp 175–179
Bennett CH, Brassard G, Mermin DN (1992) Quantum cryptography without Bell’s theorem. Phys Rev Lett 68(5):557–559
Bennett CH, Brassard G, Crepeau C, Jozsa R, Peres A, Wootters WK (1993) Teleporting an unknown quantum state via dual classical Einstein–Podolsky–Rosen channels. Phys Rev Lett 70:1895–1899
Ekert A (1991) Quantum cryptography based on Bell’s theorem. Phys Rev Lett 67:661–663
Halder M, Beveratos A, Gisin N, Scarani V, Simon C, Zbinden H (2007) Entangling independent photons by time measurement. Nat Phys 3:659–692
Lomonaco SJ Jr (2002) A talk on quantum cryptography or how alice outwits eve. In Proceedings of symposia in applied mathematics, vol 58. Washington, DC, January 2002, pp 237–264
Nagy N, Nagy M, Akl SG (2007) Key distribution versus key enhancement in quantum cryptography. Technical Report 2007-542. School of Computing, Queen’s University, Kingston, ON
Nagy N, Nagy M, Akl SG (2008) Security in sensor networks with quantum memories. Technical Report 2008-551. School of Computing, Queen’s University, Kingston, ON, November 2008
Nielsen MA, Chuang IL (2000) Quantum computation and quantum information. Cambridge University Press, Cambridge
Perrig A, Szewczyk R, Wen V, Culler DE, Tygar JD (2001) SPINS: security protocols for sensor networks. In: Mobile computing and networking. pp 189–199
Shi B-S, Li J, Liu J-M, Fan X-F, Guo G-C (2001) Quantum key distribution and quantum authentication based on entangled states. Phys Lett A 281(2–3):83–87
Vaidman L (1994) Teleportation of quantum states. Phys Rev A 49(2):1473–1476
Wootters WK, Zurek WH (1982) A single quantum cannot be cloned. Nature 299:802–803
Zhao F, Guibas L (2004) Wireless sensor networks—an information processing approach. Elsevier, Morgan-Kaufmann, San Francisco
Acknowledgments
The authors wish to thank Waleed Alsalih for his important comments on this paper. This research was supported by the Natural Sciences and Engineering Research Council of Canada.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Nagy, N., Nagy, M. & Akl, S.G. Quantum security in wireless sensor networks. Nat Comput 9, 819–830 (2010). https://doi.org/10.1007/s11047-010-9190-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11047-010-9190-4