Skip to main content
Log in

Quantum security in wireless sensor networks

  • Published:
Natural Computing Aims and scope Submit manuscript

Abstract

Security in sensor networks, though an important issue for widely available wireless networks, has been studied less extensively than other properties of these networks, such as, for example, their reliability. The few security schemes proposed so far are based on classical cryptography. In contrast, the present paper develops a new security solution, based on quantum cryptography. The scheme developed here comes with the advantages quantum cryptography has over classical cryptography, namely, effectively unbreakable keys and therefore effectively unconditionally secure messages. Our security system ensures privacy of the measured data field in the presence of an intruder who listens to messages broadcast in the field.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • AboElFotoh HMF, ElMallah ES, Hassanein HS (2006) On the reliability of wireless sensor networks. In: IEEE international conference on communications (ICC), June 2006, pp 3455–3460

  • Bennett CH, Brassard G (1984) Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE international conference on computers, systems and signal processing. IEEE, New York, 1984. Bangalore, India, December 1984, pp 175–179

  • Bennett CH, Brassard G, Mermin DN (1992) Quantum cryptography without Bell’s theorem. Phys Rev Lett 68(5):557–559

    Article  MATH  MathSciNet  Google Scholar 

  • Bennett CH, Brassard G, Crepeau C, Jozsa R, Peres A, Wootters WK (1993) Teleporting an unknown quantum state via dual classical Einstein–Podolsky–Rosen channels. Phys Rev Lett 70:1895–1899

    Article  MATH  MathSciNet  Google Scholar 

  • Ekert A (1991) Quantum cryptography based on Bell’s theorem. Phys Rev Lett 67:661–663

    Article  MATH  MathSciNet  Google Scholar 

  • Halder M, Beveratos A, Gisin N, Scarani V, Simon C, Zbinden H (2007) Entangling independent photons by time measurement. Nat Phys 3:659–692

    Article  Google Scholar 

  • Lomonaco SJ Jr (2002) A talk on quantum cryptography or how alice outwits eve. In Proceedings of symposia in applied mathematics, vol 58. Washington, DC, January 2002, pp 237–264

  • Nagy N, Nagy M, Akl SG (2007) Key distribution versus key enhancement in quantum cryptography. Technical Report 2007-542. School of Computing, Queen’s University, Kingston, ON

  • Nagy N, Nagy M, Akl SG (2008) Security in sensor networks with quantum memories. Technical Report 2008-551. School of Computing, Queen’s University, Kingston, ON, November 2008

  • Nielsen MA, Chuang IL (2000) Quantum computation and quantum information. Cambridge University Press, Cambridge

  • Perrig A, Szewczyk R, Wen V, Culler DE, Tygar JD (2001) SPINS: security protocols for sensor networks. In: Mobile computing and networking. pp 189–199

  • Shi B-S, Li J, Liu J-M, Fan X-F, Guo G-C (2001) Quantum key distribution and quantum authentication based on entangled states. Phys Lett A 281(2–3):83–87

    Article  MATH  MathSciNet  Google Scholar 

  • Vaidman L (1994) Teleportation of quantum states. Phys Rev A 49(2):1473–1476

    Article  MathSciNet  Google Scholar 

  • Wootters WK, Zurek WH (1982) A single quantum cannot be cloned. Nature 299:802–803

    Article  Google Scholar 

  • Zhao F, Guibas L (2004) Wireless sensor networks—an information processing approach. Elsevier, Morgan-Kaufmann, San Francisco

Download references

Acknowledgments

The authors wish to thank Waleed Alsalih for his important comments on this paper. This research was supported by the Natural Sciences and Engineering Research Council of Canada.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Naya Nagy.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Nagy, N., Nagy, M. & Akl, S.G. Quantum security in wireless sensor networks. Nat Comput 9, 819–830 (2010). https://doi.org/10.1007/s11047-010-9190-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11047-010-9190-4

Keywords

Navigation