Skip to main content

Advertisement

Log in

Transforming future technology with quantum-based IoT

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

With the advent of internet-enabled and hybrid technologies, information is becoming increasingly accessible to the general public. Smartphones and other gadgets are used extensively by people to share and promote ideas, in a variety of ways. Human interaction and communication has become more reliable and effective through advanced computing technologies. Quantum computing is an emerging paradigm that will change the lives of individuals and the operations of organizations. Quantum computers solve problems at high speed by operating in a superposition state in which the state can be either zero or one at the same instant. Quantum sensors can be used efficiently in technological research to make accurate measurements and collect data that provide new insights into the behavior of nanomaterials. The use of quantum computing could also speed up the manufacturing process of devices with remarkable properties such as superconductivity, high strength or improved signal performance. Quantum computing has the ability to dramatically speed up the development process of various organizations and increase their efficiency and effectiveness. The security and reliability of data and communication is improved by quantum computing techniques such as key generation and entanglement dispersion. Companies use cryptographic algorithms to protect their data. However, with the advent of quantum computing, cryptographic methods that rely on numerical aspects are no longer sufficient to protect data. Quantum computing is an emerging field that is being applied to various problems that previously could not be solved using conventional methods. Quantum computing plays an important role in the field of information processing, where information is precisely analyzed. Various quantum technologies and algorithms are used to secure company data. This paper provides a systematic review of the literature on the principles of quantum computing. The SLR focuses on achieving four aims “identifying a variety of quantum IoT devices, analyzing their importance in different industries, highlighting the challenges of quantum technology, and presenting various techniques used by researchers to overcome different problems”. Quantum cryptography is identified as a key strategy for improving the security of IoT systems and ensuring the security and consistency of information.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Explore related subjects

Discover the latest articles and news from researchers in related subjects, suggested using machine learning.

Data availability

No data were used to support this study.

References

  1. Tichy M, Bosch J, Goedicke M, Fitzgerald B (2015) 2nd international workshop on rapid continuous software engineering (RCOSE 2015). In: 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, pp 993–994

  2. Khanal B, Orduz J, Rivas P, Baker E (2023) Supercomputing leverages quantum machine learning and Grover’s algorithm. J Supercomput 79:6918–6940

    Google Scholar 

  3. Gambetta JM, Chow JM, Steffen M (2017) Building logical qubits in a superconducting quantum computing system. npj Quantum Inf 3:2

    Google Scholar 

  4. Wang S, Cao Z, Strangio MA, Wang L (2008) Cryptanalysis and improvement of an elliptic curve Diffie–Hellman key agreement protocol. IEEE Commun Lett 12:149–151

    Google Scholar 

  5. Boneh D, Franklin M (1997) Efficient generation of shared RSA keys. In: Annual International Cryptology Conference, pp 425–439

  6. Bos JW, Halderman JA, Heninger N, Moore J, Naehrig M, Wustrow E (2014) Elliptic curve cryptography in practice. In: International Conference on Financial Cryptography and Data Security, pp 157–175

  7. Steane A (1998) Quantum computing. Rep Prog Phys 61:117

    MathSciNet  Google Scholar 

  8. Reddy NS, Padmalatha V, Sujith A (2018) A Novel hybrid Quantum Protocol to enhance secured dual party Computation over Cloud Networks. In: 2018 IEEE 8th International Advance Computing Conference (IACC), pp 142–149

  9. Thakur AS, Biswas T, Kuila P (2021) Binary quantum-inspired gravitational search algorithm-based multi-criteria scheduling for multi-processor computing systems. J Supercomput 77:796–817

    Google Scholar 

  10. Shor PW, Preskill J (2000) Simple proof of security of the BB84 quantum key distribution protocol. Phys Rev Lett 85:441

    Google Scholar 

  11. Sadeeq MA, Zeebaree SR, Qashi R, Ahmed SH, Jacksi K (2018) Internet of Things security: a survey. In: 2018 International Conference on Advanced Science and Engineering (ICOASE), pp 162–166

  12. Cheng B, Wang M, Zhao S, Zhai Z, Zhu D, Chen J (2017) Situation-aware dynamic service coordination in an IoT environment. IEEE/ACM Trans Netw 25:2082–2095

    Google Scholar 

  13. Jiang H, Xiao Z, Li Z, Xu J, Zeng F, Wang D (2020) An energy-efficient framework for internet of things underlaying heterogeneous small cell networks. IEEE Trans Mob Comput 21:31–43

    Google Scholar 

  14. Elliott C (2002) Building the quantum network. New J Phys 4:46

    Google Scholar 

  15. Dai M, Sun G, Yu H, Niyato D (2023) Maximize the long-term average revenue of network slice provider via admission control among heterogeneous slices. IEEE/ACM Trans Netw. https://doi.org/10.1109/TNET.2023.3297883

    Article  Google Scholar 

  16. Rahman MS, Hossam-E-Haider M (2019) Quantum IoT: a quantum approach in IoT security maintenance. In: 2019 International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), pp 269–272

  17. Broadbent A, Schaffner C (2016) Quantum cryptography beyond quantum key distribution. Des Codes Cryptogr 78:351–382

    MathSciNet  Google Scholar 

  18. Liu B, Gao F, Huang W, Wen Q (2015) QKD-based quantum private query without a failure probability. Sci China Phys Mech Astron 58:1–6

    Google Scholar 

  19. Langenberg B, Pham H, Steinwandt R (2020) Reducing the cost of implementing the advanced encryption standard as a quantum circuit. IEEE Trans Quantum Eng 1:1–12

    Google Scholar 

  20. Pirandola S, Andersen UL, Banchi L, Berta M, Bunandar D, Colbeck R et al (2020) Advances in quantum cryptography. Adv Opt Photonics 12:1012–1236

    Google Scholar 

  21. Sun G, Xu Z, Yu H, Chang V (2020) Dynamic network function provisioning to enable network in box for industrial applications. IEEE Trans Ind Inf 17:7155–7164

    Google Scholar 

  22. Fu X, Pace P, Aloi G, Guerrieri A, Li W, Fortino G (2023) Tolerance analysis of cyber-manufacturing systems to cascading failures. ACM Trans Internet Technol 23:1–23

    Google Scholar 

  23. Kim J, Bhalgat Y, Lee J, Patel C, Kwak N (2019) Qkd: quantization-aware knowledge distillation

  24. Ruiz Alba Gaya A, Calvo Díaz-Aldagalán D, García Muñoz V, Martínez García A, Amaya Ocampo WA, Rozo Chicue JG (2011) Practical quantum key distribution based on the BB84 protocol. In: Waves, pp 4–14

  25. Fung C-H, Tamaki K, Lo H-K (2005) On the performance of two protocols: SARG04 and BB84

  26. Matsumoto R (2013) Improved asymptotic key rate of the B92 protocol. In: 2013 IEEE International Symposium on Information Theory, pp 351–353

  27. Ling A, Peloso M, Marcikic I, Lamas-Linares A, Kurtsiefer C (2008) Experimental E91 quantum key distribution. In: Advanced Optical Concepts in Quantum Computing, Memory, and Communication, p 69030U

  28. Waks E, Inoue K, Santori C, Fattal D, Vuckovic J, Solomon GS et al (2002) Quantum cryptography with a photon turnstile. Nature 420:762–762

    Google Scholar 

  29. Hong KW, Foong O-M, Low TJ (2016) Challenges in quantum key distribution: a review. In: Proceedings of the 4th International Conference on Information and Network Security, pp 29–33

  30. Zhao X, Zhao B, Wang Z, Song Z, Wang X (2021) Practical distributed quantum information processing with LOCCNet. npj Quantum Inf 7:159

    Google Scholar 

  31. Bernstein DJ, Lange T (2017) Post-quantum cryptography. Nature 549:188–194

    Google Scholar 

  32. Keele S (2007) Guidelines for performing systematic literature reviews in software engineering. Technical report, Ver. 2.3 EBSE technical report. EBSE2007

  33. Kitchenham B, Brereton P (2013) A systematic review of systematic review process research in software engineering. Inf Softw Technol 55:2049–2075

    Google Scholar 

  34. Althobaiti OS, Dohler M (2020) Cybersecurity challenges associated with the internet of things in a post-quantum world. IEEE Access 8:157356–157381

    Google Scholar 

  35. Banerjee U, Pathak A, Chandrakasan AP (2019) 2.3 An energy-efficient configurable lattice cryptography processor for the quantum-secure Internet of Things. In: 2019 IEEE International Solid-State Circuits Conference-(ISSCC), pp 46–48@@

  36. Meng X, Yu X, Chen W, Zhao Y, Zhang J (2020) Residual-adaptive key provisioning in quantum-key-distribution enhanced internet of things (Q-IoT). In: 2020 International Wireless Communications and Mobile Computing (IWCMC), pp 2022–2027

  37. Ebrahimi S, Bayat-Sarmadi S, Mosanaei-Boorani H (2019) Post-quantum cryptoprocessors optimized for edge and resource-constrained devices in IoT. IEEE Internet Things J 6:5500–5507

    Google Scholar 

  38. Fernández-Caramés TM (2019) From pre-quantum to post-quantum IoT security: a survey on quantum-resistant cryptosystems for the Internet of Things. IEEE Internet Things J 7:6457–6480

    Google Scholar 

  39. Phoon J-H, Lee W-K, Wong DC-K, Yap W-S, Goi B-M, Phan RC-W (2020) Optimized IoT cryptoprocessor based on QC-MPDC key encapsulation mechanism. IEEE Internet Things J 7:8513–8524

    Google Scholar 

  40. Chaudhary R, Aujla GS, Kumar N, Zeadally S (2018) Lattice-based public key cryptosystem for internet of things environment: challenges and solutions. IEEE Internet Things J 6:4897–4909

    Google Scholar 

  41. Weng H, Zhang C, Chen P, Chen R, Xu J, Liao Y et al (2021) A quantum chaotic image cryptosystem and its application in IoT secure communication. IEEE Access 9:20481–20492

    Google Scholar 

  42. Bhatia M, Sood SK (2020) Quantum computing-inspired network optimization for IoT applications. IEEE Internet Things J 7:5590–5598

    Google Scholar 

  43. Humble TS, Britt KA, Mohiyaddin FA (2017) Quantum accelerators for high-performance computing systems. Oak Ridge National Lab (ORNL), Oak Ridge

    Google Scholar 

  44. Cao J, Yu P, Xiang X, Ma M, Li H (2019) Anti-quantum fast authentication and data transmission scheme for massive devices in 5G NB-IoT system. IEEE Internet Things J 6:9794–9805

    Google Scholar 

  45. Cheng C, Lu R, Petzoldt A, Takagi T (2017) Securing the Internet of Things in a quantum world. IEEE Commun Mag 55:116–120

    Google Scholar 

  46. Abd El-Latif AA, Abd-El-Atty B, Hossain MS, Elmougy S, Ghoneim A (2018) Secure quantum steganography protocol for fog cloud internet of things. IEEE Access 6:10332–10340

    Google Scholar 

  47. AbdEl-Latif AA, Abd-El-Atty B, Venegas-Andraca SE, Elwahsh H, Piran MJ, Bashir AK et al (2020) Providing end-to-end security using quantum walks in IoT networks. IEEE Access 8:92687–92696

    Google Scholar 

  48. Abd El-Latif AA, Abd-El-Atty B, Mazurczyk W, Fung C, Venegas-Andraca SE, Management S (2020) Secure data encryption based on quantum walks for 5G Internet of Things scenario. IEEE Trans Netw Serv Manag 17:118–131

    Google Scholar 

  49. Ghorpade SN, Zennaro M, Chaudhari BS, Saeed RA, Alhumyani H, Abdel-Khalek S (2021) Enhanced differential crossover and quantum particle swarm optimization for IoT applications. IEEE Access 9:93831–93846

    Google Scholar 

  50. Gielen AW, McKenzie FV (2014) Thermo-mechanical challenges for quantum devices. In: Proceedings of the 5th Electronics System-integration Technology Conference (ESTC), pp 1–6

  51. Kaatuzian H (2020) Quantum supremacy versus IoT conspiracy in smart cities. In: 2020 4th International Conference on Smart City, Internet of Things and Applications (SCIOT), pp 77–83

  52. Khalid A, McCarthy S, O’Neill M, Liu W (2019) Lattice-based cryptography for IoT in a quantum world: Are we ready? In: 2019 IEEE 8th International Workshop on Advances in Sensors and Interfaces (IWASI), pp 194–199

  53. Li D, Huang X, Huang W, Gao F, Yan S (2020) ESPQuery: an enhanced secure scheme for privacy-preserving query based on untrusted devices in the internet of things. IEEE Internet Things J 8:7229–7240

    Google Scholar 

  54. Mavromatis A, Ntavou F, Salas EH, Kanellos GT, Nejabati R, Simeonidou D (2018) Experimental demonstration of quantum key distribution (QKD) for energy-efficient software-defined Internet of Things. In: 2018 European Conference on Optical Communication (ECOC), pp 1–3

  55. Mirtskhulava L, Globa L, Meshveliani N, Gulua N (2019) Cryptanalysis of internet of things (IoT) wireless technology. In: 2019 International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo), pp 1–4

  56. Nieto-Chaupis H (2018) Modeling the bit error rate for accessing hybrid: quantum and classical networks in scenarios of the internet of things in middle-size smart cities. In: 2018 IEEE Biennial Congress of Argentina (ARGENCON), pp 1–4

  57. Paul S, Guerin E (2020) Hybrid OPC UA: enabling post-quantum security for the industrial internet of things. In: 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), pp 238–245

  58. Lee J, Kim D, Lee H, Lee Y, Cheon J (2018) RLizard: post-quantum key encapsulation mechanism for IoT devices. IEEE Access 7:2080–2091

    Google Scholar 

  59. Routray SK, Jha MK, Sharma L, Nyamangoudar R, Javali A, Sarkar S (2017) Quantum cryptography for IoT: a perspective. In: 2017 International Conference on IoT and Application (ICIOT), pp 1–4

  60. Sridhar S, Smys S (2017) Intelligent security framework for IoT devices cryptography based end-to-end security architecture. In: 2017 International Conference on Inventive Systems and Control (ICISC), pp 1–5

  61. Almudever CG, Lao L, Wille R, Guerreschi GG (2020) Realizing quantum algorithms on real quantum computing devices. In: 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp 864–872

  62. Wu Y, Song L, Liu L (2021) The new method of sensor data privacy protection for IoT. Shock Vib 2021:1–11

    Google Scholar 

  63. Gao W, Yang L (2021) Quantum election protocol based on quantum public key cryptosystem. Secur Commun Netw 2021:1–15

    Google Scholar 

  64. Liu J, Zhang F, Cattand C, Yang H, Wanqing S (2021) Optimization of ATP system based on quantum secure communication and its tracking control strategy. Shock Vib 2021:6627417

    Google Scholar 

  65. Zhou T, Shen J, Li X, Wang C, Shen J (2018) Quantum cryptography for the future internet and the security analysis. Commun Netw 2018:1–17

    Google Scholar 

  66. Bhatt AP, Sharma A (2019) Quantum cryptography for internet of things security. J Electron Sci Technol 17:213–220

    Google Scholar 

  67. Abdullah RM, Basher R, Alwan AA, Abualkishik AZ (2019) Quantum computers for optimization the performance. Procedia Comput Sci 160:54–60

    Google Scholar 

  68. Hamdoun H, Sagheer A (2020) Information security through controlled quantum teleportation networks. Digit Commun Netw 6:463–470

    Google Scholar 

  69. Malina L, Popelova L, Dzurenda P, Hajny J, Martinasek Z (2018) On feasibility of post-quantum cryptography on small devices. IFAC-PapersOnLine 51:462–467

    Google Scholar 

  70. Bhatia M, Sood SK, Kaur S (2019) Quantum-based predictive fog scheduler for IoT applications. Comput Ind 111:51–67

    Google Scholar 

  71. Ajagekar A, You FJE (2019) Quantum computing for energy systems optimization: challenges and opportunities. Energy 179:76–89

    Google Scholar 

  72. Abd EL-Latif AA, Abd-El-Atty B, Venegas-Andraca SE, Mazurczyk W (2019) Efficient quantum-based security protocols for information sharing and data protection in 5G networks. Future Gener Comput Syst 100:893–906

    Google Scholar 

  73. Akbar S, Saritha SK (2020) Towards quantum computing based community detection. Comput Sci Rev 38:100313

    MathSciNet  Google Scholar 

  74. Lohachab A, Lohachab A, Jangra A (2020) A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum IoT networks. Internet Things 9:100174

    Google Scholar 

  75. Alberts GJ, Rol MA, Last T, Broer BW, Bultink CC, Rijlaarsdam MS et al (2021) Accelerating quantum computer developments. EPJ Quantum Technol 8:18

    Google Scholar 

  76. Drinko A, Andrade F, Bazeia D (2020) Simple quantum graphs proposal for quantum devices. Eur Phys J Plus 135:1–10

    Google Scholar 

  77. Gilbert G, Weinstein YS (2014) Introduction to special issue on quantum cryptography. Springer, New York

    Google Scholar 

  78. Molotkov SN (2017) Quantum entanglement and composite keys in quantum cryptography. JETP Lett 105:801–805

    Google Scholar 

  79. Molotkov S (2018) Concatenation of keys in quantum cryptography: how quantum entanglement “penetrates to” classical devices. J Exp Theor Phys 127:627–637

    Google Scholar 

  80. Nagata K, Nakamura T, Farouk A (2017) Quantum cryptography based on the Deutsch-Jozsa algorithm. Int J Theor Phys 56:2887–2897

    MathSciNet  Google Scholar 

  81. Seyhan K, Nguyen TN, Akleylek S, Cengiz K (2021) Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey. Clust Comput 25:1–20

    Google Scholar 

  82. Taha TB, Barzinjy AA, Hussain FHS, Nurtayeva T (2022) Nanotechnology and computer science: trends and advances. Mem Mater Dev Circuits Syst 2:100011

    Google Scholar 

  83. Qu J, Mao B, Li Z, Xu Y, Zhou K, Cao X et al (2023) Recent progress in advanced tactile sensing technologies for soft grippers. Adv Funct Mater 33:2306249

    Google Scholar 

  84. Zhu J, Dang P, Zhang J, Cao Y, Wu J, Li W et al (2024) The impact of spatial scale on layout learning and individual evacuation behavior in indoor fires: single-scale learning perspectives. Int J Geogr Inf Sci 38:77–99

    Google Scholar 

  85. M. Han and J. Baek, "Direct estimation of the noise power spectrum from patient data to generate synthesized CT noise for denoising network training," Medical Physics, 2024.

  86. Banerjee D, Rajput D, Banerjee S, Saharan VA (2022) Artificial intelligence and its applications in drug discovery, formulation development, and healthcare. In: Computer Aided Pharmaceutics and Drug Delivery: An Application Guide for Students and Researchers of Pharmaceutical Sciences. Springer, pp 309–380

  87. Kataria S, Ravindran V (2022) Musculoskeletal care–at the confluence of data science, sensors, engineering, and computation. BMC Musculoskelet Disord 23:169

    Google Scholar 

  88. Yarkoni S, Neukart F, Tagle EMG, Magiera N, Mehta B, Hire K et al (2020) Quantum shuttle: traffic navigation with quantum computing. In: Proceedings of the 1st ACM SIGSOFT international workshop on architectures and paradigms for engineering quantum software, pp 22–30

  89. Wang S, Pei Z, Wang C, Wu J (2021) Shaping the future of the application of quantum computing in intelligent transportation system. Intell Converg Netw 2:259–276

    Google Scholar 

  90. Zhou G, Zhao D, Zhou X, Xu C, Liu Z, Wu G et al (2022) An RF amplifier circuit for enhancement of echo signal detection in bathymetric LiDAR. IEEE Sens J 22:20612–20625

    Google Scholar 

  91. Grossi M, Ibrahim N, Radescu V, Loredo R, Voigt K, Von Altrock C et al (2022) Mixed quantum–classical method for fraud detection with quantum feature selection. IEEE Trans Quantum Eng 3:1–12

    Google Scholar 

  92. Kar AK, He W, Payton FC, Grover V, Al-Busaidi AS, Dwivedi YK (2024) How could quantum computing shape information systems research—an editorial perspective and future research directions. Elsevier, p 102776

  93. Liang Z, Wang H (2023) QuCS: a lecture series on quantum computer software and system. In: 2023 IEEE International Conference on Quantum Computing and Engineering (QCE), pp 40–48

  94. Li S, Chen J, Peng W, Shi X, Bu W (2023) A vehicle detection method based on disparity segmentation. Multimed Tools Appl 82:19643–19655

    Google Scholar 

  95. Bayerstadler A, Becquin G, Binder J, Botter T, Ehm H, Ehmer T et al (2021) Industry quantum computing applications. EPJ Quantum Technol 8:25

    Google Scholar 

  96. Sood V, Chauhan RP (2024) Archives of quantum computing: research progress and challenges. Arch Comput Methods Eng 31:73–91

    Google Scholar 

  97. Chen J, Wang Q, Peng W, Xu H, Li X, Xu W (2022) Disparity-based multiscale fusion network for transportation detection. IEEE Trans Intell Transp Syst 23:18855–18863

    Google Scholar 

  98. Xu H, Han S, Li X, Han Z (2023) Anomaly traffic detection based on communication-efficient federated learning in space-air-ground integration network. IEEE Trans Wirel Commun 22:9346–9360

    Google Scholar 

  99. Zhao L, Xu H, Qu S, Wei Z, Liu Y (2024) Joint trajectory and communication design for UAV-assisted symbiotic radio networks. IEEE Trans Veh Technol

  100. Jiang H, Chen S, Xiao Z, Hu J, Liu J, Dustdar S (2023) Pa-count: passenger counting in vehicles using Wi-Fi signals. IEEE Trans Mob Compu

  101. Singh A, Dev K, Siljak H, Joshi HD, Magarini M (2021) Quantum internet—applications, functionalities, enabling technologies, challenges, and research directions. IEEE Commun Surv Tutor 23:2218–2247

    Google Scholar 

  102. Bova F, Goldfarb A, Melko RG (2021) Commercial applications of quantum computing. EPJ Quantum Technol 8:2

    Google Scholar 

  103. Agus Y, Murti MA, Kurniawan F, Cahyani ND, Satrya GB (2020) An efficient implementation of NTRU encryption in post-quantum internet of things. In: 2020 27th International Conference on Telecommunications (ICT), pp 1–5

  104. Pan S, Xu GJ, Guo K, Park SH, Ding H (2023) Video-based engagement estimation of game streamers: an interpretable multimodal neural network approach. IEEE Trans Games 78:524

    Google Scholar 

  105. Cao B, Wang X, Zhang W, Song H, Lv Z (2020) A many-objective optimization model of industrial internet of things based on private blockchain. IEEE Netw 34:78–83

    Google Scholar 

  106. Agus Y, Murti M, Kurniawan F, Cahyani ND, Satrya GB (2020) An efficient implementation of NTRU encryption in post-quantum internet of things. In: 2020 27th International Conference on Telecommunications (ICT), pp 1–5

  107. Sahu T, Ratre YK, Chauhan S, Bhaskar L, Nair MP, Verma HK (2021) Nanotechnology based drug delivery system: current strategies and emerging therapeutic potential for medical science. J Drug Deliv Sci Technol 63:102487

    Google Scholar 

  108. Arguëlles JA (2018) The heart of an image: quantum superposition and entanglement in visual perception. Found Sci 23:757–778

    Google Scholar 

  109. Cardoso FR, Rossatto DZ, Fernandes GP, Higgins G, Villas-Boas CJ (2021) Superposition of two-mode squeezed states for quantum information processing and quantum sensing. Phys Rev A 103:062405

    MathSciNet  Google Scholar 

  110. Giacomini F, Brukner Č (2022) Quantum superposition of spacetimes obeys Einstein's equivalence principle. AVS Quantum Sci 4

  111. Kerski J, Lochner P, Ludwig A, Wieck AD, Kurzmann A, Lorke A et al (2021) Quantum sensor for nanoscale defect characterization. Phys Rev Appl 15:024029

    Google Scholar 

  112. Gessner M, Smerzi A, Pezzè L (2020) Multiparameter squeezing for optimal quantum enhancements in sensor networks. Nat Commun 11:3817

    Google Scholar 

  113. Wu Y, Bao W-S, Cao S, Chen F, Chen M-C, Chen X et al (2021) Strong quantum computational advantage using a superconducting quantum processor. Phys Rev Lett 127:180501

    Google Scholar 

  114. Ringbauer M, Meth M, Postler L, Stricker R, Blatt R, Schindler P et al (2022) A universal qudit quantum processor with trapped ions. Nat Phys 18:1053–1057

    Google Scholar 

  115. Yin Y, Guo Y, Su Q, Wang Z (2022) Task allocation of multiple unmanned aerial vehicles based on deep transfer reinforcement learning. Drones 6:215

    Google Scholar 

  116. Sharma AK, Peelam MS, Chauasia BK, Chamola V (2023) QIoTChain: quantum IoT‐blockchain fusion for advanced data protection in Industry 4.0. IET Blockchain

  117. Irshad RR, Hussain S, Hussain I, Nasir JA, Zeb A, Alalayah KM et al (2023) IoT-enabled secure and scalable cloud architecture for multi-user systems: a hybrid post-quantum cryptographic and BlockChain based approach towards a trustworthy cloud computing. IEEE Access

  118. Dhar S, Khare A, Dwivedi AD, Singh R (2024) Securing IoT devices: a novel approach using blockchain and quantum cryptography. Internet of Things 25:101019

    Google Scholar 

  119. Alfieri A, Anantharaman SB, Zhang H, Jariwala D (2023) Nanomaterials for quantum information science and engineering. Adv Mater 35:2109621

    Google Scholar 

  120. Ten Holter C, Inglesant P, Jirotka M (2023) Reading the road: challenges and opportunities on the path to responsible innovation in quantum computing. Technol Anal Strateg Manag 35:844–856

    Google Scholar 

  121. Iyengar SA, Puthirath AB, Swaminathan V (2023) Realizing quantum technologies in nanomaterials and nanoscience. Adv Mater 35:2107839

    Google Scholar 

  122. Quamara S, Singh AK (2016) Bitcoins and secure financial transaction processing, recent advances. In: 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), pp 216–219

  123. Hedestig U, Skog D, Söderström M (2018) Co-producing public value through IoT and social media. In: Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, pp 1–10

  124. Douligeris C, Mitrokotsa A (2004) DDoS attacks and defense mechanisms: classification and state-of-the-art. Comput Netw 44:643–666

    Google Scholar 

  125. Lohachab A (2019) ECC based inter-device authentication and authorization scheme using MQTT for IoT networks. J Inf Secur Appl 46:1–12

    Google Scholar 

  126. Ray PP (2018) A survey on Internet of Things architectures. J King Saud Univ Comput Inf Sci 30:291–319

    Google Scholar 

  127. Gupta BB, Quamara M (2020) An overview of Internet of Things (IoT): architectural aspects, challenges, and protocols. Concurr Comput Pract Exp 32:e4946

    Google Scholar 

  128. Bhatt A, Babuta T, Sharma A (2018) Quantum information processing and communication: Asian perspective. Int J Comput Math Sci 7:616–621

    Google Scholar 

  129. Jones NJNN (2013) Computing: the quantum company, vol 498, p 286

  130. Daemen J, Rijmen V (1999) AES proposal: Rijndael

  131. Brent RP (2010) Some integer factorization algorithms using elliptic curves

  132. Proos J, Zalka C (2003) Shor's discrete logarithm quantum algorithm for elliptic curves

  133. Sano Y, Matsumoto R, Uyematsu T (2010) Secure key rate of the BB84 protocol using finite sample bits. J Phys A Math Theor 43:495302

    MathSciNet  Google Scholar 

  134. Bashir I, Asker M, Cetintepe C, Leipold D, Esmailiyan A, Wang H et al (2019) A mixed-signal control core for a fully integrated semiconductor quantum computer system-on-chip. In: ESSCIRC 2019-IEEE 45th European Solid State Circuits Conference (ESSCIRC), pp 125–128

Download references

Acknowledgments

This work was supported by Qatar University, Doha, Qatar, internal Grant IRCC-2021-010. The work was supported by the Qatar National Library [QUHI-CBE-21/22-1].

Author information

Authors and Affiliations

Authors

Contributions

H.U.K and N.A analyzed the study; N.A is concerned with overall conceptualization, writing, and editing ; F.A and S.N is concerned with representation and Validation.

Corresponding authors

Correspondence to Nasir Ali or Farhad Ali.

Ethics declarations

Conflict of interest

The authors declared that they have no conflicts of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khan, H.U., Ali, N., Ali, F. et al. Transforming future technology with quantum-based IoT. J Supercomput 80, 22362–22396 (2024). https://doi.org/10.1007/s11227-024-06251-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-024-06251-1

Keywords