Review on Quantum Methods to Measure the Performance, Security, And Privacy for the Iot Framework
Main Article Content
Abstract
Millions of devices worldwide, including smart appliances for domestic use such as smart TVs, thermostats, and CCTV cameras, were connected by the evolution of the internet. It was allowing the entire human community to connect and access devices from all over the globe through cloud infrastructure. Increasing IoT devices weaken classical model computing performance, making the IoT framework a failure model. Another big problem for IoT devices is keeping personal information safe and private because attackers can get in while the devices are talking to each other. The safety measures we have now, like changing passwords often, keeping IoT devices up to date, using a backup network (VPN), and not using plug-and-play features, work up to a point but can't promise that everything is 100% safe. Because of new technology, the public key cryptography method (RSA), which is thought to be safe right now, is being used more and more. One Time Pad (OTP) is thought to be a good way to encrypt information securely in classical cryptography, but it takes too long to send the key between parties. The trade-off between adding more IoT devices and traditional security methods isn't fair, so we needed a new technology to fix the issue. Modern innovations called quantum computing is being developed. This will help find long-term solutions for the speed and security problems that affect millions of IoT devices. Quantum technology operates on the principles of quantum physics, as opposed to existing technology, which is based on conventional physics. While classical cryptography utilizes deterministic bits that can be hacked, quantum cryptography uses qubits, which are superpositions of 0 and 1. The measurement of an unknown qubit, which provides ½ probabilities of measuring in either bit '0' or bit '1', complicates the prediction of the data. Grover's algorithm searches an unsorted databases in O(?n), as opposed to O(n) in classical algorithms, and Shor's algorithm in quantum computing solves factoring a huge integer in polynomial time, compared to quadratic time in conventional models. The privacy problem and the need for high-level security can be addressed by applying the laws underlying quantum physics and such as the Heisenberg principle and the no-cloning theorem, to detect when an unauthorized user is involved in a current connection. Heisenberg's uncertainty principle says that you can't measure quanta that aren't known without upsetting them, which means that a third party has to be involved. It is impossible to create a copy of the unknown states due to another quantum characteristic called the No-cloning theorem. Therefore, an enemy cannot copy the quantum state in order to read the quantum information in safe communication. Communication in quantum computing can also happen through entanglement, in which a third party creates an entangled photon and sends a qubit to the parties talking to each other. If one party measures a qubit, it will match up with measurements made by the other party. This creates a safe key. When two parties communicate directly and securely without the use of a key, it's known as quantum secure interacting directly, or QSDC. Quantum and conventional security should be combined for high-level IoT security.