IDEAS home Printed from https://ideas.repec.org/a/spr/telsys/v82y2023i2d10.1007_s11235-022-00979-y.html
   My bibliography  Save this article

Quantum secured 6G technology-based applications in Internet of Everything

Author

Listed:
  • Kumar Prateek

    (Indian Institute of Information Technology Allahabad)

  • Nitish Kumar Ojha

    (Indian Institute of Information Technology Allahabad)

  • Fahiem Altaf

    (Indian Institute of Information Technology Allahabad)

  • Soumyadev Maity

    (Indian Institute of Information Technology Allahabad)

Abstract

Scientific and technological breakthroughs carry with themselves a pertinent question—“what’s next”. The evolution of mobile networks and spectrum technology over the last two decades has only confirmed this well-established fact. The ever-increasing need for broadening frequency bands, connectivity of devices which now run in billions of numbers, lower latency (so that we can enjoy interruption-free services 24 $$\times $$ × 7), increasing intervention of artificial intelligence in our day-to-day life, remote connectivity, and virtual presence to increase our output and reach and many more aspects have only intensified the demand for a more reliable, robust, intelligent, secure and friendly infrastructure through which the data, touted as the new oil for 21st century can be produced, stored and transmitted efficiently. The existing 4G and 5G systems cannot handle the ever-growing latency and connectivity needs of the Internet of Everything. Therefore, in this article, we present the vision of 6G technology with its requirements and discuss the associated challenges and enabler technologies in detail. Yet, with the advent of the quantum computer, all public-key-based techniques employed to provide communication security in existing smart networks, irrespective of underlying communication technology, are prone to quantum attacks. Hence, case studies related to Internet-of-Vehicles and Internet-of-Things utilizing a newly proposed architecture based on quantum secured 6G enabled communication is discussed to realize the secure and efficient Internet of Everything.

Suggested Citation

  • Kumar Prateek & Nitish Kumar Ojha & Fahiem Altaf & Soumyadev Maity, 2023. "Quantum secured 6G technology-based applications in Internet of Everything," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 82(2), pages 315-344, February.
  • Handle: RePEc:spr:telsys:v:82:y:2023:i:2:d:10.1007_s11235-022-00979-y
    DOI: 10.1007/s11235-022-00979-y
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s11235-022-00979-y
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s11235-022-00979-y?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. S. Zeadally & J. Guerrero & J. Contreras, 2020. "A tutorial survey on vehicle-to-vehicle communications," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 73(3), pages 469-489, March.
    2. Fatima Belamri & Samra Boulfekhar & Djamil Aissani, 2021. "A survey on QoS routing protocols in Vehicular Ad Hoc Network (VANET)," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 78(1), pages 117-153, September.
    3. Mohammad Vafaei & Ahmad Khademzadeh & Mohammad Ali Pourmina, 2020. "QoS-aware multi-path video streaming for urban VANETs using ACO algorithm," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 75(1), pages 79-96, September.
    4. Bao-Shuh Paul Lin, 2021. "Toward an AI-Enabled SDN-based 5G & IoT Network," Network and Communication Technologies, Canadian Center of Science and Education, vol. 5(2), pages 1-7, December.
    5. Kavita Jaiswal & Veena Anand, 2021. "A QoS aware optimal node deployment in wireless sensor network using Grey wolf optimization approach for IoT applications," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 78(4), pages 559-576, December.
    6. Tian Liu & Fan Wu & Xiong Li & Chaoyang Chen, 2021. "A new authentication and key agreement protocol for 5G wireless networks," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 78(3), pages 317-329, November.
    7. Abdul Basit & Maham Zafar & Xuan Liu & Abdul Rehman Javed & Zunera Jalil & Kashif Kifayat, 2021. "A comprehensive survey of AI-enabled phishing attacks detection techniques," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 76(1), pages 139-154, January.
    8. Vipindev Adat & B. B. Gupta, 2018. "Security in Internet of Things: issues, challenges, taxonomy, and architecture," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 67(3), pages 423-441, March.
    9. Shimaa A. Abdel Hakeem & Anar A. Hady & HyungWon Kim, 2020. "Current and future developments to improve 5G-NewRadio performance in vehicle-to-everything communications," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 75(3), pages 331-353, November.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Martine Wahl & Patrick Sondi & Lucas Rivoirard, 2021. "Enhanced CBL clustering performance versus GRP, OLSR and AODV in vehicular Ad Hoc networks," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 76(4), pages 525-540, April.
    2. Routhu Srinivasa Rao & Amey Umarekar & Alwyn Roshan Pais, 2022. "Application of word embedding and machine learning in detecting phishing websites," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 79(1), pages 33-45, January.
    3. Jan Lansky & Amir Masoud Rahmani & Mehdi Hosseinzadeh, 2022. "Reinforcement Learning-Based Routing Protocols in Vehicular Ad Hoc Networks for Intelligent Transport System (ITS): A Survey," Mathematics, MDPI, vol. 10(24), pages 1-45, December.
    4. Dost Muhammad Saqib Bhatti & Yawar Rehman & Prem Singh Rajput & Saleem Ahmed & Pardeep Kumar & Dileep Kumar, 2021. "Machine learning based cluster formation in vehicular communication," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 78(1), pages 39-47, September.
    5. Jianmao Xiao & Xinyi Liu & Jia Zeng & Yuanlong Cao & Zhiyong Feng, 2022. "Recommendation of Healthcare Services Based on an Embedded User Profile Model," International Journal on Semantic Web and Information Systems (IJSWIS), IGI Global, vol. 18(1), pages 1-21, January.
    6. Hernández-Rivera, Ariadna, 2023. "Brecha de género en la confianza de productos y servicios financieros desde la perspectiva del comportamiento," Revista Finanzas y Politica Economica, Universidad Católica de Colombia, vol. 15(1), pages 245-273, January.
    7. Silviu-Gabriel Szentesi & Lavinia Denisia Cuc & Ramona Lile & Paul Nichita Cuc, 2021. "Internet of Things (IoT), Challenges and Perspectives in Romania: A Qualitative Research," The AMFITEATRU ECONOMIC journal, Academy of Economic Studies - Bucharest, Romania, vol. 23(57), pages 448-448.
    8. Constant Colombo & Francis Lepage & René Kopp & Eric Gnaedinger, 2021. "Seamless Multicast : an SDN-based architecture for continuous audiovisual transport," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 78(2), pages 187-202, October.
    9. Nadir, Ibrahim & Mahmood, Haroon & Asadullah, Ghalib, 2022. "A taxonomy of IoT firmware security and principal firmware analysis techniques," International Journal of Critical Infrastructure Protection, Elsevier, vol. 38(C).
    10. Fatima Belamri & Samra Boulfekhar & Djamil Aissani, 2021. "A survey on QoS routing protocols in Vehicular Ad Hoc Network (VANET)," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 78(1), pages 117-153, September.
    11. Isha Batra & Sahil Verma & Arun Malik & Kavita & Uttam Ghosh & Joel J. P. C. Rodrigues & Gia Nhu Nguyen & A. S. M. Sanwar Hosen & Vinayagam Mariappan, 2020. "Hybrid Logical Security Framework for Privacy Preservation in the Green Internet of Things," Sustainability, MDPI, vol. 12(14), pages 1-16, July.
    12. Emtethal K. Alamri & Abdullah M. Alnajim & Suliman A. Alsuhibany, 2022. "Investigation of Using CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks," Future Internet, MDPI, vol. 14(3), pages 1-21, March.
    13. Scott Robbins & Aimee van Wynsberghe, 2022. "Our New Artificial Intelligence Infrastructure: Becoming Locked into an Unsustainable Future," Sustainability, MDPI, vol. 14(8), pages 1-11, April.
    14. Shahrzad Sedaghat & Amir Hossein Jahangir, 2022. "FRT-SDN: an effective firm real time routing for SDN by early removal of late packets," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 80(3), pages 359-382, July.
    15. Jun-Feng Tian & Hao-Ning Wang, 2020. "An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios," International Journal of Distributed Sensor Networks, , vol. 16(5), pages 15501477209, May.
    16. Eric Forcael & Isabella Ferrari & Alexander Opazo-Vega & Jesús Alberto Pulido-Arcas, 2020. "Construction 4.0: A Literature Review," Sustainability, MDPI, vol. 12(22), pages 1-28, November.
    17. Abhishek Verma & Virender Ranga, 2020. "CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 75(1), pages 43-61, September.
    18. Han-Dong Jia & Shu-Chuan Chu & Pei Hu & LingPing Kong & XiaoPeng Wang & Václav Snášel & Tong-Bang Jiang & Jeng-Shyang Pan, 2022. "Hybrid algorithm optimization for coverage problem in wireless sensor networks," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 80(1), pages 105-121, May.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:telsys:v:82:y:2023:i:2:d:10.1007_s11235-022-00979-y. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.