Skip to main content

Effects of Weather on Drone to IoT QKD

  • Conference paper
  • First Online:
Cyber Security Cryptography and Machine Learning (CSCML 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11527))

Abstract

The Internet of Things (IoT) is playing a growing role in society, and includes control over a range from household appliances to municipal power grids and nationwide assets. As a result, hackers from a national level down to low level criminals are looking to take advantage of important IoT infrastructures. These present an immediate target for cyber-terrorists as well as more mundane attacks by thieves and personal enemies, and it is imperative to devise defensive measures. In this work, we describe potential possible attacks on several IoT systems. As a result, vendors of the IoT infrastructure employ conventional encryption which is based on complexity to fight against hackers. However the emerging technology of quantum computing will make deciphering of the conventional encryption an easy task. This leads us to propose a scheme for use of QKD (quantum key distribution) which could be effective as a countermeasure. In this paper we will describe the feasibility study of weather effect design guidelines for a small, short range, mobile QKD system from drone to IoT on the ground.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. http://fortune.com/2017/09/06/hack-energy-grid-symantec/

  2. https://www.nbcnews.com/news/north-korea/experts-northkorea-targeted-u-s-electric-power-copanies-n808996

  3. https://www.euractiv.com/section/cybersecurity/news/hackers-accused-of-ties-to-russia-hit-3-east-european-companies-cybersecurity-firm/

  4. https://money.cnn.com/2017/01/09/technology/fda-st-jude-cardiac-hack/

  5. https://info.entrustdatacard.com/iot-tesla?_ga=2.95926104.559287255.1513006603-146162010.1496333764

  6. https://www.kaspersky.com/blog/blackhat-jeep-cherokee-hack-explained/9493/

  7. https://hackernoon.com/smart-car-hacking-a-major-problem-for-iot-a66c14562419

  8. https://www.zdnet.com/article/ibm-warns-of-instant-breaking-of-encryption-by-quantum-computers-move-your-data-today/

  9. https://it.slashdot.org/story/18/05/19/200225/ibm-warns-quantum-computing-will-break-encryption

  10. Liao, S.-K., et al.: Satellite-relayed intercontinental quantum network. Phys. Rev. Lett. 120(3), 030501 (2018)

    Article  Google Scholar 

  11. Bernstein, D.J.: Introduction to post-quantum cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 1–14. Springer, Berlin (2009). https://doi.org/10.1007/978-3-540-88702-7_1

    Chapter  MATH  Google Scholar 

  12. Hill, A.D., Chapman, J., Herndon, K., Chopp, C., Gauthier, D.J., Kwiat, P.: Drone-based quantum key distribution. Urbana 51, 61801–63003 (2017)

    Google Scholar 

  13. Chun, H., et al.: Handheld free space quantum key distribution with dynamic motion compensation. Optics Express 25(6), 6784–6795 (2017)

    Article  Google Scholar 

  14. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, vol. 175, p. 8, New York (1984)

    Google Scholar 

  15. Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67(6), 661 (1991)

    Article  MathSciNet  Google Scholar 

  16. Tentrup, T.B.H., et al.: Large-alphabet Quantum Key Distribution using spatially encoded light. arXiv preprint arXiv:1808.02823 (2018)

  17. Arnon, S., Kopeika, N.S.: Laser satellite communication network-vibration effect and possible solutions. Proc. IEEE 85(10), 1646–1661 (1997)

    Article  Google Scholar 

  18. Arnon, S.: Effects of atmospheric turbulence and building sway on optical wireless-communication systems. Opt. Lett. 28(2), 129–131 (2003)

    Article  Google Scholar 

  19. Yang, F., Cheng, J., Tsiftsis, T.A.: Free-space optical communication with nonzero boresight pointing errors. IEEE Trans. Commun. 62(2), 713–725 (2014)

    Article  Google Scholar 

  20. Chen, C.-C., Gardner, C.S.: Impact of random pointing and tracking errors on the design of coherent and incoherent optical intersatellite communication links. IEEE Trans. Commun. 37(3), 252–260 (1989)

    Article  Google Scholar 

  21. Kopeika, N.: A System Engineering Approach to Imaging, 700 p. SPIE Press (1998). (2nd printing. April 2000)

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shlomi Arnon .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Arnon, S., Kupferman, J. (2019). Effects of Weather on Drone to IoT QKD. In: Dolev, S., Hendler, D., Lodha, S., Yung, M. (eds) Cyber Security Cryptography and Machine Learning. CSCML 2019. Lecture Notes in Computer Science(), vol 11527. Springer, Cham. https://doi.org/10.1007/978-3-030-20951-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-20951-3_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-20950-6

  • Online ISBN: 978-3-030-20951-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics