Next Article in Journal
Contactless Fall Detection by Means of Multiple Bioradars and Transfer Learning
Next Article in Special Issue
Vulnerabilities of the Open Platform Communication Unified Architecture Protocol in Industrial Internet of Things Operation
Previous Article in Journal
Poincaré Plot Nonextensive Distribution Entropy: A New Method for Electroencephalography (EEG) Time Series
Previous Article in Special Issue
DOC-IDS: A Deep Learning-Based Method for Feature Extraction and Anomaly Detection in Network Traffic
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3

Department of Computing, University of Turku, Vesilinnatie 5, 20500 Turku, Finland
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(16), 6284; https://doi.org/10.3390/s22166284
Submission received: 25 July 2022 / Revised: 14 August 2022 / Accepted: 18 August 2022 / Published: 21 August 2022
(This article belongs to the Special Issue Security and Trustworthiness in Industrial IoT)

Abstract

Autonomous “Things” is becoming the future trend as the role, and responsibility of IoT keep diversifying. Its applicability and deployment need to re-stand technological advancement. The versatile security interaction between IoTs in human-to-machine and machine-to-machine must also endure mathematical and computational cryptographic attack intricacies. Quantum cryptography uses the laws of quantum mechanics to generate a secure key by manipulating light properties for secure end-to-end communication. We present a proof-of-principle via a communication architecture model and implementation to simulate these laws of nature. The model relies on the BB84 quantum key distribution (QKD) protocol with two scenarios, without and with the presence of an eavesdropper via the interception-resend attack model from a theoretical, methodological, and practical perspective. The proposed simulation initiates communication over a quantum channel for polarized photon transmission after a pre-agreed configuration over a Classic Channel with parameters. Simulation implementation results confirm that the presence of an eavesdropper is detectable during key generation due to Heisenberg’s uncertainty and no-cloning principles. An eavesdropper has a 0.5 probability of guessing transmission qubit and 0.25 for the polarization state. During simulation re-iterations, a base-mismatch process discarded about 50 percent of the total initial key bits with an Error threshold of 0.11 percent.
Keywords: quantum key distribution; quantum mechanics laws; cybersecurity; eavesdropper detection quantum key distribution; quantum mechanics laws; cybersecurity; eavesdropper detection

Share and Cite

MDPI and ACS Style

Adu-Kyere, A.; Nigussie, E.; Isoaho, J. Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3. Sensors 2022, 22, 6284. https://doi.org/10.3390/s22166284

AMA Style

Adu-Kyere A, Nigussie E, Isoaho J. Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3. Sensors. 2022; 22(16):6284. https://doi.org/10.3390/s22166284

Chicago/Turabian Style

Adu-Kyere, Akwasi, Ethiopia Nigussie, and Jouni Isoaho. 2022. "Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3" Sensors 22, no. 16: 6284. https://doi.org/10.3390/s22166284

APA Style

Adu-Kyere, A., Nigussie, E., & Isoaho, J. (2022). Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3. Sensors, 22(16), 6284. https://doi.org/10.3390/s22166284

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop