In the context of the development of quantum technology, most asymmetric encryption algorithms managed to be broken using Shor's algorithm, while symmetric encryption algorithms, such as AES-256, are believed to be unbroken for the moment, Grover's algorithm has been able only to reduce AES brute force attack time to its square root. This paper proposes to present how Quantum technology can affect current security algorithms and analyze how it can be used to improve our data protection by developing new algorithms. Quantum cryptography alongside Quantum key distribution could be a deal-breaker by using new encryption algorithms and providing new solutions to different cryptographic tasks that are known to be impossible by using normal computers. In the end, it will be discussed how the concept of quantum teleportation could provide new, faster, and much more secure solutions in telecommunication compared with the ones based on radio technologies.
IoT is expanding into all aspects of our lives, one of the domains that weren’t explored to their full potential in the past is traffic management, but this is changing fast due to new technologies being rolled out. Improvements in traffic flow with IoT and the new 5G networks are a relatively new domain and focus of this article. 5G opened a new range of possibilities in traffic management with multiple interconnected nodes that can exchange data continuously over any movement speed. Besides speed, 5G provides better link stability and security, vital for traffic management. An improved version of IoT is the Internet of Vehicles (IoV) which is considered an integrated part of smart cities and i s composed of several components that communicate through a wireless communications infrastructure to always have signal coverage. A new alternative to enable such wireless connections is the 5G cellular network. Moreover, our article highlights the innovative SOLID-B5G project along with the latest developments in the IoT - 5G field. The SOLID-B5G project focuses on solving network security issues and adopting flexible, high bandwidth, and low-cost networks, facilitating the interconnection of as many IoT sensors and the simultaneous data collection, storage, and processing processes.
The data in healthcare systems are increasingly being shared through every single medical equipment, which is incorporated in IoT systems. Thus, the number of shared data increases, and medical IoT systems start to impose new challenges of securing them. This paper aims to present the implementation of a prototype based on a Raspberry Pi, which will measure air quality parameters in hospital rooms. The prototype will be secured through a TLS/SSL MQTT connection; henceforth, the shared data will be secure and protected against third-party attacks. The main application for this prototype will be based on an H2020 project, SAFECARE, that has the purpose of making a cyber-physical platform intended for healthcare systems. All the data from the prototype will be sent in real-time to the platform, and any anomaly reported will be dealt with immediately by first responder organizations (in case of a fire or a flood, etc.).
Long Range technology (LoRa) is a technology used in the current Internet of Things (IoT) applications. The frequency supported by this network is around 433Mhz, 868MHz or 956Mhz. This type of network uses the Frequency Shifting Keying and has a small error rate. Moreover, LoRa has the advantage that it is a platform for long-distance communication and another factor is that it has a long-term battery performance. We will present an architecture based on LoRa Gateway which will be connected to PyCom. We will use as well specific gas sensors which will measure the quality of the air. This architecture will be connected to a breadboard with different types of gas sensors to collect data about the air pollutants.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.