TY - JOUR
T1 - Quantum Computing
T2 - A Tool for Zero-trust Wireless Networks
AU - Farouk, Ahmed
AU - Al-Kuwari, Saif
AU - Abulkasim, Hussein
AU - Mumtaz, Shahid
AU - Adil, Muhammad
AU - Song, Houbing
N1 - Publisher Copyright:
IEEE
PY - 2024
Y1 - 2024
N2 - Zero trust for wireless networks (ZTWN) is a model to ensure that all network traffic, including wireless connections, is considered untrusted and requires authentication and authorization, regardless of the network location or user identity. The infrastructure of zero trust depends on classical cryptographic techniques to guarantee the necessary security measures. Unfortunately, quantum computing has the potential to break many cryptographic techniques, which could compromise the confidentiality and integrity of data transmitted over ZTWN. Therefore, we explored the integration of various quantum components as potential solutions to enhance and achieve the security objectives of ZTWN in the long term. Furthermore, three different quantum machine learning (QML) algorithms have been investigated on two anomaly detection datasets; the achieved accuracies outperform the implemented classical. Quantum identity authentication (QIA) and quantum communication protocols leverage quantum properties, such as quantum entanglement and superposition have been developed to ensure secure and tamper-proof communication between ZTWN entities. The security analysis of the proposed protocols against inside and outside attacks proved that attackers cannot extract any secret information.
AB - Zero trust for wireless networks (ZTWN) is a model to ensure that all network traffic, including wireless connections, is considered untrusted and requires authentication and authorization, regardless of the network location or user identity. The infrastructure of zero trust depends on classical cryptographic techniques to guarantee the necessary security measures. Unfortunately, quantum computing has the potential to break many cryptographic techniques, which could compromise the confidentiality and integrity of data transmitted over ZTWN. Therefore, we explored the integration of various quantum components as potential solutions to enhance and achieve the security objectives of ZTWN in the long term. Furthermore, three different quantum machine learning (QML) algorithms have been investigated on two anomaly detection datasets; the achieved accuracies outperform the implemented classical. Quantum identity authentication (QIA) and quantum communication protocols leverage quantum properties, such as quantum entanglement and superposition have been developed to ensure secure and tamper-proof communication between ZTWN entities. The security analysis of the proposed protocols against inside and outside attacks proved that attackers cannot extract any secret information.
KW - Quantum computing
KW - Zero-trust Wireless Networks
KW - quantum communication
KW - quantum cryptography
KW - quantum machine learning
UR - http://www.scopus.com/inward/record.url?scp=85197087841&partnerID=8YFLogxK
U2 - 10.1109/MNET.2024.3420166
DO - 10.1109/MNET.2024.3420166
M3 - Article
AN - SCOPUS:85197087841
SN - 0890-8044
SP - 1
JO - IEEE Network
JF - IEEE Network
ER -