Enhancing Cybersecurity on IoBT Networks through Quantum Mutual Transport Layer Security
Abstract
Full Text:
PDFReferences
A. N. Irfan, S. Chuprat, M. N. Mahrin and A. Ariffin, "Taxonomy of Cyber Threat Intelligence Framework," 2022 13th International Conference on Information and Communication Technology Convergence (ICTC), pp. 1295-1300, 2022.
P. Sharma, L. Najjar and S. Srinivasan, "Practical Applications to Prevent Cyberattack on Internet Of Battelefield Things (IoBT)," 12th International Conference on Advanced Information Technologies and Applications (ICAITA 2023), pp. 17-24, 2023. R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press.
D. Panda, B. K. Mishra and K. Sharma, " A Taxonomy on Man-in-the-Middle Attack in IoT Network," 2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N) , pp. 1907-1912, 2022.
M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989.
L. Le, T. N. Nguyen, A. Lee and B. Dumba, "Entanglement Routing For Quantum Networks: A Deep Reinforcement Learning Approach," ICC 2022 - IEEE International Conference on Communications, Seoul, Korea, Republic of, 2022, pp. 395-400, doi: 10.1109/ICC45855.2022.9839240.
K. -S. Shim, B. Kim and W. Lee, "Research on Quantum Key, Distribution Key and Post-Quantum Cryptography Key Applied Protocols for Data Science and Web Security," in Journal of Web Engineering, vol. 23, no. 6, pp. 813-830, September 2024, doi: 10.13052/jwe1540-9589.2365.
A. Kott, A. Swami and B. J. West, "The Internet of Battle Things," Computer IEEE, vol. 49, no. 12, pp. 70 - 75, 2016.
M. Saed and h. Aljuhani, "Detection of Man in The Middle Attack using Machine learning," 2022 2nd International Conference on Computing and Information Technology (ICCIT) , pp. 388 - 393, 2022.
W. S. Raharjo, I. D. E.K.Ratri and H. Susilo, "Implementation of Two Factor Authentication and Zero Knowledge Proof Protocol for Login System," Jurnal Teknik Informatika dan Sistem Informasi , vol. 3, pp. 127-135, 2017.
S. P. Otta, S. Panda, C. Hota and M. Gupta, "A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure," Future Internet 2023 MDPI, vol. 15, p. 146, 2023.
A. Nath and T. Mondal, "Issues and Challenges in Two Factor Authentication Algorithms," International Journal of Latest Trends in Engineering and Technology, vol. 6, no. 3, pp. 318-324, 2016.
Y. Sheffer, R. Holz and P. Saint-Andre, "Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)," Internet Engineering Task Force (IETF), vol. 7525 , no. 195, 2015.
V. Platenka, A. Mazalek and Z. Vranova, "Attacks on devices using SSL/TLS," 2021 International Conference on Military Technologies (ICMT), pp. 1-6, 2021.
A. Satapathy and J. L. L. M., "A Comprehensive Survey on SSL/ TLS and their Vulnerabilities," International Journal of Computer Applications, vol. 153, pp. 31-38, 2016.
R. O. Yıldız and A. ¸. Yılmazer-Metin, "Design and Implementation of TLS Accelerator," 2022 IEEE 15th Dallas Circuit And System Conference (DCAS), pp. 1-4, 2022.
S. Gude and D. R. C. A. Naidu, "Data Transmission Using Secure Socket Layer (SSL) Protocol in Networks," Scientific Journal of Impact Factor (SJIF): 4.72, vol. 4, no. 9, pp. 205-211, 2017.
M. Alawneh and I. M. Abbadi, "Integrating Trusted Computing Mechanisms with Trust Models to Achieve Zero Trust Principles," 2022 9th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Milan, Italy, 2022, pp. 1-6, doi: 10.1109/IOTSMS58070.2022.10062269.
A. A. Abushgra, "How Quantum Computing Impacts Cyber Security," 2023 Intelligent Methods, Systems, and Applications (IMSA), Giza, Egypt, 2023, pp. 74-79, doi: 10.1109/IMSA58542.2023.10217756.
A. Dwivedi, G. K. Saini, U. I. Musa and Kunal, "Cybersecurity and Prevention in the Quantum Era," 2023 2nd International Conference for Innovation in Technology (INOCON), Bangalore, India, 2023, pp. 1-6, doi: 10.1109/INOCON57975.2023.10101186.
N. Alshaer and T. Ismail, "Exploring Quantum Key Distribution for Secure Communication in High-Altitude Platforms," 2024 24th International Conference on Transparent Optical Networks (ICTON), Bari, Italy, 2024, pp. 1-5, doi: 10.1109/ICTON62926.2024.10648102.
T. Choi, S. Yoon, T. Y. Kim and H. Kim, "Design and Implementation of Quantum Key Distribution Network Control and Management," 2021 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea, Republic of, 2021, pp. 724-727, doi: 10.1109/ICTC52510.2021.9621170.
M. -J. O. Saarinen, "WiP: Applicability of ISO Standard Side-Channel Leakage Tests to NIST Post-Quantum Cryptography," 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), McLean, VA, USA, 2022, pp. 69-72, doi: 10.1109/HOST54066.2022.9839849.
S. P C, K. Jain and P. Krishnan, "Analysis of Post-Quantum Cryptography for Internet of Things," 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 2022, pp. 387-394, doi: 10.1109/ICICCS53718.2022.9787987.
R. Bavdekar, E. Jayant Chopde, A. Agrawal, A. Bhatia and K. Tiwari, "Post Quantum Cryptography: A Review of Techniques, Challenges and Standardizations," 2023 International Conference on Information Networking (ICOIN), Bangkok, Thailand, 2023, pp. 146-151, doi: 10.1109/ICOIN56518.2023.10048976.
O. H. A. Kamel, A. T. N. El-Din Raslan, T. Aly and M. Gheith, "Quantum Computing's Impact on Data Encryption:Methodologies, Implementation, and Future Directions: Exploring the BB84 Protocol and Comparative Analysis with Classical Cryptographic Techniques," 2024 Intelligent Methods, Systems, and Applications (IMSA), Giza, Egypt, 2024, pp. 213-217, doi: 10.1109/IMSA61967.2024.10652653.
Rubio García, C., Rommel, S., Takarabt, S., Vegas Olmos, J. J., Guilley, S., Nguyen, P., & Tafur Monroy, I. (2024). Quantum-resistant Transport Layer Security. Computer Communications, 213, 345–358. https://doi.org/10.1016/j.comcom.2023.11.010
Puringgar, R., Putra, P., Danang Rimbawa, H. A., & Wahyudi, B. (2025). Comparative Analysis of Classical and Post-Quantum Cryptographic Methods for Secure Digital Signature Implementation in the Quantum Era. International Journal of Progressive Sciences and Technologies (IJPSAT, 48(2), 553–563. https://ijpsat.org/
DOI: http://dx.doi.org/10.52155/ijpsat.v49.1.6969
Refbacks
- There are currently no refbacks.
Copyright (c) 2025 Jaka Abdul Jabar, Rudy A.G. Gultom, Achmad Farid Wadjdi

This work is licensed under a Creative Commons Attribution 4.0 International License.

















