Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB84 protocol with the AES algorithm in
WSN security. The results of analysis indicated a high level of security between the data by depending on the
generation of secure keys, and reached an accuracy rate of about (80-95) % based on using NIST statistical.
The efficiency of the work increased to 0.704 after using the Quantum Bit Error Rate equation, eventually
increasing the network performance. This results in the reduction of the overall amount of energy, and the time
required for performing the key exchange in the encryption and decryption processes decreased.
Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps
... Show MoreClassical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show Morein this paper, we study and investigate a simple donor-acceptor model for charge transfer formation using a quantum transition theory. The transfer parameters which enhanced the charge transfer and the rate of the charge transfer have been calculated. Then, we study the net charge transfer through interface of Cu/F8 contact devices and evaluate all transfer coefficients. The charge transfer rate of transfer processes is found to be dominated in the low orientation free energy and increased a little in decreased potential at interface comparison to the high potential at interface. The increased transition energy results in increasing the orientation of Cu to F8. The transfer in the system was more active when the system has large driving for
... Show MoreThe estimation of the parameters of Two Parameters Gamma Distribution in case of missing data has been made by using two important methods: the Maximum Likelihood Method and the Shrinkage Method. The former one consists of three methods to solve the MLE non-linear equation by which the estimators of the maximum likelihood can be obtained: Newton-Raphson, Thom and Sinha methods. Thom and Sinha methods are developed by the researcher to be suitable in case of missing data. Furthermore, the Bowman, Shenton and Lam Method, which depends on the Three Parameters Gamma Distribution to get the maximum likelihood estimators, has been developed. A comparison has been made between the methods in the experimental aspect to find the best meth
... Show Mores The study aims to identify the fairness in the distribution of municipal services between municipal districts and areas, from point of view of municipal chamber staff and from the point of view of the citizen. It also aims to identify factors affecting the fairness of the distribution of municipal services. Municipal services were being studied : hygiene and waste, water supply, sewer, creating gardens, and street paving .Factors which examined its impact on municipal services are: resources available to municipal chamber, the managerial process at municipal chamber, and factors in the external environment surrounding municipal chamber.The results of the study showed that level of the e
... Show MoreCdSe quantum dots possess a tuning energy gap which can control gap values according to the size of the quantum dots, this is made the material able to absorb the wavelengths within visible light. A simple model is provided for the absorption coefficient, optical properties, and optical constants for CdSe quantum dots from the size 10nm to 1nm with the range of visible region between (300-730) nm at room temperature. It turns out that there is an absorption threshold for each wavelength, CdSe quantum dots begin to absorb the visible spectrum of 1.4 nm at room temperature for a wavelength of 300 nm. It has been noted that; when the wavelength is increased, the absorption threshold also increases. This applies to the optical propertie
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreArab Food's Security