Enhancing Security in Unified Software Architecture for Smart Computing IoT Devices via Mobile App Authentication Using Quantum-Based Encryption

Year : 2025 | Volume : 12 | Issue : 03 | Page : 41 48
    By

    Syed Faizan Haider,

  • Syed Afzal Murtaza Rizvi,

  1. Research Scholar, Department of Computer Science, Jamia Millia Islamia, New Delhi, India
  2. Professor, Department of Computer Science, Jamia Millia Islamia, New Delhi, India

Abstract

Security remains a critical concern in the landscape of smart computing for IoT devices, necessitating robust measures to safeguard sensitive data and user privacy. In this context, the utilization of quantum-based encryption presents a promising avenue to enhance security in unified software architecture. This study proposes a model aimed at fortifying the security of IoT devices by integrating mobile app authentication with quantum-based encryption techniques. The model leverages Quantum Key Distribution (QKD) protocols and quantum encryption algorithms to establish secure communication channels between mobile applications and IoT devices. Additionally, quantum-resistant cryptography is employed to mitigate potential threats from quantum computing advancements. By incorporating quantum-based authentication mechanisms and continuous monitoring, the proposed model aims to ensure the integrity, confidentiality, and long-term security of smart computing systems in the face of evolving cyber threats.

Keywords: Quantum encryption, IoT security, quantum key distribution (QKD), mobile app authentication, quantum-resistant cryptography

[This article belongs to Recent Trends in Parallel Computing ]

How to cite this article:
Syed Faizan Haider, Syed Afzal Murtaza Rizvi. Enhancing Security in Unified Software Architecture for Smart Computing IoT Devices via Mobile App Authentication Using Quantum-Based Encryption. Recent Trends in Parallel Computing. 2025; 12(03):41-48.
How to cite this URL:
Syed Faizan Haider, Syed Afzal Murtaza Rizvi. Enhancing Security in Unified Software Architecture for Smart Computing IoT Devices via Mobile App Authentication Using Quantum-Based Encryption. Recent Trends in Parallel Computing. 2025; 12(03):41-48. Available from: https://journals.stmjournals.com/rtpc/article=2025/view=232647


References

  1. Bohé I, Willocx M, Naessens V. SMIoT: a software architecture for maintainable internet-of-things applications. Int J Cloud Comput. 2020; 9(1): 75–94.
  2. Atzori L, Iera A, Morabito G. The internet of things: A survey. Comput Netw. 2010 Oct 28; 54(15): 2787–805.
  3. Roman R, Lopez J, Mambo M. Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Gener Comput Syst. 2018 Jan 1; 78: 680–98.
  4. Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor. 2015 Jun 15; 17(4): 2347–76.
  5. Kovatsch M, Duquennoy S, Dunkels A. A low-power CoAP for Contiki. In 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems. 2011 Oct 17; 855–860.
  6. Merenda M, Porcaro C, Iero D. Edge machine learning for ai-enabled IoT devices: A review. Sensors. 2020 Apr 29; 20(9): 2533.
  7. Lee C, Jung D, Lee K. A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services. Int J Secur Appl. 2013 Nov; 7(6): 21–30.
  8. Daniel A, Ahmad A, Paul A. Machine-to-Machine Communication. J Platf Technol. 2014 Jun; 2(2): 3–15.
  9. Wallgren L, Raza S, Voigt T. Routing attacks and countermeasures in the RPL-based internet of things. Int J Distrib Sens Netw. 2013 Aug 22; 9(8): 794326.
  10. Kirubakaramoorthi R, Arivazhagan D, Helen D. Analysis of cloud computing technology. Indian J Sci Technol. 2015 Sep; 8(21): 1–3.

Regular Issue Subscription Original Research
Volume 12
Issue 03
Received 18/07/2025
Accepted 01/09/2025
Published 30/10/2025
Publication Time 104 Days


Login


My IP

PlumX Metrics